Search Results

Showing 841-850 from 1131

IPsec / L2TP Users Configuration (in Comodo Dome Firewall)

... IPsec / L2TP Users Configuration The 'IPsec / L2TP Users' area allows you to add and manage user accounts for end users that connect to the IPsec VPN tunnel. Click 'VPN' >  'IPSec / L2TP Users' to open the 'IPSec / L2TP Users' interface: A list of  existing user accounts will be displayed. The following details are available for each user: IPsec...

http://help.comodo.com/topic-451-1-940-12925-IPsec---L2TP-Users-Configuration.html
Sandbox Settings (in Comodo Internet Security)

...  Sandbox Settings   The Sandbox Settings area allows you to configure the security level and the overall behavior of the sandbox. To access the Sandbox Settings interface, click ‘Defense + Settings’ then select the ‘Sandbox Settings’ tab. If you would like some background information on the sandbox before changing these settings then please see section The Sandbox -An Introduction.  ...

http://help.comodo.com/topic-72-1-284-3038-Sandbox-Settings.html
Run A Program In The Sandbox (in Comodo Internet Security)

... Run a Program in the Sandbox    Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. Adding a program in this way means that it will run...

http://help.comodo.com/topic-72-1-284-2981-Run-a-Program-in-the-Sandbox.html
Internet Content Adaptation Protocol (in Comodo Dome Firewall)

... Internet Content Adaptation Protocol   The Internet Content Adaptation Protocol (ICAP) allows services to adapt, filter and translate content over the internet. For example, you can prevent data exfiltration from your network by entering the IP and ICAP port of a server running Comodo Dome Data Protection or Comodo Dome Secure Web Gateway services. To open the 'ICAP Services' screen...

http://help.comodo.com/topic-451-1-936-12791-Internet-Content-Adaptation-Protocol.html
Configure L2TP Server (in Comodo Dome Firewall)

... Configure L2TP Server Click 'VPN' > 'L2TP' in the left-hand menu to open the L2TP server interface Comodo DFW allows remote clients using Layer 2 Tunneling Protocol (L2TP) to connect to IPsec VPN tunnel. You need to enable L2TP server in the appliance in order to allow L2TP clients Enabled - Select to enable the L2TP service Zone - Choose the...

http://help.comodo.com/topic-451-1-936-12802-Configure-L2TP-Server.html
SNMP Settings (in Comodo Dome Firewall)

... SNMP Settings   Simple Network Management Protocol (SNMP) is the standard way of monitoring software and hardware to collect performance metrics and then display this statistics in the dashboard. SNMP is enabled by default and you can only view the settings. To view SNMP settings Click 'System' > 'SNMP' from the left hand side navigation. The settings are non editable...

http://help.comodo.com/topic-451-1-936-12770-SNMP-Settings.html
View Logs (in Comodo Dome Firewall)

... View Logs   The 'Logs' module shows events that are currently taking place across all modules, allowing you to troubleshoot problems and monitor activities in real time. Logs can be filtered according to date, keyword or module. You can also export logs from selected modules to generate reports in .csv format. Click 'Logs' on the left-menu See the following...

http://help.comodo.com/topic-451-1-936-12765-View-Logs.html
Containment Configuration (in Comodo Internet Security)

... Containment Configuration   Click 'Settings' > 'Containment' to open the section If CIS encounters a file that has a trust rating of 'Unknown' then you have the option to automatically run that file in the container. The container is a secure, virtual environment where unknown files can run, but cannot affect the rest of your computer. Files in the container...

http://help.comodo.com/topic-72-1-766-9168-Containment-Configuration.html
HIPS Rule Sets (in Xcitium Enterprise)

... HIPS Rule Sets Click 'Settings' > 'HIPS' > 'Rulesets' A ruleset is a collection of access rights and protection settings that can be applied to applications on your computer. Each ruleset consists of a number of rules, and each of these rules is defined by a set of conditions and parameters. Rulesets govern an application's rights to access memory...

http://help.comodo.com/topic-463-1-1033-15932-HIPS-Rule-Sets.html
Protected Files (in Advanced Endpoint Protection)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-467-1-1050-16667-Protected-Files.html
Pages 85 of 114 « Prev     Next »   Jump to page