Showing 1101-1110 from 1132
... HIPS Configuration Click 'Settings' > 'HIPS' The host intrusion protection system (HIPS) constantly monitors system activity and stops processes from modifying important files and interfaces. Comodo Internet Security ships with a default HIPS ruleset that work 'out of the box' - providing extremely high levels of protection without any user intervention. For example, HIPS automatically protects system-critical files, folders and...
http://help.comodo.com/topic-72-1-766-9138-HIPS-Configuration.html... Block any Downloads of a Specific File Type Comodo Internet Security can be configured to block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands could...
http://help.comodo.com/topic-72-1-522-6358-Block-Any-Downloads-of-a-Specific-File-Type.html... Defense+ Logs Comodo Internet Security records a history of all actions taken by Defense+. Defense+ 'Events' are generated and recorded for various reasons. Examples include changes in HIPS settings, when an application is auto-sandboxed by Behavior Blocker, when an application or process attempts to access restricted areas or when an action occurs that contravenes your HIPS Rulesets . The...
http://help.comodo.com/topic-72-1-522-6261-Defense+-Logs.html... System Requirements To ensure optimal performance of Comodo Internet Security, please ensure that your PC complies with the minimum system requirements as stated below: Windows 8 / 8.1 (32-bit and 64-bit versions) Windows 7 (32-bit and 64-bit versions) Windows Vista (32-bit and 64-bit versions) 384 MB available RAM 210 MB hard disk space for...
http://help.comodo.com/topic-72-1-522-6223-System-Requirements.html... Sandbox Tasks – Introduction Comodo Internet Security features a fully functional sandbox called the ' Virtual Desktop '- an isolated operating environment for running unknown, untrusted and suspicious applications. Applications executed inside the sandbox/virtual desktop will not affect other processes, programs or data on your real computer. In addition to running suspicious applications inside the sandbox on an ad-hoc basis, you...
http://help.comodo.com/topic-72-1-522-6210-Sandbox-Tasks-–-Introduction.html... Enroll Windows Endpoints After you have completed the setup process , Xcitium will send an email to your users containing device enrollment instructions. Users should open the email on the Windows endpoint you want to enroll. After installation, the communication client will automatically connect to the Xcitium server. Enroll a Windows device Open the email on the device you want...
http://help.comodo.com/topic-463-1-1029-15562-Enroll-Windows-Endpoints.html... Defense+ Tasks - Introduction The Defense+ component of Comodo Internet Security (hereafter known simply as Defense+) is a host intrusion prevention system that constantly monitors the activities of all executable files on your PC. With Defense+ activated, the user is warned EVERY time an unknown application executable (.exe, .dll, .sys, .bat etc) attempts to run. The only executables that are...
http://help.comodo.com/topic-72-1-284-2945-Defense+-Tasks---Introduction.html... Auto-Containment Rules Click 'Settings' > 'Containment' > 'Auto-Containment'. Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal data. CCS...
http://help.comodo.com/topic-467-1-1050-16683-Auto-Containment-Rules.html... Blocking Any Downloads of a Specific File Type Comodo Internet Security can be configured to block downloads of specific types of file. Example scenarios: Some malicious websites try to push downloads of malware in .exe file format. .exe files are programs which can execute commands on your computer. If the .exe is malicious in intent then these commands...
http://help.comodo.com/topic-72-1-284-3070-Blocking-Any-Downloads-of-a-Specific-File-Type.html... Auto-Containment Rules Click 'Settings' > 'Containment' > 'Auto-Containment' Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal data. CIS...
http://help.comodo.com/topic-72-1-766-9170-Auto-Containment-Rules.html