Find answers in our Knowledge Base
Security & Privacy
8
About Two-Factor AuthenticationTwo-Factor Authentication (2FA) is a security process in which two different authentication factors must be provided to verify your identity. It helps protect your Comm100 account from unauthorized access by adding a secon...
IntroductionComm100 provides a series of measures to ensure information security. With IP allowlist, you can protect your system against unauthorized use by restricting agents’ access to a set of trusted IPs. When enabled, your Comm100 account only acce...
The Comm100 platform involves a series of domains. To optimize the connectivity between your network and the Comm100 platform and its services, make sure you allow the relevant domains in your firewall settings. Moreover, if you have implemented a Conte...
This vulnerability incident has limited scope to Agent Console Windows Desktop App users who used Comm100 Agent Console Windows Desktop App with version 10.0.8 from 11 PM PT, Sep 27th, 2022 to 8 AM PT, Sep 29th, 2022.This incident has a Trojan infection...
To provide secure and stable services, as "Data Processor", Comm100 uses services provided by third parties, like Data Center, IaaS, DDoS protection, AI engine, etc. These third parties (AWS, Google Dialogflow, etc.) are used to host the applications an...
An Audit Log is a log of agent activities. It records all important performed actions in your Comm100 modules.Step by Step InstructionsLog in toComm100 Control Panel.From the left navigation menu, go toGlobal SettingsSecurityAudit Log.Adjust the time ra...
To enhance account security, Comm100 provides the Password Policy feature which allows you to set up password strength rules that all your Comm100 accounts must conform to. By default, the Password Policy feature is enabled with a set of predefined pass...
IntroductionComm100's generative AI features uses large language models to generate answers or suggestion. When you use Comm100 Chatbot or Agent Assist to generate answers or suggestions, your data security is uncompromised. This article introduces how ...