Search Results

Showing 811-820 from 854

Scheduled Scans (in Comodo Internet Security)

...run scans at a certain time on a daily, weekly, monthly or custom interval basis. You can also choose which specific files, folders or drives are included in that scan.   Perhaps you wish to check your entire system first thing in the morning; maybe you prefer the middle of the night!! Comodo Antivirus gives you the power to choose, allowing you to get on with more important matters with complete peace of mind. To view the Scheduled Scans interface, click on the 'Scheduled Scans' link in the Antivirus Tasks interface.   Comodo Free Antivirus is shipped with two default...

http://help.comodo.com/topic-72-1-284-2965-Scheduled-Scans.html
Configure System Access (in Comodo Dome Firewall)

...button beside 'Show rules of system services' displays the list of pre-configured/auto-created firewall rules for system access. These rules cannot be modified or removed. From this interface, the administrator can: Create new system access firewall rules Creating System Access Firewall rules The system access firewall rules can be created from the 'Add a system access rule' pane by defining the source, the interface of the virtual appliance at which the traffic is received and the service. To create a new rule Open the 'System access configuration' interface by clicking 'Firewall' >  'System access' from the left hand...

http://help.comodo.com/topic-451-1-936-12796-Configure-System-Access.html
Disable Auto-Sandboxing On A Per-application Basis (in Comodo Internet Security)

...run unknown executables in sandboxed environment and queue them for submission to Comodo Cloud scanners for behavior analysis. Users do, however, have the option to exclude specific files or file types from this auto-sandboxing process by creating a rule. This is particularly useful for developers that are creating new applications which, by their nature, are as yet unknown to the Comodo safe list.   To disable the auto-sandboxing selectively 1.  Open 'Tasks' interface by clicking the green curved arrow at top right of the 'Home' screen 2.  Open 'Sandbox Tasks' and click 'Open Advanced Settings...

http://help.comodo.com/topic-72-1-623-7666-Disable-Auto-Sandboxing-on-a-Per-application-Basis.html
Manage Monitors (in Xcitium Enterprise)

...run a procedure to remediate issues. Monitors are added to configuration profiles which are in-turn applied to a devices. To add a monitor to a profile: Click 'Assets' > 'Configuration Templates' > 'Profiles' Open an existing profile or create a new profile Click 'Add Profile Section' > 'Monitoring' A single monitor can be used in multiple profiles. A single profile can include any number of monitors. You can clone an existing monitor to create a new one. There are two types of monitors: Predefined Monitors - A collection of monitors from Xcitium which perform a range of useful monitoring tasks...

http://help.comodo.com/topic-463-1-1029-15735-Manage-Monitors.html
Internet Content Adaptation Protocol (in Comodo Dome Firewall)

...running Comodo Dome Data Protection or Comodo Dome Secure Web Gateway services. To open the 'ICAP Services' screen, click 'Services' on the left then 'ICAP'. To add ICAP service: Click 'Add a service' at the top Service - Enter the service name, for example : 'Dome Data Protection'. IP Address - Enter IP address of the node on which the service is installed. Port Number - Enter the ICAP service port number. Service Path - Enter the path where the service is located. Message Type - Choose the message type of the data packet from the drop down. Check the options 'Should Bypass on Error...

http://help.comodo.com/topic-451-1-936-12791-Internet-Content-Adaptation-Protocol.html
Comodo Internet Security Essentials (in Comodo Cloud Antivirus)

...runs as a background process and will alert you if a site uses a potentially malicious certificate. You will have the option to discontinue the connection (recommended) or to continue. CISE blocks man-in-the-middle attacks attempts by verifying certificates against Comodo's trusted root certificate list. This functionality is especially important if you are accessing sensitive websites while on a public Wi-Fi such as those found in an cafe, park or airport. What is a man-in-the-middle attack? Man-in-the-middle attacks occur when an attacker forces a client to connect to a server...

http://help.comodo.com/topic-394-1-767-10964-Comodo-Internet-Security-Essentials.html
Port Sets (in Comodo Internet Security)

...button beside the port set name expand the list of ports defined in it. The default port sets shipped with Comodo Internet Security are: HTTP Ports : 80, 443 and 8080. These are the default ports for http traffic. Your Internet browser uses this ports to connect to the Internet and other networks. POP3/SMTP Ports : 110, 25, 143, 995, 465 and 587. These are the ports that are typically used by mail clients like Outlook Express and WinMail for communication using the POP3, SMTP and IMAP protocols. Privileged Ports: 0-1023 . This set can be deployed if you wish to create...

http://help.comodo.com/topic-72-1-451-4776-Port-Sets.html
Create And Manage File Groups (in Endpoint Manager)

...run. Endpoint Manager ships with a set of predefined File Groups and if required administrators can add new File Groups, edit and manage them. Endpoint Manager ships with a set of predefined file groups, and allows you to create your own. After creating a group, it becomes available for selection when configuring a Windows profile. Open the 'File Groups ' interface Click 'Settings' > 'System Templates' Click the 'File Groups Variables' tab 'Default' groups cannot be edited or deleted. Sorting, Search and Filter Options Click on the 'File Groups' column header to sort the items in ascending/descending order of the names...

http://help.comodo.com/topic-399-1-786-10158-Create-and-Manage-File-Groups.html
Apply Policies To Networks (in Comodo Secure Web Gateway)

...buttons   Click the pencil icon to update a policy Click the trash can icon to remove a policy How policy deployment works Comodo SWG applies policy after analyzing the connection used by a device. It uses five criteria, or 'Objects', to determine whether it should apply a particular policy to a device. These are 'Location', 'User', 'Group' , 'Department' and 'Computer Name'. If a connection matches all five objects then SWG will apply the policy. SWG also checks if the policy is scheduled for specific days / time-period and applies it appropriately. Note – 'Computer Name' object will be available only...

http://help.comodo.com/topic-436-1-842-10790-Apply-Policies-to-Networks.html
Configure ICAP Services (in Comodo Dome Firewall)

...running MyDLP data loss prevention software. To open the 'ICAP Services' screen, click 'Services' on the left then 'ICAP'. To add ICAP service: Click 'Add a service' at the top   Service - Enter the service name, for example : 'MyDLP'  IP Address - Enter IP address of the node on which the service is installed Port Number – Enter the ICAP service port number. Service Path - Enter the path where the service is located Message Type - Choose the message type of the data packet from the drop down. Check the options 'Should Bypass on Error' as per your requirement. If you need...

http://help.comodo.com/topic-451-1-940-12895-Configure-ICAP-Services.html
Pages 82 of 86 « Prev     Next »   Jump to page