Showing 1011-1020 from 1132
... HIPS Configuration Click 'Settings' > 'HIPS' The host intrusion protection system (HIPS) constantly monitors system activity and stops processes from modifying important files and interfaces. Comodo Client Security ships with a default HIPS ruleset that works 'out of the box' - providing extremely high levels of protection. For example, HIPS automatically protects system-critical files, folders and registry keys to prevent...
http://help.comodo.com/topic-467-1-1050-16658-HIPS-Configuration.html... Containment Tasks - Introduction Click 'Tasks' > 'Containment Tasks' The container is a secure, virtual environment in which you can run unknown, untrusted, and suspicious applications. Applications in the container are isolated from the rest of your computer. They are denied access to other processes, write to a virtual file system and registry, and cannot access your personal data...
http://help.comodo.com/topic-72-1-766-9027-Containment-Tasks---Introduction.html... Viruscope Logs Events are created whenever the Viruscope module detects, blocks or reverses a suspicious activity. Viruscope logs can be viewed by selecting 'Viruscope Events' from the drop-down at the top of the log viewer interface. Column Descriptions Date - Indicates the date of the event. Location – Indicates where the suspicious executable is stored. Malware Name - Name of the...
http://help.comodo.com/topic-72-1-623-7951-Viruscope-Logs.html... Run Browsers inside the Virtual Desktop Click 'Tasks' > 'Containment Tasks' > 'Run Virtual Desktop' Click the 'Start Virtual Desktop Session' button. The virtual desktop provides an extremely secure environment for internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install malware, rootkits and spyware on your computer...
http://help.comodo.com/topic-467-1-1050-16606-Run-Browsers-inside-the-Virtual-Desktop.html... 'Alerts Displayed ' Logs Click 'More' on the 'CAV' home screen Click 'View Logs' in the 'More' interface Click ' Other Logs' > 'Alerts Displayed' link in 'Log Viewer' interface CAV maintains a history of pop-up security alerts generated by its Antivirus components and the actions taken against the threats discovered, depending on the response to the alerts by the...
http://help.comodo.com/topic-155-1-282-8720-Alerts-Displayed-Logs.html... Customize User Interface Click 'Settings' > 'General Settings' > 'User Interface'. The user interface tab lets you choose your preferred language, and customize the look and feel of the application. Language Settings - Comodo Client Security is available in many different languages. Switch languages by clicking the 'Language' drop-down menu. ( Default = English (United States) ) Show...
http://help.comodo.com/topic-467-1-1050-16631-Customize-User-Interface.html... Block any Downloads of a Specific File Type This page explains how to configure CCS to prohibit downloads of specific types of file. Example scenarios: Some malicious websites try to push malware in .exe file format. These files, known as executables, can run commands on your computer. If the .exe is malicious then these commands could install a virus...
http://help.comodo.com/topic-399-1-904-11806-Block-Any-Downloads-of-a-Specific-File-Type.html... Manual Configuration Manual configuration means downloading the agent file then copying it to your site. You need to place the file in a publicly accessible location so we can authenticate it and start the scans. Open the SOCaaP Web Protection dashboard Select the target website from the menu at top-left Click the 'Scan' tab then 'Server Side Scan' >...
http://help.comodo.com/topic-466-1-1040-1250025-Manual-Configuration.html... Blocking any Downloads of a Specific File Type Comodo Internet Security can be configured to block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could...
http://help.comodo.com/topic-72-1-451-4811-Blocking-Any-Downloads-of-a-Specific-File-Type.html... HIPS Logs Click 'Logs' in the CCS menu bar Select 'HIPS Events' from the drop-down at upper-left Host intrusion prevention (HIPS) events are generated for various security reasons. These include changes in HIPS settings, when an application attempts to access restricted areas, or when an action contravenes your HIPS Rulesets. Date & Time - When the event occurred...
http://help.comodo.com/topic-399-1-904-11828-HIPS-Logs.html