Search Results

Showing 821-830 from 854

Port Sets (in Comodo Internet Security)

...button beside the port set name expand the list of ports defined in it. The default port sets shipped with Comodo Internet Security are: HTTP Ports : 80, 443 and 8080. These are the default ports for http traffic. Your Internet browser uses this ports to connect to the Internet and other networks. POP3/SMTP Ports : 110, 25, 143, 993, 995, 465 and 587. These are the ports that are typically used by mail clients like Outlook Express and WinMail for communication using the POP3, SMTP and IMAP protocols. Privileged Ports: 0-1023 . This set can be deployed if you wish...

http://help.comodo.com/topic-72-1-623-7742-Port-Sets.html
Quality Of Service (in Comodo Dome Firewall)

...buttons. Classes at the top are the first to be processed when there is insufficient bandwidth for all traffic. The interface allows administrators to edit existing classes and add new classes. See Step 2 - Manage QoS classes for more details. QoS Classes Table - Column Descriptions Column Description Name The label of the class. The auto-created classes include the target device name and the priority in their names. Device The target device associated with the class. Reserved The bandwidth resource reserved for the class, shown as percentage of the bandwidth allotted for the target device. Limit The maximum bandwidth resource...

http://help.comodo.com/topic-451-1-936-12792-Quality-of-Service.html
Verify Authenticity Of Applications (in Xcitium Cleaning Essentials)

...run if it is digitally signed by a 'Trusted Software publisher'. To prove their software is the genuine article, publishers digitally sign their software using a code signing certificate.If you would like to know more about this process, see Background details later in this section. To check whether an application/program installed in your computer is digitally signed: Select a process in the KillSwitch process list Click 'Tools' > 'Verify File Signature' The 'Verify Signatures' dialog will open: You can check the authenticity of a specific executable or make KillSwitch to scan a folder to identify...

http://help.comodo.com/topic-119-1-328-3561-Verify-Authenticity-of-Applications.html
Create And Manage File Groups (in Xcitium Enterprise)

...run. Xcitium ships with a set of predefined file groups, and allows you to create your own. After creating a group, it becomes available for selection when configuring a Windows profile. Open the 'File Groups' interface Click 'Settings' > 'System Templates' Click the 'File Groups Variables' tab 'Default' groups cannot be edited or deleted. Click the 'File Groups' column header to sort the items in ascending/descending order of their names Click the search icon at the top right and enter the name of the group on part or full to filter or search for a specific file group...

http://help.comodo.com/topic-463-1-1029-15777-Create-and-Manage-File-Groups.html
Protected Files/Folders (in Comodo Cloud Antivirus)

...running inside the sandbox. The protected file/folders area lets you define the paths of the items you wish to protect. To open the “Protected Data Files/Folders ” area Click the 'Settings' icon on the left of the home screen Select 'Sandbox' > 'Protected Files/Folders' The interface displays a list of protected files or folders and their paths. To add a new file/folder Click the 'File' or 'Folder' at the top of the 'Protected Files/Folders' interface Browse to the file or folder you wish to protect Click 'OK' / 'Open': The file/folder will be added to the 'Protected File/Folder' list. Repeat the process...

http://help.comodo.com/topic-394-1-767-11268-Protected-Files-Folders.html
Data Loss Prevention Settings (in Endpoint Manager)

...run immediately on all devices to which the profile is applied. Add a monitoring rule Monitoring rules let you prevent users from copying files to external devices, take screenshots of sensitive information and so on. Click 'Configuration Templates' > 'Profiles' Open the Windows profile you want to configure Click 'Add Profile Section' > 'Data Loss Prevention' Click the ‘Monitoring’ tab: Click ‘Add' Choose monitoring rule - Add an existing monitoring rule to the profile. Start typing the first few letters of a rule name then select from the suggestions Repeat the process to add more rules to the profile. Note...

http://help.comodo.com/topic-399-1-786-15421-Data-Loss-Prevention-Settings.html
LDAP Import Configuration (in Comodo Antispam Gateway)

...button Click 'Account management' > 'LDAP import configuration':   The 'LDAP import configuration' interface will open: Connection Settings Host (IP Address or Name) - Enter the hostname or external IP address of the AD server. If your organization uses the same physical server for AD and mail, then enter the details of the mail server. Port - Enter the port number of the Active Directory server. 389 is the default port for non-SSL connections ('Use SSL To Connect?' box NOT checked) 636 is the default port for SSL connections ('Use SSL To Connect?' box checked) Use SSL To Connect? - Select...

http://help.comodo.com/topic-157-1-288-5721-LDAP-Import-Configuration.html
The Central Management Console (in Comodo Secure Box)

...run applications, URLs and folders inside the secured environment. Refer to the section ' Policies ' for more details. Reports – View the threats detected by Secure Box and report of activities on the endpoints related to secure box such as starting a secured application and more. Refer to the section ' Reports ' for more details. Preferences – Allows administrators to configure the settings for the management console. Refer to the section ' Configuring the Management Console ' for more details. License Information – Allows administrators to view details of current license and add and buy additional licenses. Refer to the section 'License Information ' for more details. User...

http://help.comodo.com/topic-287-1-728-8920-The-Central-Management-Console.html
Monitors (in Xcitium Enterprise)

...run a procedure if its conditions are met. There are two types of monitor: 'Predefined Monitors' - A collection of monitors from Comodo which perform a range of useful monitoring tasks. These can be used in custom profiles, but cannot be edited. 'My Monitors' - Custom monitors that you create. You can configure custom monitors in the 'Monitors' inventory ('Assets' > 'Configuration Templates' > 'Monitors'). See ' Manage Monitors ' for more details. Monitors added to the inventory can be added to a profile. You can add multiple monitors to a single profile. Add a monitor section to a profile Click 'Assets' > 'Configuration...

http://help.comodo.com/topic-463-1-1029-15688-Monitors.html
Manage Firewall Policy Rules (in Comodo Dome Firewall)

...button beside 'Show system rules' displays a list of firewall rules auto generated by the DFW virtual appliance. These rules cannot be modified or removed. Create Policy Firewall rules General Settings - Specify source and destination addresses and the service/protocol of packets to be intercepted by the rule. You can specify the firewall address objects and object groups as source and destination addresses. See Firewall Objects for more details on adding firewall address objects. Web Protection - Enable or disable URL filtering, Advanced Threat Protection (ATP) and SSL Interception. You can also choose pre-configured profiles for them. See Advanced Threat Protection...

http://help.comodo.com/topic-451-1-936-12833-Manage-Firewall-Policy-Rules.html
Pages 83 of 86 « Prev     Next »   Jump to page