Search Results

Showing 731-740 from 1132

Comodo Client Security - Quick Start Guide (in Endpoint Manager)

...Quick Start Guide This tutorial explains how to setup and use Comodo Client Security (CCS). Installation Start CCS The main interface Scan and clean your computer Run an instant antivirus scan on selected items Set up the Firewall for maximum security and usability Set up HIPS for maximum security and usability Run untrusted programs in the container More Help   ...

http://help.comodo.com/topic-399-1-943-12998-Comodo-Client-Security---Quick-Start-Guide.html
SMTP IPS General Settings (in Xcitium Secure Email Gateway Enterprise)

...firewall blocks the source IP address. Limit simultaneous connections  Enable controls on the number of simultaneous connections. See settings below. Maximum number of simultaneous sessions from a single IP address Maximum number of sessions that can be opened by a single IP address after limiting instant SMTP connections. Limit the rate of new SMTP connections If enabled, the parameters...

http://help.comodo.com/topic-443-1-898-11443-SMTP-IPS-General-Settings.html
Manage Endpoint Manager Extensions (in Endpoint Manager)

...firewall, an advanced host intrusion prevention system (HIPS) and Containment feature that runs unknown and unrecognized applications in an isolated environment at the endpoints. CCS can be installed on the endpoints from the 'Devices' interface. See Remotely Install Packages onto Windows Devices for more details. Once installed, CCS can be configured for optimal security by applying configuration profiles. See Profiles...

http://help.comodo.com/topic-399-1-786-10119-Manage-Endpoint-Manager-Extensions.html
PCI Scanning (in Comodo Web Inspector)

...scan (no vulnerabilities with a CVSS base score greater than 4.0), merchants are provided with an official PCI compliance report that can be sent to an acquiring bank. WI PCI also offers a web-based Internal Scanning feature to run vulnerability scans on the individual devices connected to your network and protected by a firewall or other network security devices. ...

http://help.comodo.com/topic-208-1-490-5126-PCI-Scanning.html
Advanced Tasks – Introduction (in Comodo Internet Security)

...Essentials to remove persistent infections from your PC Task Manager - Stop, pause and resume currently running CIS tasks like antivirus scans and updates Quarantined Items –  Manage files that are moved to quarantine by the virus scanner or manually CIS Logs - View tevent logs of Firewall, Antivirus, Containment and HIPS modules Submit Files - Submit unknown/suspicious files to Comodo for analysis ...

http://help.comodo.com/topic-72-1-766-9028-Advanced-Tasks-–-Introduction.html
Appendix 1 - Default Comodo Security Policy Details (in Xcitium EDR)

...Firewall Settings 6 Registry key path matches HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfile* Disable Registry Editing Tool 6 Registry key path is equal to HKEY_CURRENT_USERSOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem AND registry value name is equal to DisableRegistryTools AND registry value data is equal to 1. Modify AppInit_DLLs in Registry 6 Registry key path is equal to HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrentVersionWindows AND registry value name...

http://help.comodo.com/topic-444-1-905-12702-Appendix-1---Default-Comodo-Security-Policy-Details.html
Configuration Change Logs (in Comodo Internet Security)

...Firewall Alert', 'HIPS Alert', 'Containment Alert', 'Scheduler' and 'Comodo'. Name - The item featured in the modification. This will vary depending on the component. Old Setting - The value before the configuration change. New Setting - The value after the configuration change. Pace your mouse over an entry in the 'Old Value' or 'New Value' column to view the full setting string Export...

http://help.comodo.com/topic-72-1-766-9125-Configuration-Change-Logs.html
Alerts Logs (in Advanced Endpoint Protection)

...firewall, HIPS, containment, VirusScope and secure shopping. Description - Name of the file or event that caused the alert. Advice -The recommendation, or informational text in the alert. This text is intended to help users decide to respond to the threat. Answered - Whether or not the alert was answered by the user. You will see the date and time of the response...

http://help.comodo.com/topic-467-1-1050-16727-Alerts-Logs.html
Unknown Files - The Scanning Processes (in Endpoint Manager)

...unknown files to our file rating and malware analysis servers, please make sure the following IP addresses and ports are allowed on your network firewall: To allow communication with our FLSs: IPs that need to be allowed: 91.209.196.27 91.209.196.28 199.66.201.20 199.66.201.21 199.66.201.22 199.66.201.25 199.66.201.26 Ports that need to be allowed: 53 UDP and 80 TCP Direction: Outgoing (Endpoints to FLSs) ...

http://help.comodo.com/topic-399-1-904-11888-Unknown-Files---The-Scanning-Processes.html
Configure Client Security Settings (in Xcitium Enterprise)

...firewall and more. The client security settings area lets you: Set the default client version which should be installed on your endpoints. This is set to fetch and install the latest version, unless you specify otherwise. Specify whether admins can change the installed version of the client from a command elsewhere in Xcitium Enterprise. In other words, whether admins can choose...

http://help.comodo.com/topic-463-1-1029-15788-Configure-Client-Security-Settings.html
Pages 74 of 114 « Prev     Next »   Jump to page