Find answers in our Knowledge Base
Security & Privacy
8
About Two-Factor AuthenticationTwo-Factor Authentication (2FA) is a security process in which two different authentication factors must be provided to verify your identity. It helps protect your Comm100 account from unauthorized access by adding a secon...
IntroductionComm100 offers multiple security measures to help protect your data and prevent unauthorized access. One of these features is the IP allowlist, which restricts account access to a predefined set of trusted IP addresses.When IP allowlist is e...
The Comm100 platform involves a series of domains. To optimize the connectivity between your network and the Comm100 platform and its services, make sure you allow the relevant domains in your firewall settings. Moreover, if you have implemented a Conte...
The Audit Log records agent activities across your Comm100 site. It tracks important actions performed in different Comm100 modules, helping administrators monitor system usage, troubleshoot issues, and maintain security compliance.Note: The Audit Log i...
This vulnerability incident has limited scope to Agent Console Windows Desktop App users who used Comm100 Agent Console Windows Desktop App with version 10.0.8 from 11 PM PT, Sep 27th, 2022 to 8 AM PT, Sep 29th, 2022.This incident has a Trojan infection...
To enhance account security, Comm100 provides the Password Policy feature which allows you to set up password strength rules that all your Comm100 accounts must conform to. By default, the Password Policy feature is enabled with a set of predefined pass...
To provide secure and stable services, as "Data Processor", Comm100 uses services provided by third parties, like Data Center, IaaS, DDoS protection, AI engine, etc. These third parties (AWS, Google Dialogflow, etc.) are used to host the applications an...
IntroductionComm100's AI Automation features use large language models to generate answers , provide suggestions or analyze data. When you use Comm100 AI Agent, AI Copilot, or AI Insights, your data security is uncompromised. This article introduces ho...