Showing 841-850 from 1131
... IPsec / L2TP Users Configuration The 'IPsec / L2TP Users' area allows you to add and manage user accounts for end users that connect to the IPsec VPN tunnel. Click 'VPN' > 'IPSec / L2TP Users' to open the 'IPSec / L2TP Users' interface: A list of existing user accounts will be displayed. The following details are available for each user: IPsec...
http://help.comodo.com/topic-451-1-940-12925-IPsec---L2TP-Users-Configuration.html... Sandbox Settings The Sandbox Settings area allows you to configure the security level and the overall behavior of the sandbox. To access the Sandbox Settings interface, click ‘Defense + Settings’ then select the ‘Sandbox Settings’ tab. If you would like some background information on the sandbox before changing these settings then please see section The Sandbox -An Introduction. ...
http://help.comodo.com/topic-72-1-284-3038-Sandbox-Settings.html... Run a Program in the Sandbox Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. Adding a program in this way means that it will run...
http://help.comodo.com/topic-72-1-284-2981-Run-a-Program-in-the-Sandbox.html... Internet Content Adaptation Protocol The Internet Content Adaptation Protocol (ICAP) allows services to adapt, filter and translate content over the internet. For example, you can prevent data exfiltration from your network by entering the IP and ICAP port of a server running Comodo Dome Data Protection or Comodo Dome Secure Web Gateway services. To open the 'ICAP Services' screen...
http://help.comodo.com/topic-451-1-936-12791-Internet-Content-Adaptation-Protocol.html... Configure L2TP Server Click 'VPN' > 'L2TP' in the left-hand menu to open the L2TP server interface Comodo DFW allows remote clients using Layer 2 Tunneling Protocol (L2TP) to connect to IPsec VPN tunnel. You need to enable L2TP server in the appliance in order to allow L2TP clients Enabled - Select to enable the L2TP service Zone - Choose the...
http://help.comodo.com/topic-451-1-936-12802-Configure-L2TP-Server.html... SNMP Settings Simple Network Management Protocol (SNMP) is the standard way of monitoring software and hardware to collect performance metrics and then display this statistics in the dashboard. SNMP is enabled by default and you can only view the settings. To view SNMP settings Click 'System' > 'SNMP' from the left hand side navigation. The settings are non editable...
http://help.comodo.com/topic-451-1-936-12770-SNMP-Settings.html... View Logs The 'Logs' module shows events that are currently taking place across all modules, allowing you to troubleshoot problems and monitor activities in real time. Logs can be filtered according to date, keyword or module. You can also export logs from selected modules to generate reports in .csv format. Click 'Logs' on the left-menu See the following...
http://help.comodo.com/topic-451-1-936-12765-View-Logs.html... Containment Configuration Click 'Settings' > 'Containment' to open the section If CIS encounters a file that has a trust rating of 'Unknown' then you have the option to automatically run that file in the container. The container is a secure, virtual environment where unknown files can run, but cannot affect the rest of your computer. Files in the container...
http://help.comodo.com/topic-72-1-766-9168-Containment-Configuration.html... HIPS Rule Sets Click 'Settings' > 'HIPS' > 'Rulesets' A ruleset is a collection of access rights and protection settings that can be applied to applications on your computer. Each ruleset consists of a number of rules, and each of these rules is defined by a set of conditions and parameters. Rulesets govern an application's rights to access memory...
http://help.comodo.com/topic-463-1-1033-15932-HIPS-Rule-Sets.html... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...
http://help.comodo.com/topic-467-1-1050-16667-Protected-Files.html