Showing 301-310 from 639
...help guide if you have not already done so. Although each application's ruleset could be defined from the ground up by individually configuring its constituent rules, this practice may prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Internet Security contains a selection of rulesets according to broad application categories. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type of application. Users can, of course, modify these predefined rulesets to suit their environment and requirements. To configure this category...
http://help.comodo.com/topic-72-1-451-4763-HIPS-Rule-Sets.html...help identify the purpose or target of the profile. Filter Unknown Categories - Enable if you want the proxy to block all websites that do not fall into one of the provided categories. Click the link below this setting to view and configure categories: 'Filter pages known to have content of the following categories.' - Configure which categories of websites you want to block or allow: Click the arrow in a tile to enable or disable a particular category: - Access is allowed to websites is this category. - Access is blocked to websites is this category. 'Custom black-and whitelists' – configure specific...
http://help.comodo.com/topic-451-1-935-12753-Step-5---Configure-Firewall-Policy.html...help guide if you have not already done so. Although each application's ruleset could be defined from the ground up by individually configuring its constituent rules, this practice may prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Internet Security contains a selection of rulesets according to broad application categories. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type of application. Users can, of course, modify these predefined rulesets to suit their environment and requirements. To configure this category...
http://help.comodo.com/topic-72-1-623-7733-HIPS-Rule-Sets.html...search for specific apps. Handle Quarantined Items You can delete or restore quarantined items from the 'Event View' tab of the security dashboard. Click 'Security' > 'Security Events' > 'Event View.' Select a company or group to view events in that group. Or Select 'Show all' to view all events. Select the events where the files of interest were moved to quarantine. Click 'Action on Endpoint' button: Select 'Delete File / Delete Autorun from device' to remove the file from the device Select 'Restore from Quarantine' / 'Restore Autorun' to move the file(s) from quarantine to their original location...
http://help.comodo.com/topic-399-1-786-13039-View-Security-Events-by-Time.html...helps protect you online. Our real-time web-filter instantly blocks malicious websites, phishing sites, and parked domains that contain excessive advertising. You can choose: Use Comodo DNS for all applications that access the internet. Use Comodo DNS for Comodo Dragon only. All other applications will connect through your current DNS server. Make no changes - keep your current DNS provider. In addition, Comodo's Secure DNS ensures safety against malware attacks by preventing any program running in your system from accessing malicious websites. By default, 'I would like to use Comodo SecureDNS Servers (in Dragon only)' is selected. Select...
http://help.comodo.com/topic-120-1-279-2526-Download-and-Install-Comodo-Dragon-Web-Browser.html... Application Rules Overview of Rules and Rulesets Whenever an application makes a request for Internet or network access, Comodo Firewall allows or denies this request based upon the Firewall Ruleset that has been specified for that application. Firewall Rulesets are, in turn, made up from one or more individual firewall rules. Each individual firewall rule contains instructions that determine whether...
http://help.comodo.com/topic-72-1-451-4772-Application-Rules.html... Trusted Files Files added to the Trusted Files list are automatically given Defense+ trusted status. If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active components generate Defense+ alerts when they run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more...
http://help.comodo.com/topic-72-1-451-4779-Trusted-Files.html... Application Rules Overview of Rules and Rulesets Whenever an application makes a request for Internet or network access, Comodo Firewall allows or denies this request based upon the Firewall Ruleset that has been specified for that application. Firewall Rulesets are, in turn, made up from one or more individual firewall rules. Each individual firewall rule contains instructions that determine whether...
http://help.comodo.com/topic-72-1-623-7738-Application-Rules.html... Trusted Files Files added to the Trusted Files list are automatically given Defense+ trusted status. If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active components generate Defense+ alerts when they run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more...
http://help.comodo.com/topic-72-1-522-6323-Trusted-Files.html... Application Rules Overview of Rules and Rulesets Whenever an application makes a request for Internet or network access, Comodo Firewall allows or denies this request based upon the Firewall Ruleset that has been specified for that application. Firewall Rulesets are, in turn, made up from one or more individual firewall rules. Each individual firewall rule contains instructions that determine whether...
http://help.comodo.com/topic-72-1-522-6315-Application-Rules.html