Search Results

Showing 731-740 from 854

Configure Program And Virus Database Updates (in Comodo Internet Security)

...running from battery power. This is intended to extend battery lifetime on laptops. ( Default = Enabled ) Proxy and Host Settings – Allows you to select the host from which updates are downloaded. By default, CIS will directly download updates from Comodo servers. However, advanced users and network admins may wish to first download updates to a proxy/staging server and have individual CIS installations collect the updates from there. The 'Proxy and Host Settings' interface allows you to point CIS at this proxy/staging server. This helps conserve overall bandwidth consumption and accelerates the update process when large number of endpoints are involved...

http://help.comodo.com/topic-72-1-451-4752-Configure-Program-and-Virus-Database-Updates.html
Configure Program And Virus Database Updates (in Comodo Antivirus for Servers)

...running from battery power. (Default = Disabled) Proxy and Host Settings - Allows you to select the host from which updates are downloaded. By default, CAVS will directly download updates from Comodo servers. However, advanced users and network admins may wish to first download updates to a proxy/staging server and have individual CAVS installations collect the updates from there. The 'Proxy and Host Settings' interface allows you to point CAVS at this proxy/staging server. This helps conserve overall bandwidth consumption and accelerates the update process when large number of endpoints are involved. Note : You first need to install Comodo Offline Updater...

http://help.comodo.com/topic-213-1-517-6010-Configure-Program-and-Virus-Database-Updates.html
Trusted Files (in Endpoint Manager)

...run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more convenient to classify entire directories of files as 'Trusted Files'. CCS allows you to define a personal safe list of files to complement the default Comodo safe list. By adding executables to this list (including sub folders containing many components) you can reduce the amount of alerts that HIPS generates whilst maintaining a higher level of Defense+ security. This is particularly useful for developers that are creating new applications that, by their nature, are as yet unknown...

http://help.comodo.com/topic-399-1-790-10398-Trusted-Files.html
Source Network Address Translation (in Comodo Dome Firewall)

...running a web or mail service and the outgoing packets should contain the external IP address of the server. Tip : Dome Cloud Firewall also allows you to create Destination NAT (DNAT) rules for incoming traffic. DNAT rules redirect service-specific traffic from a port on a host or interface to another host/port combination. See Configure Virtual IP for Destination Network Address Translation for more details. SNAT rules can be created and managed from the 'SNAT' interface. To open the SNAT interface, click 'Firewall' > 'SNAT' on the left-hand menu. The interface displays all current SNAT rules in effect...

http://help.comodo.com/topic-451-1-940-12913--Source-Network-Address-Translation.html
Install Comodo Client Security (in Endpoint Manager)

...button  on the menu bar and choose 'Enroll Device'. The 'Enroll Devices' dialog will open for the chosen users. The 'Please choose the device owner(s)' field is pre-populated with any users you selected in the previous step. To add more users, start typing first few letters of the username and choose from the results If you want to see help on the enrollment process, click 'Show Enrollment Instructions'. This is useful for administrators attempting to enroll their own devices. If you want the enrollment instructions to be sent as an email to users, click 'Email Enrollment Instructions...

http://help.comodo.com/topic-399-1-790-10283-Install-Comodo-Client-Security.html
Remote Tools Settings (in Xcitium Enterprise)

...run command lines and power shell commands on remote devices' command prompt. Alternatively, use the 'Apply to all' switch at the top to enable or disable all at-once. Establish Remote Tools sessions without asking user permission - The remote connection will be established without showing a request to the user. Ask user, wait and allow access - A message is shown to the user which requests them to accept the connection. The connection is established if the user does not respond within the timeout period. Enter the timeout period (in seconds) in the text box An example request message is shown...

http://help.comodo.com/topic-463-1-1029-15691-Remote-Tools-Settings.html
Microsoft Windows - Configuration And Connection (in Comodo Internet Security)

...run the CIS Complete installer and select ‘Install TrustConnect’ at the options menu. Alternatively, the TrustConnect client can be downloaded separately from http://www.comodo.com/trustconnect or from the ‘TrustConnect’ area of your Comodo account at http://accounts.comodo.com/login . Installation of TrustConnect is dealt with in Section Installing TrustConnect of this guide. Establish a connection to TrustConnect   Once installation is complete, TrustConnect can be launched in one of the following ways: Via the Windows 'Start' menu. Click ' Start > Programs > Comodo > Trust Connect > Trust Connect' By double clicking the TrustConnect Tray Icon: By right clicking...

http://help.comodo.com/topic-72-1-522-6334-Microsoft-Windows---Configuration-and-Connection.html
Remote Tools Settings (in Endpoint Manager)

...run command lines and power shell commands on remote devices' command prompt. Alternatively, use the 'Apply to all' switch at the top to enable or disable all at-once. Establish Remote Tools sessions without asking user permission  - The remote connection will be established without showing a request to the user. Ask user, wait and allow access  - A message is shown to the user which requests them to accept the connection. The connection is established if the user does not respond within the timeout period. Enter the timeout period (in seconds) in the text box An example request message...

http://help.comodo.com/topic-399-1-786-13760-Remote-Tools-Settings.html
View And Manage Blocked Threats (in Xcitium Enterprise)

...run outside the container on devices and will be skipped in future scans. See File Ratings Explained for more details on trust ratings of files. Threats identified on Mac OS Devices: First, select the items on which you want to take the action. Then click one of the following: Delete Malware - Will remove the malware from the device. Quarantine Malware - The items will be moved to quarantine on the respective devices. You can delete the items from quarantine later, or restore them to their original locations. See View and Manage Quarantined Items for more details. Threats identified on Linux Devices...

http://help.comodo.com/topic-463-1-1029-15766-View-and-Manage-Blocked-Threats.html
Manage Protection Settings On A Network/Device (in Xcitium SIEM)

...run normally next time. Click 'Learn More' for an explanation of containment. Click 'Open Valkyrie Portal' in the explanation to login to Valkyrie. Configure protection settings for a device Select the device from the left pane to open its 'Device Overview' page Click the gear icon  at top-right of the protection status tile The 'Device Web Browsing Settings' for the device will open. It contains the settings as per the default protection settings shipped with cWatch Office. From this page, you can: Select the website categories to be blocked Configure allow/block policies for miscellaneous website categories Create website...

http://help.comodo.com/topic-285-1-918-12330-Manage-Protection-Settings-on-a-Network-Device.html
Pages 74 of 86 « Prev     Next »   Jump to page