Search Results

Showing 1001-1010 from 1131

General Settings (in Comodo Antivirus for Servers)

... General Settings The 'General Settings' area enables you to customize the appearance and overall behavior of CAVS. You can configure general properties like the interface language, notification messages, automatic updates, logging and more. The category has the following sections: User Interface Updates Logging Configuration ...

http://help.comodo.com/topic-213-1-517-6008-General-Settings.html
Website Categories (in Advanced Endpoint Protection)

... Website Categories   The categories tab shows all built-in and user-defined web categories. Categories contain a list of 'Websites' which can be allowed or blocked in a rule. A 'Website' can be a URL or a simple phrase / term. You can use wildcard characters ( * ) with both URLs and terms.   Open the website filtering categories section Click 'Settings...

http://help.comodo.com/topic-467-1-1050-16701-Website-Categories.html
Containment - An Overview (in Xcitium Enterprise)

... Containment - An Overview The container is an isolated operating environment for unknown and untrusted applications. Running an application in the container means that it cannot make changes to other processes, programs or data on your local computer. Applications in the container are executed under a carefully selected set of privileges and write to a virtual file system and registry instead...

http://help.comodo.com/topic-463-1-1033-15937-Containment---An-Overview.html
Browse The Internet And Run Untrusted Programs Inside The Sandbox (in Comodo Cloud Antivirus)

... Browse the Internet and run Untrusted Programs inside the Sandbox CCAV allows you to browse the internet and run untrusted programs inside a 100% virtual environment. Programs running inside this virtual environment are isolated from the rest of your computer and so cannot infect it. For example, if you inadvertently download malware from the internet while browsing in the virtual...

http://help.comodo.com/topic-394-1-941-12982-Browse-the-Internet-and-run-Untrusted-Programs-inside-the-Sandbox.html
Device Control Logs (in Comodo Internet Security)

... Device Control Logs   Click 'Tasks' > 'Advanced Tasks' > 'View Logs' OR Click ‘Logs’ in advanced view of the CIS home screen Select 'Device Control Events' from the drop-down at upper-left Device control logs record events related to external devices. External devices include USB, optical, and storage drives plugged into your computer. Events logged include: Files copied...

http://help.comodo.com/topic-72-1-766-15372-Device-Control-Logs.html
Defense+ Settings (in Comodo Internet Security)

... Defense+ Settings   Defense+ is a collective term that covers the Host Intrusion Protection (HIPS), Sandboxing and Viruscope components of Comodo Internet Security. Together, these technologies ensure all applications, processes and services on your PC behave in a secure manner – and are prevented from taking actions that could damage your computer or your data. The Defense+ settings area allows you...

http://help.comodo.com/topic-72-1-623-7723-Defense+-Settings.html
Containment Tasks - Introduction (in Advanced Endpoint Protection)

... Containment Tasks - Introduction Click 'Tasks' > 'Containment Tasks' The container is a secure, virtual environment in which you can run unknown, untrusted, and suspicious applications Applications in the container are isolated from the rest of your computer. They are denied access to other processes, write to a virtual file system and registry, and cannot access your personal data This makes...

http://help.comodo.com/topic-467-1-1050-16594-Containment-Tasks---Introduction.html
Run A Scan And View Results (in Xcitium SIEM)

... Run a Scan and View Results   Open the cWatch dashboard Select a website from the menu at top-left Click the 'Scan' tab then 'Server Side Scan’ > 'Overview' Note - Make sure you have uploaded the scanner file to the site. See Malware Scan Settings if you haven't yet done this. The overview page shows details about any...

http://help.comodo.com/topic-285-1-848-13907-Run-a-Scan-and-View-Results.html
HIPS Logs (in Comodo Internet Security)

... HIPS Logs   Click 'Tasks' > 'Advanced Tasks' > 'View Logs' OR Click ‘Logs’ in advanced view of the CIS home screen Select 'HIPS Events' from the drop-down at upper-left Host intrusion prevention (HIPS) events are generated for various security reasons. These include changes in HIPS settings, when an application attempts to access restricted areas, or when an...

http://help.comodo.com/topic-72-1-766-9121-HIPS-Logs.html
Defense+ Logs (in Comodo Internet Security)

... Defense+ Logs Comodo Internet Security records a history of all actions taken by Defense+.  Defense+ 'Events' are generated and recorded for various reasons. Examples include changes in HIPS settings, when an application is auto-sandboxed by Behavior Blocker, when an application or process attempts to access restricted areas or when an action occurs that contravenes your HIPS Rulesets . The...

http://help.comodo.com/topic-72-1-623-7697-Defense+-Logs.html
Pages 101 of 114 « Prev     Next »   Jump to page