Showing 141-150 from 199
... View Contained Threats Click 'Security' > 'Contained Threats'> 'Containment Logs' The container is a secure environment in which files with an 'unknown' trust rating are run. 'Unknown' files have not yet been classified as either 'safe' or 'malware'. Contained threats are not permitted to modify files, user data or other processes on the host machine. You can also submit...
http://help.comodo.com/topic-399-1-786-10103-View-Contained-Threats.html... Configure User Authentication Settings Click 'Administration' > 'Authentication Configuration' > 'Authentication Settings' to open this interface. You have to choose a user authentication method in order to deploy user-specific policies. There are two methods available - 'Hosted DB' and 'Active Directory'. You can select only one authentication method per account. After connecting your networks to Comodo Secure Web Gateway...
http://help.comodo.com/topic-436-1-842-10792-Configure-User-Authentication-Settings.html...downloaded or copied folder/file. Click here for more details on running on-demand scans. To scan a selected item: Right-click on the selected item that you want to run a scan Select 'Scan with COMODO Antivirus' from the context sensitive menu The scanning process will commence... ...and on completion, the scan finished dialog will be displayed with the number of threats found. Click here for more details to take action on the infected item(s). Comodo Internet Security...
http://help.comodo.com/topic-72-1-284-3064-Running-an-Instant-Antivirus-Scan-on-Selected-Items.html...Security to check for latest virus signature database updates from Comodo website and download the updates automatically before starting the scanning. (Default = Enabled) Detect potentially unwanted applications - When this option is selected the antivirus will also scan for applications that (i) a user may or may not be aware is installed on their computer and (ii) may contain functionality and objectives that are not clear to the user. Example PUA's include adware and browser toolbars. PUA's are often bundled as an additional 'utility' when the user is installing an unrelated piece of software. Unlike malware, many...
http://help.comodo.com/topic-399-1-790-10362-Create,-Schedule-and-Run-a-Custom-Scan.html...Comodo Antivirus for Servers will show a green border around programs that are running in the sandbox. The 'Auto-Sandbox' panel can be accessed by clicking 'Tasks > Sandbox Tasks > Open Advanced Settings > Security Settings > Defense+ > Sandbox > Auto-Sandbox Enable Auto-Sandbox - Allows you to enable or disable the Sandbox. If enabled, the applications are run inside the sandbox as per the rules defined. ( Default = Enabled ) The interface displays the configured rules: Action – Displays the operation that the sandbox should perform on the target files if the rule is triggered. Target –The files, file groups...
http://help.comodo.com/topic-213-1-517-8247-Configuring-Rules-for-Auto-Sandbox.html... Update Virus Database In order to guarantee the relevance of your antivirus software, it is imperative that your virus databases are updated as regularly as possible. Our antivirus database is maintained and updated around the clock by a team of dedicated technicians, providing you with the solutions to the latest virus outbreaks. Updates can be downloaded to your system manually...
http://help.comodo.com/topic-167-1-330-4253-Update-Virus-Database.html...Security Settings' > 'Advanced Protection' > 'Containment' > 'Auto-Containment' on the left hand menu. 4. Click the handle at the bottom of the interface to open the option panel: Click the 'Add' button The 'Manage Contained Program' screen will appear: Step 1 – Select the Action Step 2 – Select the Target Step 3 – Select the Sources Step 4 – Select the File Reputation Step 5 – Select the Options Step 1 – Select the Action The options in the 'Action' drop-down button combined with the 'Set Restriction Level' setting in the 'Options' tab determine the privileges a contained application has to access...
http://help.comodo.com/topic-399-1-790-10314-Create-Rules-for--Auto-Containing-Applications.html... Run a Full Computer Scan The 'Full System Scan' scans every local drive, folder and file on your system. Any external devices like USB drives, digital camera and so on are also scanned. You can customize the items scanned during a 'Full System Scan' and set-up a scan schedule from the 'Advanced Tasks' interface. Refer to Antivirus Settings >...
http://help.comodo.com/topic-399-1-790-10337-Run-a-Full-Computer-Scan.html... Manage Virus Database and Program Updates In order to guarantee continued and effective antivirus protection , it is imperative that your virus databases are updated as regularly as possible. Updates can be downloaded to your system manually or automatically from Comodo's update servers. To manually check for the latest virus and program updates 1. Switch to the 'Tasks' screen and...
http://help.comodo.com/topic-399-1-790-10290-Manage-Virus-Database-and-Program-Updates.html... Installation Comodo Client Security (CCS) provides best-in-class threat prevention for Windows endpoints. The product is part of Comodo Endpoint Manager and is deployed from the Endpoint Manager console. This section covers how to: Subscribe for Endpoint Manager Enroll users Enroll devices Subscribe for Endpoint Manager You can use the Endpoint Manager (EM) interface to deploy Comodo Client Security...
http://help.comodo.com/topic-467-1-1049-16322-Installation.html