Showing 1021-1030 from 1131
... Website Filtering Logs Click 'Logs' in the XCS menu bar Select 'Website Filtering Events' from the drop-down at upper-left Website filter logs are a record of all sites blocked (or allowed) by XCS. The logs record all attempts made by users to access blocked or allowed websites. Background Note : You can create filtering rules for specific users...
http://help.comodo.com/topic-463-1-1033-15907-Website-Filtering-Logs.html... Manage My Configurations Comodo Internet Security allows you to maintain, save and export multiple configurations of your security settings. This is especially useful if you are a network administrator looking to roll out a standard security configuration across multiple computers. If you are upgrading your system and there is a need to uninstall and re-install Comodo Internet Security...
http://help.comodo.com/topic-72-1-284-2984-Manage-My-Configurations.html... 'Alerts Displayed ' Logs Alert logs are a history of security alerts shown to users when a threat was detected. The action taken depends on how the user responded to the alert. Date - The time the alert was shown. Type - The alert category. Categories include antivirus alerts and execution alerts. Note - execution alert are coming in later versions of CCS...
http://help.comodo.com/topic-399-1-924-12525-Alerts-Displayed-Logs.html... Website Filtering Logs Click 'Logs' in the CCS menu bar Select 'Website Filtering Events' from the drop-down at upper-left Website filter logs are a record of all sites blocked (or allowed) by CCS. The logs record all attempts made by users to access blocked or allowed websites. Background Note : You can create filtering rules for specific users...
http://help.comodo.com/topic-399-1-904-11830-Website-Filtering-Logs.html... Comodo Internet Security - System Requirements To ensure optimal performance of Comodo Internet Security , please ensure that your PC complies with the minimum system requirements as stated below: Windows 8 - CIS v.5.12 and above (Both 32-bit and 64-bit versions) Windows 7 (Both 32-bit and 64-bit versions) Windows Vista (Both 32-bit and 64-bit versions) Windows...
http://help.comodo.com/topic-72-1-284-2954-System-Requirements.html... Key Features Host Intrusion Prevention System Virtually Bulletproof protection against root-kits, inter-process memory injections, key-loggers and more; Monitors the activities of all applications and processes on your server and allows executables and processes to run if they comply with the prevailing security rules; Blocks the activities of malicious programs by halting any action that could cause damage...
http://help.comodo.com/topic-213-1-517-5966-Key-Features.html... Introduction to Comodo Antivirus for Servers Overview Comodo Antivirus for Servers offers 360° protection against internal and external threats by combining a powerful antivirus and an advanced host intrusion prevention system called Defense+. When used individually, each of the Antivirus and Defense+ components delivers superior protection against their specific threat challenge. When used together as a full suite they provide...
http://help.comodo.com/topic-213-1-517-5965-Introduction-to-Comodo-Antivirus-for-Servers.html... Run a Scan and View Results Open the SOCaaP Web Protection dashboard Select a website from the menu at top-left Click the 'Scan' tab then 'Server Side Scan’ > 'Overview' Note - Make sure you have uploaded the scanner file to the site. See Malware Scan Settings if you haven't yet done this. The overview page shows details...
http://help.comodo.com/topic-466-1-1040-1150025-Run-a-Scan-and-View-Results.html... Block any Downloads of a Specific File Type Comodo Internet Security can be configured to block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could...
http://help.comodo.com/topic-72-1-623-7665-Block-Any-Downloads-of-a-Specific-File-Type.html... VirusScope Logs Click 'Logs' in the CCS menu bar Select 'VirusScope Events' from the drop-down at upper-left Date & Time - When the event occurred. Location – The installation path of the suspicious application Malware Name – The malicious item that was detected. Action - How VirusScope handled the malware. Reverse - VirusScope attempted to undo...
http://help.comodo.com/topic-467-1-1050-16638-VirusScope-Logs.html