Showing 111-120 from 148
... Kill Chain Report Kill Chain reports are a highly detailed analysis of a specific piece of malware that was discovered on your network. Each report helps you gain a better understanding of your network's threat landscape by detailing each files malware attributes, file activity, network activity, suspicious behavior and more. Existing Kill Chain reports can be viewed in the...
http://help.comodo.com/topic-397-1-773-11310-Kill-Chain-Report.html... Antivirus Vendors Choose all antivirus software vendors that you use or have used in the past Verdict uses this data to measure it's performance against leading antivirus products For example, if Verdict finds a zero-day threat, it will check whether the threat was also found by your selected vendors. You can view this information in the 'Unparalleled...
http://help.comodo.com/topic-397-1-773-12101-Antivirus-Vendors.html... CCAV Settings The 'Settings' interface allows you to configure every aspect of the operation, behavior and appearance of Comodo Cloud Antivirus (CCAV). The 'General Settings' section lets you specify top-level preferences regarding the interface and updates. The other sections let advanced users delve into granular configuration of the ' Antivirus ', Sandbox', 'File Rating' and 'Advanced Protection' modules: The 'Antivirus' settings...
http://help.comodo.com/topic-394-1-767-9237-CCAV-Settings.html...cloud-based file verdict service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious. CCS on managed Windows computers can automatically submit unknown files to Valkyrie for analysis. The results of these tests produce a trust verdict on the file which can be viewed from the EM interface. Data...
http://help.comodo.com/topic-399-1-786-10089-Key-Concepts.html...cloud-based file lookup service (FLS) that ascertains the reputation of files on your computer. Whenever a file is first accessed, CCS will check the file against Comodo's master white and blacklists. The file will be awarded trusted status if: The application/file is in the trusted local File List ; The application is from a vendor included in the Trusted Software Vendors list The application is included in the extensive and constantly updated Comodo safelist Trusted files are excluded from monitoring by HIPS - reducing hardware and software resource consumption. On the other hand, files which are identified as malicious will...
http://help.comodo.com/topic-399-1-790-10359-Manage-File-Rating.html...Cloud-based file lookup service (FLS) - Whenever a file is first accessed, CIS will check the file against our master whitelist and blacklists and will award it trusted status if: The application is from a vendor included in the Trusted Software Vendors list; The application is included in the extensive and constantly updated Comodo safelist. Administrator rating User Rating – You can provide Trusted status to your files in two ways: If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active components generate HIPS alerts when they run. Of course, you could choose...
http://help.comodo.com/topic-72-1-623-8441-File-List.html...Cloud-based file lookup service (FLS) - Whenever a file is first accessed, CAVS will check the file against our master whitelist and blacklists and will award it trusted status if: The application is from a vendor included in the Trusted Software Vendors list; The application is included in the extensive and constantly updated Comodo safelist. Administrator rating (Applicable only if your CAVS installation is remotely managed by your CESM administrator). User Rating – You can provide Trusted status to your files in two ways: If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active...
http://help.comodo.com/topic-213-1-517-8250-File-List.html...cloud-based file look-up service (FLS) that attempts to ascertain the reputation of files on your computer by consulting a global database. Whenever a file is first accessed, CIS will check the file against our master whitelist and blacklists and will award it trusted status if: the application/file is awarded 'Trusted' status in the File List the application is from a vendor included in the Trusted Software Vendors list the application is included in the extensive and constantly updated Comodo safelist Trusted files are excluded from monitoring by HIPS - reducing hardware and software resource consumption. On the other...
http://help.comodo.com/topic-72-1-623-7725-Manage-File-Rating.html...cloud-based file look-up service (FLS) that attempts to ascertain the reputation of files on your computer by consulting a global database. Whenever a file is first accessed, CIS will check the file against our master whitelist and blacklists and will award it trusted status if: The application/file is included in the Trusted Files list The application is from a vendor included in the Trusted Software Vendors list The application is included in the extensive and constantly updated Comodo safelist Trusted files are excluded from monitoring by HIPS - reducing hardware and software resource consumption. On the other hand, files...
http://help.comodo.com/topic-72-1-522-6299-Manage-File-Rating.html...cloud-based file lookup service (FLS) that ascertains the reputation of files on your server. Whenever a file is first accessed, CAVS will check the file against our master whitelist and blacklists and will award it trusted status if: The application/file is awarded 'Trusted' status in the local File List ; The application is from a vendor included in the Trusted Software Vendors list; The application is included in the extensive and constantly updated Comodo safelist. Trusted files are excluded from monitoring by HIPS - reducing hardware and software resource consumption. On the other hand, files which are identified as malicious will...
http://help.comodo.com/topic-213-1-517-6029-Manage-File-Rating.html