Showing 1001-1010 from 1132
... Defense+ Logs Comodo Internet Security records a history of all actions taken by Defense+. Defense+ 'Events' are generated and recorded for various reasons. Examples include changes in HIPS settings, when an application is auto-sandboxed by Behavior Blocker, when an application or process attempts to access restricted areas or when an action occurs that contravenes your HIPS Rulesets . The...
http://help.comodo.com/topic-72-1-623-7697-Defense+-Logs.html... 'Alerts Displayed' Logs Click 'More' > 'Preferences' > 'View Antivirus Events' > 'More' > 'Alerts Displayed' These logs show a user's response to a threat alert The action taken on the threat depends on how the user responded to the alert. 'Alerts Displayed' Logs - Column Descriptions Column Header Descriptions Date The time the alert was shown...
http://help.comodo.com/topic-399-1-925-12617-Alerts-Displayed-Logs.html... Filter Device Control Logs You can create custom views of all logged events according to the following criteria: Name - Show events that involve specific devices Identifier - Show events that involve devices with a specifc ID code State - Filter events by whether the connection attempt was successful or not Configure event filters Open Comodo Client Security Click 'More' > 'View Antivirus...
http://help.comodo.com/topic-399-1-925-14663-Filter-Device-Control-Logs.html... Defense+ Settings Defense+ is a collective term that covers the Host Intrusion Protection (HIPS), Sandboxing and Viruscope components of Comodo Internet Security. Together, these technologies ensure all applications, processes and services on your PC behave in a secure manner – and are prevented from taking actions that could damage your computer or your data. The Defense+ settings area allows you...
http://help.comodo.com/topic-72-1-623-7723-Defense+-Settings.html... Open Shared Space Click 'Tasks' > 'Containment Tasks' > 'Open Shared Space'. Applications in the container are not allowed to write to your local drive for security reasons. Instead, they write all data, and save all files, to a special folder called 'Shared Space'. Files in shared space can also be accessed by non-contained applications (those running as...
http://help.comodo.com/topic-467-1-1050-16600-Open-Shared-Space.html... Configuring Rules for Auto-Containment The 'Auto-Containment' interface allows you to add and define rules for programs that should be run in the contained environment. A contained application has much less opportunity to damage your computer because it is run isolated from your operating system and your files. This allows you to safely run applications that you are...
http://help.comodo.com/topic-399-1-790-10386-Configuring-Rules-for-Auto-Containment.html... Auto-Containment Rules Click 'Settings' > 'Containment' > 'Auto-Containment'. Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal data. CCS...
http://help.comodo.com/topic-399-1-904-11890-Auto-Containment-Rules.html... 'Alerts Displayed' Logs Click 'More' > 'Preferences' > 'View Antivirus Events' > 'More' > 'Alerts Displayed' These logs show a user's response to a threat alert The action taken on the threat depends on how the user responded to the alert. 'Alerts Displayed' Logs - Column Descriptions Column Header Descriptions Date The time the alert was shown. Type...
http://help.comodo.com/topic-463-1-1037-16111-Alerts-Displayed-Logs.html... Blocked Files Defense+ allows you to lock-down files and folders by completely denying all access rights to them from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files that are placed...
http://help.comodo.com/topic-72-1-284-3030-Blocked-Files.html... VirusScope Logs Click 'Logs' in the XCS menu bar Select 'VirusScope Events' from the drop-down at upper-left Date & Time - When the event occurred. Location – The installation path of the suspicious application Malware Name – The malicious item that was detected. Action - How VirusScope handled the malware. Reverse - VirusScope attempted to undo any changes made by the malicious...
http://help.comodo.com/topic-463-1-1033-15903-VirusScope-Logs.html