Search Results

Showing 1101-1110 from 1131

Defense+ Settings (in Comodo Internet Security)

... Defense+ Settings   Defense+ is a collective term that covers the Host Intrusion Prevention (HIPS), sandboxing and behavior blocker components of Comodo Internet Security. Together, these technologies ensure all applications, processes and services on your PC behave in a secure manner – and are prevented from taking actions that could damage your computer or your data. The Defense+ settings area allows...

http://help.comodo.com/topic-72-1-522-6297-Defense+-Settings.html
Viruscope Logs (in Endpoint Manager)

... Viruscope Logs CCS record the events whenever the Viruscope module detects, blocks or reverses a suspicious activity. Viruscope logs can be viewed by selecting 'Viruscope Events' from the drop-down at the top of the log viewer interface. Column Descriptions Date - Indicates the date of the event. Location – Indicates where the suspicious executable is stored. Malware Name - Name of the...

http://help.comodo.com/topic-399-1-790-10341-Viruscope-Logs.html
Device Control Logs (in Xcitium Enterprise)

... Device Control Logs Click 'More' > 'Preferences' > 'View Antivirus Events' > 'More' > 'Device Control Events' Device control logs show events where an external device was connected, or disconnected, from the endpoint. The log also tells you if the connection was allowed or blocked. Each log shows the time of the connection, the device connected and whether the connection...

http://help.comodo.com/topic-463-1-1037-16110-Device-Control-Logs.html
Containment Tasks - Introduction (in Xcitium Enterprise)

... Containment Tasks - Introduction Click 'Tasks' > 'Containment Tasks' The container is a secure, virtual environment in which you can run unknown, untrusted, and suspicious applications Applications in the container are isolated from the rest of your computer. They are denied access to other processes, write to a virtual file system and registry, and cannot access your personal data This makes...

http://help.comodo.com/topic-463-1-1033-15825-Containment-Tasks---Introduction.html
Website Filtering Logs (in Comodo Internet Security)

... Website Filtering Logs Click 'Tasks' > 'Advanced Tasks' > 'View Logs' OR Click ‘Logs’ in advanced view of the CIS home screen Select 'Website Filtering Events' from the drop-down at upper-left Website filter logs are a record of all sites blocked (or allowed) by CIS. The logs record all attempts made by users to access blocked or allowed...

http://help.comodo.com/topic-72-1-766-9122-Website-Filtering-Logs.html
Enroll Windows Endpoints (in Xcitium Enterprise)

... Enroll Windows Endpoints After you have completed the setup process  , Xcitium will send an email to your users containing device enrollment instructions. Users should open the email on the Windows endpoint you want to enroll. After installation, the communication client will automatically connect to the Xcitium server. Enroll a Windows device Open the email on the device you want...

http://help.comodo.com/topic-463-1-1029-15562-Enroll-Windows-Endpoints.html
More Options-Introduction (in Comodo Internet Security)

... More Options-Introduction   The More Options interface contains several areas relating to overall configuration as well as handy utilities and shortcuts to help enhance and improve your experience with Comodo Internet Security.   It can be accessed at all times by clicking on the 'More'  link from the navigation panel.       Click the links below to...

http://help.comodo.com/topic-72-1-284-2946-More-Options-Introduction.html
Auto-Containment Rules (in Advanced Endpoint Protection)

... Auto-Containment Rules   Click 'Settings' > 'Containment' > 'Auto-Containment'.  Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal data. CCS...

http://help.comodo.com/topic-467-1-1050-16683-Auto-Containment-Rules.html
Manage Performance (in Advanced Endpoint Protection)

... Manage Performance Click 'Settings' > 'General Settings' > 'Performance' The user interface tab lets you limit resource usage of XCS processes and able to customize your usage in XCS  Set maximum percentage of CPU utilization per core to -  Enter the maximum CPU utilization value ( Default = 100% ) The maximum value limit is 100 percentage. You cannot enter the...

http://help.comodo.com/topic-467-1-1050-78-Manage-Performance.html
Reset The Container (in Xcitium Enterprise)

... Reset the Container Click 'Tasks' > 'Containment Tasks' > 'Reset the Container' Programs in the container write all data and system changes to a virtual file system. This means the program cannot harm your computer or sensitive data. Files saved in the container could contain malware downloaded from websites, or private data in your browsing history. Periodically resetting the container...

http://help.comodo.com/topic-463-1-1033-15851-Reset-the-Container.html
Pages 111 of 114 « Prev     Next »   Jump to page