Showing 1081-1090 from 1132
... Customize User Interface Click 'Settings' > 'General Settings' > 'User Interface'. The user interface tab lets you choose your preferred language, and customize the look and feel of the application. Language Settings - Xcitium Client Security is available in many different languages. Switch languages by clicking the 'Language' drop-down menu. ( Default = English (United States) ) Show messages...
http://help.comodo.com/topic-463-1-1033-15918-Customize-User-Interface.html... Auto-Containment Rules Click 'Settings' > 'Containment' > 'Auto-Containment'. Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal data. XCS consults...
http://help.comodo.com/topic-463-1-1033-15935-Auto-Containment-Rules.html... File Groups Click 'Settings' > 'File Rating' > 'File Groups' As the name suggests, a file group is a collection of one or more file types. For example, the 'Executables' group is a list of file types that can run code on your computer. Once created, file groups can be named as the target of a rule...
http://help.comodo.com/topic-72-1-766-9180-File-Groups.html... Manage Performance Click 'Settings' > 'General Settings' > 'Performance' The user interface tab lets you limit resource usage of XCS processes and able to customize your usage in XCS Set maximum percentage of CPU utilization per core to - Enter the maximum CPU utilization value ( Default = 100% ) The maximum value limit is 100 percentage. You cannot enter the...
http://help.comodo.com/topic-467-1-1050-78-Manage-Performance.html... Enroll Windows Endpoints Process in brief: Open the enrollment email on the device you want to enroll Click the enrollment link in the email Click the 'Download Windows Installer' button in the wizard. Install the client Your device will automatically connects to Endpoint Manager once the installation is complete Enroll a Windows device Open the email on the device you...
http://help.comodo.com/topic-399-1-789-10269-Enroll-Windows-Endpoints.html... Website Categories The categories tab shows all built-in and user-defined web categories. Categories contain a list of 'Websites' which can be allowed or blocked in a rule. A 'Website' can be a URL or a simple phrase / term. You can use wildcard characters ( * ) with both URLs and terms. Open the website filtering categories section Click 'Settings...
http://help.comodo.com/topic-467-1-1050-16701-Website-Categories.html... HIPS Logs Click 'Logs' in the XCS menu bar Select 'HIPS Events' from the drop-down at upper-left Host intrusion prevention (HIPS) events are generated for various security reasons. These include changes in HIPS settings, when an application attempts to access restricted areas, or when an action contravenes your HIPS Rulesets . Date & Time - When the event occurred. Application...
http://help.comodo.com/topic-463-1-1033-15905-HIPS-Logs.html... VirusScope Logs Click 'Logs' in the CCS menu bar Select 'VirusScope Events' from the drop-down at upper-left Date & Time - When the event occurred. Location – The installation path of the suspicious application Malware Name – The malicious item that was detected. Action - How VirusScope handled the malware. Reverse - VirusScope attempted to undo any changes made by the...
http://help.comodo.com/topic-399-1-904-11826-VirusScope-Logs.html... Run a Scan and View Results Open the cWatch dashboard Select a website from the menu at top-left Click the 'Scan' tab then 'Server Side Scan’ > 'Overview' Note - Make sure you have uploaded the scanner file to the site. See Malware Scan Settings if you haven't yet done this. The overview page shows details about any...
http://help.comodo.com/topic-285-1-848-13907-Run-a-Scan-and-View-Results.html... Sandbox Tasks – Introduction Comodo Internet Security features a fully functional sandbox called the ' Virtual Desktop '- an isolated operating environment for running unknown, untrusted and suspicious applications. Applications executed inside the sandbox/virtual desktop will not affect other processes, programs or data on your real computer. In addition to running suspicious applications inside the sandbox on an ad-hoc basis, you...
http://help.comodo.com/topic-72-1-623-7590-Sandbox-Tasks-–-Introduction.html