Search Results

Showing 1111-1120 from 1131

Block Any Downloads Of A Specific File Type (in Xcitium Enterprise)

... Block any Downloads of a Specific File Type   This page explains how to configure XCS to prohibit downloads of specific types of file. Example scenarios: Some malicious websites try to push malware in .exe file format. These files, known as executables, can run commands on your computer. If the .exe is malicious then these commands could install a virus...

http://help.comodo.com/topic-463-1-1033-15885-Block-Any-Downloads-of-a-Specific-File-Type.html
Containment - An Overview (in Advanced Endpoint Protection)

... Containment - An Overview The container is an isolated operating environment for unknown and untrusted applications. Running an application in the container means that it cannot make changes to other processes, programs or data on your local computer. Applications in the container are executed under a carefully selected set of privileges and write to a virtual file system and registry instead...

http://help.comodo.com/topic-467-1-1050-16685-Containment---An-Overview.html
Auto-Containment Rules (in Comodo Internet Security)

... Auto-Containment Rules  Click 'Settings' > 'Containment' > 'Auto-Containment'  Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal data. CIS...

http://help.comodo.com/topic-72-1-766-9170-Auto-Containment-Rules.html
Alerts Displayed Logs (in Xcitium Enterprise)

... 'Alerts Displayed ' Logs   Alert logs are a history of security alerts shown to users when a threat was detected. The action taken depends on how the user responded to the alert. Date - The time the alert was shown. Type - The alert category. Categories include antivirus alerts and execution alerts. Note - execution alert are coming in later versions of XCS...

http://help.comodo.com/topic-463-1-1035-16047-Alerts-Displayed-Logs.html
Open Shared Space (in Xcitium Enterprise)

... Open Shared Space Click 'Tasks' > 'Containment Tasks' > 'Open Shared Space'. Applications in the container are not allowed to write to your local drive for security reasons. Instead, they write all data, and save all files, to a special folder called 'Shared Space'. Files in shared space can also be accessed by non-contained applications (those running as normal...

http://help.comodo.com/topic-463-1-1033-15853-Open-Shared-Space.html
Run Browsers Inside The Virtual Desktop (in Xcitium Enterprise)

... Run Browsers inside the Virtual Desktop Click 'Tasks' > 'Containment Tasks' > 'Run Virtual Desktop' Click the 'Start Virtual Desktop Session' button. The virtual desktop provides an extremely secure environment for internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install malware, rootkits and spyware on your computer...

http://help.comodo.com/topic-463-1-1033-15968-Run-Browsers-inside-the-Virtual-Desktop.html
Blocked Files (in Comodo Internet Security)

... Blocked Files   Defense+ allows you to lock-down files and folders by completely denying all access rights to them from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files that are placed...

http://help.comodo.com/topic-72-1-284-3030-Blocked-Files.html
The Main Interface (in Endpoint Manager)

... The Main Interface   The CCS interface is designed to be as clean and informative as possible while letting you carry out tasks with the minimum of fuss. Each tile on the home screen contains important security and update information and lets you quickly delve further into areas of interest. Click 'Home/Tasks' button at the upper-left to switch between...

http://help.comodo.com/topic-399-1-904-11746-The-Main-Interface.html
HIPS Configuration (in Endpoint Manager)

... HIPS Configuration Click 'Settings' > 'HIPS' The host intrusion protection system (HIPS) constantly monitors system activity and stops processes from modifying important files and interfaces. Comodo Client Security ships with a default HIPS ruleset that works 'out of the box' - providing extremely high levels of protection. For example, HIPS automatically protects system-critical files, folders and registry keys to prevent...

http://help.comodo.com/topic-399-1-904-11774-HIPS-Configuration.html
Add And Manage Static Routes (in Comodo Dome Firewall)

... Add and Manage Static Routes   The 'Static Routing' interface shows existing static routes from any source network to specific destination networks. New rules can be added by clicking the 'Add a new route' link. Existing rules can be enabled, disabled, edited or removed by using the controls in the 'Actions' column. To open the 'Static Routing' interface Click 'Network...

http://help.comodo.com/topic-451-1-936-12819-Add-and-Manage-Static-Routes.html
Pages 112 of 114 « Prev     Next »   Jump to page