Search Results

Showing 771-780 from 1131

Step 8 – Configure KoruMail Security Components (in Comodo KoruMail)

...firewall (FW) to protect against denial of service (DoS) and SYN attacks. General – Enable / disable SMTP IPS/FW module and configure the security profile. Whitelist – Add trusted networks so they will not be filtered by the SMTP IPS module. Blocked – Add IP addresses so that mails from these sources never reach the SMTP level for processing. Rate Control -The 'Rate Control...

http://help.comodo.com/topic-290-1-934-12741-Step-8-–-Configure-KoruMail-Security-Components.html
Use Comodo Dragon In Virtual Mode (in Comodo Dragon Web Browser)

...firewall, threat containment, and many other security features. Read more about CIS and download from www.comodo.com/home/internet-security/free-internet- security.php   Any files you want to download and keep must be saved to a special folder called 'Shared Space'. By default, this is located at: C:/Program Data/Shared Space (Windows 7, Windows Vista)  C:/Documents and Settings/All Users/Application Data/Shared Space (Windows...

http://help.comodo.com/topic-120-1-279-5648-Use-Comodo-Dragon-in-Virtual-Mode.html
Unknown Files - The Scanning Processes (in Xcitium Enterprise)

...unknown files to our file rating and malware analysis servers, please make sure the following IP addresses and ports are allowed on your network firewall: To allow communication with our FLSs: IPs that need to be allowed: 91.209.196.27 91.209.196.28 199.66.201.20 199.66.201.21 199.66.201.22 199.66.201.25 199.66.201.26 Ports that need to be allowed: 53 UDP and 80 TCP Direction: Outgoing (Endpoints to FLSs) ...

http://help.comodo.com/topic-463-1-1033-15938-Unknown-Files---The-Scanning-Processes.html
Appendix 1 – Field Groups And Event Items Description (in SOCaaP)

...firewall, ips, antivirus rule etc.) information contained in events rule_hit_count Represents how many hits occurred for the rule rule_id ID of the rule rule_info Extra information related to the rule rule_name Name of the rule rule_sig_id ID of the signature related to rule rule_sig_name Name of the signature related to rule...

http://help.comodo.com/topic-466-1-1040-16296-Appendix-1-–-Field-Groups-and-Event-Items-Description.html
Tutorial To Add Networks To Secure Internet Gateway (in Xcitium Secure Internet Gateway)

...open the network setup guide: There are four main steps in the tutorial: Add Network - Import your network to Secure Internet Gateway. Set DNS - Configure your Domain Name System (DNS) server, router or firewall to use the Secure Internet Gateway DNS service Create Policy - Add content filtering rules and domain black/whitelists for your network . Analyze - View traffic trends on your network. ...

http://help.comodo.com/topic-434-1-840-11969-Tutorial-to-Add-Networks-to-Secure-Internet-Gateway.html
Website Filtering (in Comodo Internet Security)

...Firewall > Website Filtering tab from 'Advanced Settings' interface. Brief overview: Rules are constructed from one or more 'categories'. A category is a collection of one or more URL 'patterns'. A URL pattern can be a straight list of domain names and/or filtered terms (for example 'contains', 'starts with', 'equal to', etc.) You must set a rule to be 'Allow...

http://help.comodo.com/topic-72-1-623-7743-Website-Filtering.html
Installing Comodo Internet Security 2012 Complete (in Comodo Internet Security)

...Firewall and Defense+ components. Install COMODO GeekBuddy - Selecting this option installs a version of GeekBuddy, a 24 x 7 Remote assistance support service  in which Comodo experts remotely access your computer when you need it for getting help with computer related problems. Refer to the section Comodo GeekBuddy for more details. Install COMODO Dragon -  Selecting this option installs...

http://help.comodo.com/topic-72-1-284-3050-Installing-Comodo-Internet-Security-2012-Complete.html
Edit Configuration Profiles (in Endpoint Manager)

...Firewall'. Some tabs let you directly edit the parameters. In others, you will need to click the 'Edit' button:  See the following sections for in-depth help on the settings in a profile: Profiles for Android Devices Profiles for iOS Devices Profiles for Mac OS Devices Profiles for Windows Devices Profiles for Linux Devices Click 'Save' for your changes...

http://help.comodo.com/topic-399-1-786-10099-Edit-Configuration-Profiles.html
Advanced Tasks - Introduction (in Endpoint Manager)

...running on your PC. Click the 'More' button to open Comodo KillSwitch CСS Logs - View the event logs of firewall, antivirus, containment and HIPS modules Submit Files - Upload unknown/suspicious files to Comodo Valkyrie for analysis You might need to enter a password to access these tasks if so configured in the Endpoint Manager profile. See ' Password Protection ' for more details. ...

http://help.comodo.com/topic-399-1-904-11731-Advanced-Tasks---Introduction.html
Importing/Exporting And Managing Personal Configurations (in Comodo Internet Security)

...Firewall Security   The currently active configuration is indicated as 'Active' in this interface. Click the area on which you would like more information: Export my configuration to a file Import a saved configuration from a file Select a different active configuration setting Delete a inactive configuration profile Export my configuration to a file   To export your currently active...

http://help.comodo.com/topic-72-1-284-3047-Importing-Exporting-and-Managing-Personal-Configurations.html
Pages 78 of 114 « Prev     Next »   Jump to page