Search Results

Showing 1071-1080 from 1131

Run Browsers Inside The Virtual Desktop (in Advanced Endpoint Protection)

... Run Browsers inside the Virtual Desktop Click 'Tasks' > 'Containment Tasks' > 'Run Virtual Desktop' Click the 'Start Virtual Desktop Session' button. The virtual desktop provides an extremely secure environment for internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install malware, rootkits and spyware on your computer...

http://help.comodo.com/topic-467-1-1050-16606-Run-Browsers-inside-the-Virtual-Desktop.html
HIPS Configuration (in Xcitium Enterprise)

... HIPS Configuration Click 'Settings' > 'HIPS' The host intrusion protection system (HIPS) constantly monitors system activity and stops processes from modifying important files and interfaces. Xcitium Client Security ships with a default HIPS ruleset that works 'out of the box' - providing extremely high levels of protection. For example, HIPS automatically protects system-critical files, folders and registry keys to...

http://help.comodo.com/topic-463-1-1033-15865-HIPS-Configuration.html
Defense+ Settings (in Comodo Internet Security)

... Defense+ Settings   Defense+ is a collective term that covers the Host Intrusion Prevention (HIPS), sandboxing and behavior blocker components of Comodo Internet Security. Together, these technologies ensure all applications, processes and services on your PC behave in a secure manner – and are prevented from taking actions that could damage your computer or your data. The Defense+ settings area allows...

http://help.comodo.com/topic-72-1-451-4759-Defense+-Settings.html
Containment Tasks - Introduction (in Comodo Internet Security)

... Containment Tasks - Introduction   Click 'Tasks' > 'Containment Tasks'  The container is a secure, virtual environment in which you can run unknown, untrusted, and suspicious applications. Applications in the container are isolated from the rest of your computer. They are denied access to other processes, write to a virtual file system and registry, and cannot access your personal data...

http://help.comodo.com/topic-72-1-766-9027-Containment-Tasks---Introduction.html
Auto-Containment Rules (in Endpoint Manager)

... Auto-Containment Rules   Click 'Settings' > 'Containment' > 'Auto-Containment'.  Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal data. CCS...

http://help.comodo.com/topic-399-1-904-11890-Auto-Containment-Rules.html
Customize User Interface (in Endpoint Manager)

... Customize User Interface   Click 'Settings' > 'General Settings' > 'User Interface'. The user interface tab lets you choose your preferred language, and customize the look and feel of the application.     Language Settings - Comodo Client Security is available in many different languages. Switch languages by clicking the 'Language' drop-down menu. ( Default = English (United States) ) Show messages from...

http://help.comodo.com/topic-399-1-904-11844-Customize-User-Interface.html
Defense+ Tasks - Introduction (in Comodo Internet Security)

... Defense+ Tasks - Introduction   The Defense+ component of Comodo Internet Security (hereafter known simply as Defense+) is a host intrusion prevention system that constantly monitors the activities of all executable files on your PC. With Defense+ activated, the user is warned EVERY time an unknown application executable (.exe, .dll, .sys, .bat etc) attempts to run. The only executables that are...

http://help.comodo.com/topic-72-1-284-2945-Defense+-Tasks---Introduction.html
Device Control Logs (in Xcitium Enterprise)

... Device Control Logs Click 'Logs' in the XCS menu bar Select 'Device Control Events' from the 'Show' drop-down Device control logs record events related to external devices. External devices include USB, optical, and storage drives plugged into your computer. Events logged include: Files copied, deleted and moved Device enabled/disabled ('Log detected devices' must be enabled) See ' Advanced Settings >...

http://help.comodo.com/topic-463-1-1033-15908-Device-Control-Logs.html
Manual Configuration (in Xcitium SIEM)

... Manual Configuration   Manual configuration means downloading the agent file then copying it to your site. You need to place the file in a publicly accessible location so we can authenticate it and start the scans. Open the cWatch dashboard Select the target website from the menu at top-left Click the 'Scan' tab then 'Server Side Scan' > 'Overview...

http://help.comodo.com/topic-285-1-835-13687-Manual-Configuration.html
Customize User Interface (in Advanced Endpoint Protection)

... Customize User Interface   Click 'Settings' > 'General Settings' > 'User Interface'. The user interface tab lets you choose your preferred language, and customize the look and feel of the application.      Language Settings  - Comodo Client Security is available in many different languages. Switch languages by clicking the 'Language' drop-down menu. ( Default = English (United States) ) Show...

http://help.comodo.com/topic-467-1-1050-16631-Customize-User-Interface.html
Pages 108 of 114 « Prev     Next »   Jump to page