ITSM

Comodo One. Understanding Devices in ITSM

Comodo One. Understanding Devices in ITSM How to implement “Bulk to installation package” in devices How to install custom MSI packages How to check all malicious files from a device How to check all unrecognized files from a device How…

ITSM

Comodo One. Understanding Windows Profiles in ITSM

Comodo One. Understanding Windows Profiles in ITSM How to hide/show security client and communication client tray icons in devices How to define a list of device classes that should be blocked on endpoints How to configure baseline settings How to…

Configuring device

Comodo One. Configuring profiles in ITSM

Comodo One. Configuring profiles in ITSM How to make a profile as default How to reuse a default profile How to make a profile as default? Step 1: Go to ITSM >’Configuration Templates’ > ‘Profiles’. You can view existing profiles…

service desk

Comodo One. Understanding Service Desk

Comodo One. Understanding Service Desk How to add a user in staff panel How to create and use canned responses How to create FAQs and publish How to create FAQ category How to make FAQs internal How to check ‘Alerts…

Alan turning

Alan Turing, undecidable problems, and malware

In 2003, Oxford University Philosophy Professor Nick Bostrom posed the following question: what if an artificial intelligence (AI) machine were given just one task: to create as many paper clips as possible? If you think about it, this AI machine…

Network security

The Importance of Prevention in Network Security

The adage ‘Prevention is better than cure’ holds true for all aspects of life and human activity. Thus, prevention is of great importance as regards network security as well. We do have the know-how today to set things right, as…