Showing 1091-1100 from 1131
... 'Alerts Displayed' Logs Click 'More' > 'Preferences' > 'View Antivirus Events' > 'More' > 'Alerts Displayed' These logs show a user's response to a threat alert The action taken on the threat depends on how the user responded to the alert. 'Alerts Displayed' Logs - Column Descriptions Column Header Descriptions Date The time the alert was shown. Type...
http://help.comodo.com/topic-463-1-1037-16111-Alerts-Displayed-Logs.html... Backup Settings The backup settings area is where you establish the connection between your web host server and the backup server. You can also configure backup schedule, exclusions, and notifications. Once connected, your site files and databases are backed as per your schedule Open the backup settings page Select the target website from the menu at top-left Click the...
http://help.comodo.com/topic-466-1-1040-1150033-Backup-Settings.html... Blocking Any Downloads of a Specific File Type Comodo Internet Security can be configured to block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands...
http://help.comodo.com/topic-72-1-284-3070-Blocking-Any-Downloads-of-a-Specific-File-Type.html... Filter Device Control Logs You can create custom views of all logged events according to the following criteria: Name - Show events that involve specific devices Identifier - Show events that involve devices with a specifc ID code State - Filter events by whether the connection attempt was successful or not Configure event filters Open Xcitium Client Security Click 'More' > 'View Antivirus...
http://help.comodo.com/topic-463-1-1037-16118-Filter-Device-Control-Logs.html... Setting up Defense+ for Maximum Security and Usability This page explains on configuring the Host Intrusion Prevention System (HIPS) component of CIS to provide maximum security from the malicious programs that try to execute from within your system and to protect your system from data theft, computer crashes and system damage by preventing most types of buffer overflow attacks...
http://help.comodo.com/topic-72-1-284-3061-Setting-up-Defense+-for-Maximum-Security-and-Usability.html... Manual Configuration Manual configuration means downloading the agent file then copying it to your site. You need to place the file in a publicly accessible location so we can authenticate it and start the scans. Open the SOCaaP Web Protection dashboard Select the target website from the menu at top-left Click the 'Scan' tab then 'Server Side Scan' >...
http://help.comodo.com/topic-466-1-1040-1250025-Manual-Configuration.html... Configure Interface Devices, Uplinks and VLANs The 'Interfaces' screen allows you to add and edit interface devices which connect to network zones, add fail-over uplinks and to configure Virtual LANs (VLANs). Click 'Network' > 'Interfaces' to open the network and VLAN configuration screens: The interface contains three tabs: Network Configuration - hows interface devices configured for the virtual appliance...
http://help.comodo.com/topic-451-1-936-12784-Configure-Interface-Devices,-Uplinks-and-VLANs.html... Open Shared Space Click 'Tasks' > 'Containment Tasks' > 'Open Shared Space'. Applications in the container are not allowed to write to your local drive for security reasons. Instead, they write all data, and save all files, to a special folder called 'Shared Space'. Files in shared space can also be accessed by non-contained applications (those running as...
http://help.comodo.com/topic-399-1-904-12351-Open-Shared-Space.html... SSL Configuration Select a website from the drop-down at top-left and choose 'SSL' SSL/TLS certificates identify a website’s owner, and encrypt all data that passes between the site and a visitor's browser. Sites that use an SSL/TLS certificate have a URL that begins with HTTPS. For example, https://www.example.com. Xcitium strongly recommends you use a...
http://help.comodo.com/topic-466-1-1040-1250033-SSL-Configuration.html... Defense+ Logs Comodo Internet Security records a history of all actions taken by Defense+. Defense+ 'Events' are generated and recorded for various reasons. Examples include changes in HIPS settings, when an application is auto-sandboxed by Behavior Blocker, when an application or process attempts to access restricted areas or when an action occurs that contravenes your HIPS Rulesets . The...
http://help.comodo.com/topic-72-1-451-4725-Defense+-Logs.html