Showing 1051-1060 from 1132
... HIPS Configuration Click 'Settings' > 'HIPS' The host intrusion protection system (HIPS) constantly monitors system activity and stops processes from modifying important files and interfaces. Comodo Client Security ships with a default HIPS ruleset that works 'out of the box' - providing extremely high levels of protection. For example, HIPS automatically protects system-critical files, folders and registry keys to prevent...
http://help.comodo.com/topic-399-1-904-11774-HIPS-Configuration.html... Containment - An Overview The container is an isolated operating environment for unknown and untrusted applications. Running an application in the container means that it cannot make changes to other processes, programs or data on your local computer. Applications in the container are executed under a carefully selected set of privileges and write to a virtual file system and registry instead...
http://help.comodo.com/topic-463-1-1033-15937-Containment---An-Overview.html... Filtering Website Filtering Logs Comodo Client Security allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged...
http://help.comodo.com/topic-399-1-790-10368-Filtering-Website-Filtering-Logs.html... Configure Interface Devices, Uplinks and VLANs The 'Interfaces' screen allows you to add and edit interface devices which connect to network zones, add fail-over uplinks and to configure Virtual LANs (VLANs). Click 'Network' > 'Interfaces' to open the network and VLAN configuration screens: The interface contains three tabs: Network Configuration - hows interface devices configured for the virtual appliance...
http://help.comodo.com/topic-451-1-936-12784-Configure-Interface-Devices,-Uplinks-and-VLANs.html... Website Filtering Logs Click 'Logs' in the CCS menu bar Select 'Website Filtering Events' from the drop-down at upper-left Website filter logs are a record of all sites blocked (or allowed) by CCS. The logs record all attempts made by users to access blocked or allowed websites. Background Note : You can create filtering rules for specific users...
http://help.comodo.com/topic-467-1-1050-16724-Website-Filtering-Logs.html... Open Shared Space Click 'Tasks' > 'Containment Tasks' > 'Open Shared Space'. Applications in the container are not allowed to write to your local drive for security reasons. Instead, they write all data, and save all files, to a special folder called 'Shared Space'. Files in shared space can also be accessed by non-contained applications (those running as normal...
http://help.comodo.com/topic-463-1-1033-15853-Open-Shared-Space.html... HIPS Logs Click 'Tasks' > 'Advanced Tasks' > 'View Logs' OR Click ‘Logs’ in advanced view of the CIS home screen Select 'HIPS Events' from the drop-down at upper-left Host intrusion prevention (HIPS) events are generated for various security reasons. These include changes in HIPS settings, when an application attempts to access restricted areas, or when an...
http://help.comodo.com/topic-72-1-766-9121-HIPS-Logs.html... Run an Application or Browser in the Sandbox You can run browsers or untested applications in the sandbox to prevent them from potentially infecting your PC. Both application types will run as normal in the sandbox, but will not be allowed to access other processes or user data. There are various methods you can use to manually run applications/browsers inside...
http://help.comodo.com/topic-394-1-767-12114-Run-an-Application-or-Browser-in-the-Sandbox.html... Control External Device Accessibility Click 'More' > 'Preferences' > 'Device Control' The device control panel lets you block access to external devices such as USB sticks and external drives. You can also define exclusions for selected devices. The selected devices will be allowed to connect, but all others will be blocked. Configure device control Open Comodo Client Security Click 'More...
http://help.comodo.com/topic-399-1-925-14664-Control-External-Device-Accessibility.html... Containment - An Overview The container is an isolated operating environment for unknown and untrusted applications. Running an application in the container means that it cannot make changes to other processes, programs or data on your local computer. Applications in the container are executed under a carefully selected set of privileges and write to a virtual file system and registry instead...
http://help.comodo.com/topic-399-1-904-11887-Containment---An-Overview.html