Comodo Help
Find the desired product help
Comodo Dome Firewall

Comodo Dome Firewall

Dome Firewall Central Manager Admin Guide

English

Print Help Download Help
Manage Advanced Threat Protection Profiles
  • Introduction To Dome Firewall Central Manager
    • Sign-up For Firewall Central Manager
    • Setup Dome Firewall Central Manager
    • Integrate Central Manager With Comodo One / Comodo Dragon / ITarian
    • Login To The Admin Console
    • Change Password
    • Add Organizations
    • Enroll Dome Firewall Devices
  • The Main Interface
  • The Dashboard
    • View Details Of A Firewall Device
    • Quick Actions On A Firewall Device
      • Backup/Restore A Firewall Device
      • Configure SSH Access For A Firewall Device
      • Network Configuration
    • Access Admin Console Of A Firewall Device
  • Manage System Status And General Configuration
    • Update Firmware Version
    • View And Upgrade Central Manager License
    • View Management Tasks
  • Customer Management
    • Manage Organizations
    • Activate Firewall Licenses
  • Approve Firewall Device Enrollment
  • Add Interfaces
  • Firewall Management
    • Configure Firewall Policy Rules
    • Manage Firewall Address Objects
    • Manage Firewall Object Groups
    • Configure Destination Network Address Translation Rules
    • Configure Source Network Address Translation Rules
    • Configure System Access Rules
  • Configure Virtual Private Network Settings
    • Configure IPSec/L2TP Users
    • IPSec Configuration
    • Configure L2TP Server
  • Manage Advanced Threat Protection Profiles
  • Manage URL And Content Filtering Profiles
  • Intrusion Prevention
    • Configure The Intrusion Prevention System
    • Manage IPS Rulesets
    • Manage Application Identification Rulesets
  • About Comodo Security Solutions

Manage Advanced Threat Protection Profiles

 

  • Click 'Advanced Threat Protection' on the left to open this interface.
  • Advanced Threat Protection (ATP) safeguards networks against malware, hack attempts, data breaches and other attacks.
  • ATP scans internet downloads and email attachments with a combination of antivirus scans, behavior analysis and blacklist checks.
  • This interface lets you configure ATP profiles for organizations and devices.
  • You can then select these profiles when creating firewall rules for organizations and devices.

ATP uses the following techniques to analyze files:

  • Comodo Antivirus - Continuously updated antivirus scanner which provides dependable protection against known malicious files.
  • Comodo Valkyrie - A cloud based behavior analysis service which improves detection of zero-day threats by rigorously testing the run-time actions of unknown files.

The antivirus and Valkyrie tests provide a trust verdict for each file. There are three possible verdicts:

  • Safe – Trusted files. These are allowed to run on the endpoint.
  • Threats – Malicious files. These are automatically blocked and a warning shown on the endpoint.
  • Unknown - Files that could not be identified as safe or threatening are classified as 'Unknown'. Users are not allowed to download these files directly. Instead, they are are wrapped in Comodo's containment technology and forwarded to the endpoint. When executed, the file runs in a secure virtual environment and is not allowed to access other processes or user data.


The ATP Profile

  • Click 'Advanced Threat Protection' on the left to open the interface.




The ATP profile defines types of scan applied to files downloaded by end-users. You can also choose whether or not to apply containment to unknown files.


By default, a profile with Valkyrie analysis is available. You can configure whether or not auto-containment is also enabled on the profile.


To configure an ATP profile for an organization or device

  • Click 'Advanced Threat Protection' on the left.
  • Select a target organization/device by clicking the link in the gray bar.
  • Organization – applies the profile to all devices in the organization
  • Device – applies the profile to an individual device



This opens the ATP profile for the target org/device:


  • Use the switch beside 'Containment' to enable or disable the auto-containment of unknown files at the endpoints.
  • Click 'Apply'

The profile can be applied for web protection settings when configuring firewall policies. See the explanation of Web Protection in the section Configure Firewall Policy Rules for more details.

Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.