Search Results

Showing 841-850 from 1132

IPsec / L2TP Users Configuration (in Comodo Dome Firewall)

... IPsec / L2TP Users Configuration The 'IPsec / L2TP Users' area allows you to add and manage user accounts for end users that connect to the IPsec VPN tunnel. Click 'VPN' >  'IPSec / L2TP Users' to open the 'IPSec / L2TP Users' interface: A list of  existing user accounts will be displayed. The following details are available for each user: IPsec...

http://help.comodo.com/topic-451-1-940-12925-IPsec---L2TP-Users-Configuration.html
File Rating Settings (in Xcitium Enterprise)

... File Rating Settings   Click 'Settings' > 'File Rating' > 'File Rating Settings' A file rating determines how XCS interacts with a file: 'Trusted' files are safe to run. 'Untrusted' files are malware so they get quarantined or deleted. 'Unknown' files are run in the container until they get rated as trusted or untrusted. The rating of a file can...

http://help.comodo.com/topic-463-1-1033-15939-File-Rating-Settings.html
Configure L2TP Server (in Comodo Dome Firewall)

... Configure L2TP Server Click 'VPN' > 'L2TP' in the left-hand menu to open the L2TP server interface Comodo DFW allows remote clients using Layer 2 Tunneling Protocol (L2TP) to connect to IPsec VPN tunnel. You need to enable L2TP server in the appliance in order to allow L2TP clients Enabled - Select to enable the L2TP service Zone - Choose the...

http://help.comodo.com/topic-451-1-936-12802-Configure-L2TP-Server.html
Run A Program In The Sandbox (in Comodo Internet Security)

... Run a Program in the Sandbox    Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. Adding a program in this way means that it will run...

http://help.comodo.com/topic-72-1-284-2981-Run-a-Program-in-the-Sandbox.html
Sandbox Settings (in Comodo Internet Security)

...  Sandbox Settings   The Sandbox Settings area allows you to configure the security level and the overall behavior of the sandbox. To access the Sandbox Settings interface, click ‘Defense + Settings’ then select the ‘Sandbox Settings’ tab. If you would like some background information on the sandbox before changing these settings then please see section The Sandbox -An Introduction.  ...

http://help.comodo.com/topic-72-1-284-3038-Sandbox-Settings.html
Internet Content Adaptation Protocol (in Comodo Dome Firewall)

... Internet Content Adaptation Protocol   The Internet Content Adaptation Protocol (ICAP) allows services to adapt, filter and translate content over the internet. For example, you can prevent data exfiltration from your network by entering the IP and ICAP port of a server running Comodo Dome Data Protection or Comodo Dome Secure Web Gateway services. To open the 'ICAP Services' screen...

http://help.comodo.com/topic-451-1-936-12791-Internet-Content-Adaptation-Protocol.html
Containment Configuration (in Comodo Internet Security)

... Containment Configuration   Click 'Settings' > 'Containment' to open the section If CIS encounters a file that has a trust rating of 'Unknown' then you have the option to automatically run that file in the container. The container is a secure, virtual environment where unknown files can run, but cannot affect the rest of your computer. Files in the container...

http://help.comodo.com/topic-72-1-766-9168-Containment-Configuration.html
Run Untrusted Programs In The Container (in Comodo Internet Security)

... Run Untrusted Programs in the Container   Click 'Tasks' > 'Containment Tasks' > 'Run Virtual' Choose the program you want to run  Click 'Open' CIS lets you run programs inside the container on a 'one-off' basis. This is helpful to test new/beta programs you have downloaded but are not yet sure you trust. You can also create a...

http://help.comodo.com/topic-72-1-838-10607-Run-Untrusted-Programs-in-the-Container.html
Blocked Files (in Xcitium Enterprise)

... Blocked Files XCS allows you to lock-down files and folders by denying all access rights to them from other processes or users - effectively cutting them off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files in 'Protected Files', users cannot...

http://help.comodo.com/topic-463-1-1033-15979-Blocked-Files.html
Protected Files (in Xcitium Enterprise)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-463-1-1033-15978-Protected-Files.html
Pages 85 of 114 « Prev     Next »   Jump to page