Search Results

Showing 301-310 from 639

HIPS Rule Sets (in Comodo Internet Security)

...help guide if you have not already done so. Although each application's ruleset could be defined from the ground up by individually configuring its constituent rules, this practice may prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Internet Security contains a selection of rulesets according to broad application categories. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type of application. Users can, of course, modify these predefined rulesets to suit their environment and requirements. To configure this category...

http://help.comodo.com/topic-72-1-451-4763-HIPS-Rule-Sets.html
Step 5 - Configure Firewall Policy (in Comodo Dome Firewall)

...help identify the purpose or target of the profile. Filter Unknown Categories - Enable if you want the proxy to block all websites that do not fall into one of the provided categories. Click the link below this setting to view and configure categories: 'Filter pages known to have content of the following categories.' - Configure which categories of websites you want to block or allow:   Click the arrow in a tile to enable or disable a particular category: - Access is allowed to websites is this category. - Access is blocked to websites is this category. 'Custom black-and whitelists' – configure specific...

http://help.comodo.com/topic-451-1-935-12753-Step-5---Configure-Firewall-Policy.html
HIPS Rule Sets (in Comodo Internet Security)

...help guide if you have not already done so. Although each application's ruleset could be defined from the ground up by individually configuring its constituent rules, this practice may prove time consuming if it had to be performed for every single program on your system. For this reason, Comodo Internet Security contains a selection of rulesets according to broad application categories. Each predefined ruleset has been specifically designed by Comodo to optimize the security level of a certain type of application. Users can, of course, modify these predefined rulesets to suit their environment and requirements. To configure this category...

http://help.comodo.com/topic-72-1-623-7733-HIPS-Rule-Sets.html
View Security Events By Time (in Endpoint Manager)

...search for specific apps. Handle Quarantined Items You can delete or restore quarantined items from the 'Event View' tab of the security dashboard. Click 'Security' > 'Security Events' > 'Event View.'  Select a company or group to view events in that group. Or Select 'Show all' to view all events. Select the events where the files of interest were moved to quarantine. Click 'Action on Endpoint' button: Select 'Delete File / Delete Autorun from device' to remove the file from the device Select 'Restore from Quarantine' / 'Restore Autorun' to move the file(s) from quarantine to their original location...

http://help.comodo.com/topic-399-1-786-13039-View-Security-Events-by-Time.html
Download And Install Comodo Dragon Web Browser (in Comodo Dragon Web Browser)

...helps protect you online. Our real-time web-filter instantly blocks malicious websites, phishing sites, and parked domains that contain excessive advertising. You can choose: Use Comodo DNS for all applications that access the internet. Use Comodo DNS for Comodo Dragon only. All other applications will connect through your current DNS server. Make no changes - keep your current DNS provider. In addition, Comodo's Secure DNS ensures safety against malware attacks by preventing any program running in your system from accessing malicious websites.   By default, 'I would like to use Comodo SecureDNS Servers (in Dragon only)' is selected. Select...

http://help.comodo.com/topic-120-1-279-2526-Download-and-Install-Comodo-Dragon-Web-Browser.html
Application Rules (in Comodo Internet Security)

... Application Rules Overview of Rules and Rulesets Whenever an application makes a request for Internet or network access, Comodo Firewall allows or denies this request based upon the Firewall Ruleset that has been specified for that application. Firewall Rulesets are, in turn, made up from one or more individual firewall rules. Each individual firewall rule contains instructions that determine whether...

http://help.comodo.com/topic-72-1-451-4772-Application-Rules.html
Trusted Files (in Comodo Internet Security)

... Trusted Files Files added to the Trusted Files list are automatically given Defense+ trusted status. If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active components generate Defense+ alerts when they run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more...

http://help.comodo.com/topic-72-1-451-4779-Trusted-Files.html
Application Rules (in Comodo Internet Security)

... Application Rules Overview of Rules and Rulesets Whenever an application makes a request for Internet or network access, Comodo Firewall allows or denies this request based upon the Firewall Ruleset that has been specified for that application. Firewall Rulesets are, in turn, made up from one or more individual firewall rules. Each individual firewall rule contains instructions that determine whether...

http://help.comodo.com/topic-72-1-623-7738-Application-Rules.html
Trusted Files (in Comodo Internet Security)

... Trusted Files Files added to the Trusted Files list are automatically given Defense+ trusted status. If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active components generate Defense+ alerts when they run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more...

http://help.comodo.com/topic-72-1-522-6323-Trusted-Files.html
Application Rules (in Comodo Internet Security)

... Application Rules Overview of Rules and Rulesets Whenever an application makes a request for Internet or network access, Comodo Firewall allows or denies this request based upon the Firewall Ruleset that has been specified for that application. Firewall Rulesets are, in turn, made up from one or more individual firewall rules. Each individual firewall rule contains instructions that determine whether...

http://help.comodo.com/topic-72-1-522-6315-Application-Rules.html
Pages 31 of 64 « Prev     Next »   Jump to page