Showing 841-850 from 1132
... IPsec / L2TP Users Configuration The 'IPsec / L2TP Users' area allows you to add and manage user accounts for end users that connect to the IPsec VPN tunnel. Click 'VPN' > 'IPSec / L2TP Users' to open the 'IPSec / L2TP Users' interface: A list of existing user accounts will be displayed. The following details are available for each user: IPsec...
http://help.comodo.com/topic-451-1-940-12925-IPsec---L2TP-Users-Configuration.html... File Rating Settings Click 'Settings' > 'File Rating' > 'File Rating Settings' A file rating determines how XCS interacts with a file: 'Trusted' files are safe to run. 'Untrusted' files are malware so they get quarantined or deleted. 'Unknown' files are run in the container until they get rated as trusted or untrusted. The rating of a file can...
http://help.comodo.com/topic-463-1-1033-15939-File-Rating-Settings.html... Configure L2TP Server Click 'VPN' > 'L2TP' in the left-hand menu to open the L2TP server interface Comodo DFW allows remote clients using Layer 2 Tunneling Protocol (L2TP) to connect to IPsec VPN tunnel. You need to enable L2TP server in the appliance in order to allow L2TP clients Enabled - Select to enable the L2TP service Zone - Choose the...
http://help.comodo.com/topic-451-1-936-12802-Configure-L2TP-Server.html... Run a Program in the Sandbox Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. Adding a program in this way means that it will run...
http://help.comodo.com/topic-72-1-284-2981-Run-a-Program-in-the-Sandbox.html... Sandbox Settings The Sandbox Settings area allows you to configure the security level and the overall behavior of the sandbox. To access the Sandbox Settings interface, click ‘Defense + Settings’ then select the ‘Sandbox Settings’ tab. If you would like some background information on the sandbox before changing these settings then please see section The Sandbox -An Introduction. ...
http://help.comodo.com/topic-72-1-284-3038-Sandbox-Settings.html... Internet Content Adaptation Protocol The Internet Content Adaptation Protocol (ICAP) allows services to adapt, filter and translate content over the internet. For example, you can prevent data exfiltration from your network by entering the IP and ICAP port of a server running Comodo Dome Data Protection or Comodo Dome Secure Web Gateway services. To open the 'ICAP Services' screen...
http://help.comodo.com/topic-451-1-936-12791-Internet-Content-Adaptation-Protocol.html... Containment Configuration Click 'Settings' > 'Containment' to open the section If CIS encounters a file that has a trust rating of 'Unknown' then you have the option to automatically run that file in the container. The container is a secure, virtual environment where unknown files can run, but cannot affect the rest of your computer. Files in the container...
http://help.comodo.com/topic-72-1-766-9168-Containment-Configuration.html... Run Untrusted Programs in the Container Click 'Tasks' > 'Containment Tasks' > 'Run Virtual' Choose the program you want to run Click 'Open' CIS lets you run programs inside the container on a 'one-off' basis. This is helpful to test new/beta programs you have downloaded but are not yet sure you trust. You can also create a...
http://help.comodo.com/topic-72-1-838-10607-Run-Untrusted-Programs-in-the-Container.html... Blocked Files XCS allows you to lock-down files and folders by denying all access rights to them from other processes or users - effectively cutting them off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files in 'Protected Files', users cannot...
http://help.comodo.com/topic-463-1-1033-15979-Blocked-Files.html... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...
http://help.comodo.com/topic-463-1-1033-15978-Protected-Files.html