Showing 311-320 from 639
... Trusted Files Files added to the Trusted Files list are automatically given Defense+ trusted status. If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active components generate Defense+ alerts when they run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more...
http://help.comodo.com/topic-72-1-451-4779-Trusted-Files.html... Application Rules Overview of Rules and Rulesets Whenever an application makes a request for Internet or network access, Comodo Firewall allows or denies this request based upon the Firewall Ruleset that has been specified for that application. Firewall Rulesets are, in turn, made up from one or more individual firewall rules. Each individual firewall rule contains instructions that determine whether...
http://help.comodo.com/topic-72-1-623-7738-Application-Rules.html...help: The customers interface Add a customer Manage customer details Manage users of a customer Manage forms Manage tickets Manage notes View customer contracts Remove u nmanaged customers Export customer list The customers interface Open the staff panel (See the last link on the left) Click 'Users' > 'Customers' Customer ID - The identity number assigned to the customer by Service Desk. Name - The organization or company that is your customer. Click the name of a customer to open their details interface. The customer details interface lets you: Manage customer details Add and manage users of the customer Manage forms...
http://help.comodo.com/topic-457-1-990-14545-Manage-Customers.html...helpful to test the behavior of new executables that have they downloaded. You can view all programs that ran inside the container from the 'Containment' interface. Admins can also view the activity of processes started by contained threats. Admins have the option to rate a contained file as trusted or malicious. Open the containment list interface: Click 'Security' > 'Contained Threats'> 'Containment Logs' Select a company or group to view contained programs in that group Or Select 'Show all' to view all contained programs. Containment - Column Descriptions Column Heading Description File Name The executable that...
http://help.comodo.com/topic-399-1-786-10103-View-Contained-Threats.html...help with this. Mac OS Devices Threats only appear in this list if 'Auto-Quarantine' is disabled in the profile on the device. Threats will NOT appear in this list if: 'Auto quarantine' is enabled in 'Realtime scanning', 'Manual Scanning' and 'Scheduled Scanning.' 'Auto quarantine' is disabled but the user chooses to quarantine the item from an alert. See Configure Antivirus Settings in Antivirus Settings for Mac OS Profile under Create a Mac OS Profile for more details. Linux Devices: Threats only appear in this list if 'Auto-Quarantine' is disabled in the profile on the device. Threats will...
http://help.comodo.com/topic-399-1-786-10109-View-and-Manage-Blocked-Threats.html... Exclusions The 'Exclusions' panel under the Antivirus Settings Settings displays a list of paths and applications/files for which you have selected Ignore from the Scan Results window of various scans or added to the Exclusions from an antivirus alert. Click the following links for more details on: To open the exclusions panel To add item(s) to excluded paths...
http://help.comodo.com/topic-72-1-522-6302-Exclusions.html... Real-time Scanner Settings The real-time scanner (aka 'On-Access Scan') is always ON and checks files in real time when they are created, opened or copied (as soon as you interact with a file, Comodo Antivirus checks it). This instant detection of viruses assures you, the user, that your system is perpetually monitored for malware and enjoys...
http://help.comodo.com/topic-72-1-623-7728-Real-time-Scanner-Settings.html... Real-time Scanner Settings The real-time scanner (aka 'On-Access Scan') is always ON and checks files in real time when they are created, opened or copied (as soon as you interact with a file, Comodo Antivirus checks it). This instant detection of viruses assures you, the user, that your system is perpetually monitored for malware and enjoys...
http://help.comodo.com/topic-72-1-522-6300-Real-time-Scanner-Settings.html... Exclusions The 'Exclusions' panel under the 'Antivirus Settings' displays a list of paths and applications/files for which you have selected Ignore from the Scan Results window of various scans or added to the 'Exclusions' from an antivirus alert. To open the Exclusions panel Click 'Security Settings' > 'Antivirus' > 'Exclusions' tab in the 'Advanced Settings' panel. The Exclusions panel...
http://help.comodo.com/topic-72-1-623-7730-Exclusions.html...help identify the host(s) included in the object. Comment - Enter a short description of the object. Type - The type of address object you wish to create. The options are: Subnet - The object will describe an entire sub-network of computers. Enter the subnet address in the 'Address' field. IP address - Select this if a single host will be covered by the object. Enter the IP address in the 'Address' field. IP range - The object will refer to hosts on an entire range of IP addresses. Enter the IP range in the 'Address' field. Click 'Save'. The new address object...
http://help.comodo.com/topic-451-1-937-12848-Step-6---Create-Firewall-Policy-.html