Showing 311-320 from 503
...updated for a file. Autorun Control - Windows devices Detected item ignored. Process / service stopped. Auto-run process stopped. Corresponding auto-run entry removed. In the case of a service, CCS disables the service. Auto-start process quarantined. Corresponding auto-start entry removed.In the case of a service, CCS disables the service. Processes restored from quarantine. File deleted from the endpoint. Virtual Desktop - Windows devices Launched Terminated Session started Session paused Session continued Session terminated Switched to host Switched to virtual desktop Device Name The label of the endpoint on which the event occurred. Click the name of a device...
http://help.comodo.com/topic-399-1-786-13039-View-Security-Events-by-Time.html...update the staff member details. Step 5 - Add Ticket Categories Click 'Admin Panel' > 'Manage' > 'Ticket Categories' Ticket categories are support topics that are presented to users so they can more easily choose the area with which they need help. For example, your portal might have a menu which says 'Please choose the area we can help you with', and offer categories such as 'Billing', 'Account Changes', 'Technical Support', and so forth. You can associate a ticket category with a custom form to gather more targeted information from a user. For example, you may need different information from...
http://help.comodo.com/topic-457-1-990-14480-Quick-Start.html...updated (Optional). The rest of this section explains on configuring General and Definitions sections for a rule. The 'Output Mappings' and 'List Mappings' are optional. For detailed explanations and tutorials on configuring those sections, refer to the online help page of the administrator guide at https://help.comodo.com/topic-325-1-675-8387-Managing-Rules.html General Click the 'General' Stripe to open the General Configuration area. Name - Enter a name for the rule Severity - Choose the severity level that will be assigned to the incident that matches the rule. Window Duration (minutes) - Enter the minimum duration (in minutes) for the event to be identified as an incident...
http://help.comodo.com/topic-325-1-731-8970-Step-6---Create-Correlating-Rules-to-Monitor-Networks-for-Incidents.html...updated. If the scan does not detect that the file is malicious then it passes onto the next stage of inspection - behavior monitoring. The behavior analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will be recorded. If these behaviors are found to be malicious, the file...
http://help.comodo.com/topic-72-1-623-7755-Unknown-Files---The-Scanning-Processes.html...updated. If the scan does not detect that the file is malicious then it passes onto the the next stage of inspection - behavior monitoring. The behavior analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will be recorded. If these behaviors are found to be malicious, the file is submitted...
http://help.comodo.com/topic-399-1-790-10410-Unknown-Files---The--Scanning-Processes.html...manually providing the event field details for creating a custom query, you can also query for a particular event from the search results. The following example shows the general search results for a selected time-period. Summary Results section The results summary section at the top shows results for all endpoints and events. You can select particular fields to build a custom query from the results. The result columns depend on the selected event fields . For example if you want to search for run untrusted executable events for an endpoint: First, click the endpoint under 'Device Name'. The query...
http://help.comodo.com/topic-444-1-905-11914-Event-Search.html...updated. If the scan does not detect that the file is malicious then it passes onto the next stage of inspection - behavior monitoring. The behavior analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will be recorded. If these behaviors are found to be malicious, the file is submitted...
http://help.comodo.com/topic-72-1-766-9196-Unknown-Files---The-Scanning-Processes.html...manually from the 'IP Range List Content Management' interface. To open the 'IP Range List Content Management' interface, Click the 'Menu' button from the top right, choose 'Lists' and then click 'IP Range List Content Management'. By default, the 'IP Range List Contents' table shows the values added to all the range lists. You can filter the table to view the values added to a specific list using the filter options from the top. Range List Contents Table - Column Descriptions Column Header Description Range Start The first IP in the range. Range End The last...
http://help.comodo.com/topic-285-1-833-10558-Manage-IP-Range-List-Content.html...updated - A file’s rating changed in the ‘File List’ in CCS on the endpoint. The rating may have changed from ‘Unrecognized’ to ‘Malicious’, or vice-versa. Autorun Control: Detected item ignored. Process / service stopped. Auto-run process stopped. Corresponding auto-run entry removed. In the case of a service, CCS disables the service Auto-start process quarantined. Corresponding auto-start entry removed. In the case of a service, CCS disables the service Processes restored from quarantine. File deleted from the endpoint. Number of devices On how many devices the event was detected. File Name The label of the executable...
http://help.comodo.com/topic-399-1-786-13041-View-Security-Events-by-Files.html...manually added networks Agents - List of roaming Windows and Mac OS devices enrolled by installing the Secure Internet Gateway agent Mobile Agents - List of enrolled Android and iOS devices Sites - List of network sites imported by deploying the local resolver agent Internal Networks - Internal network objects within imported sites. Note – Policies applied to a site will over-rule policies applied to internal network objects You can apply a policy to any number of objects Remark - Enter a description for the policy (optional) Click 'Next' or 'Settings' to configure the policy: Only B/W Mode - If enabled, you can only add blacklist...
http://help.comodo.com/topic-434-1-840-10766-Apply-Policies-to-Networks-and-Roaming-Mobile-Devices.html