Showing 341-350 from 502
...manually type the token into the Google Authenticator app. Step 3 - After completing steps 1 and 2, a six digit authentication code is generated in the Google app. This code changes frequently and is unique to your account. Enter the verification code in the field provided on the form. Click 'Pair' A success message is shown along with 10 backup codes. You can use the backup codes to complete two-factor authentication if you do not have the authentication device with you. Please make a copy of the codes. Each code can only be used once. Click 'Next...
http://help.comodo.com/topic-457-1-981-14360-Account-Security-Settings.html...manually handling detected threats. Enabled = You can choose the automatic action taken against detected threats. The options are: Quarantine Threats - Infected items will be moved to Quarantine. You can review quarantined items later and remove them or restore them (in case of false positives). See Manage Quarantined Items for more details on managing quarantined items. Disinfect Threats - If a disinfection routine is available, the antivirus will remove the infection and keep the original, safe, file. If not, the item is moved to 'Quarantine'. ( Default ) Show scan result window - If selected, you will see a summary of results...
http://help.comodo.com/topic-399-1-904-11862-Scan-Profiles.html...updated Comodo safelist. Administrator rating (Applicable only if your CCS installation is remotely managed by your CESM/ITSM administrator). User Rating – You can assign 'Trusted' rating to any file from the Files List interface. Refer to the description of changing the file rating under the section File Details for more details. Users may also trust a file from an antivirus or containment alert. Background note. For files that are trusted by the user, CCS generates a hash or a digest of the file using a pre-defined algorithm which it saves in its database. When accessing the file in future...
http://help.comodo.com/topic-399-1-790-10397-File-List.html...Manually add a new application to the list for analysis Click 'Add' at the top You can add an application by following methods: Add a new application Add a current application Add application from the currently running processes Add a new application Click 'Add new application' from the 'Add' drop-down Enter the file path in the 'Edit Property' dialog and click 'OK' The application will be added and displayed in the list. Click "OK" to apply your settings Add a current application Click 'Add' then 'Applications' from the drop-down Navigate to the file you want...
http://help.comodo.com/topic-467-1-1050-16697-Script-Analysis-Settings.html...updated Comodo safelist. Administrator rating User Rating – You can provide Trusted status to your files in two ways: If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active components generate HIPS alerts when they run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more convenient to classify entire directories of files as 'Trusted'. You can assign 'Trusted' rating to any desired file from the Files List interface. Refer to the description of changing the file rating under the section File Details...
http://help.comodo.com/topic-72-1-623-8441-File-List.html...update the list of customers and number of events, click the refresh button at the top The drop-down at the top left allows you to choose the time period for which the statistics are to be displayed. You can choose the time period from the last one hour to last 24 hours. The dashboard will display the graphs for the selected customer with the details collected within the selected period. Tip : In addition to the 'Situation Awareness' dashboard that displays the statistics of pre-defined parameters, the administrator can create custom dashboards specific to the customers, to display...
http://help.comodo.com/topic-325-1-675-8362-The-Dashboard.html...manually handling detected threats. Enabled = You can choose the automatic action taken against detected threats. The options are: Quarantine Threats - Infected items will be moved to Quarantine. You can review quarantined items later and remove them or restore them (in case of false positives). See Manage Quarantined Items for more details on managing quarantined items. Disinfect Threats - If a disinfection routine is available, the antivirus will remove the infection and keep the original, safe, file. If not, the item is moved to 'Quarantine'. ( Default ) Show scan result window - If selected, you will...
http://help.comodo.com/topic-467-1-1050-16648-Scan-Profiles.html...updated Comodo safelist. Administrator rating (Applicable only if your CAVS installation is remotely managed by your CESM administrator). User Rating – You can provide Trusted status to your files in two ways: If an executable is unknown to the Defense+ safe list then, ordinarily, it and all its active components generate HIPS alerts when they run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more convenient to classify entire directories of files as 'Trusted'. You can assign 'Trusted' rating to any desired file from the Files List interface. Refer...
http://help.comodo.com/topic-213-1-517-8250-File-List.html...Manually add a new application to the list for analysis Click 'Add' at the top You can add an application by following methods: Add a new application Add a current application Add application from the currently running processes Add a new application Click 'Add new application' from the 'Add' drop-down Provide the details in the 'Edit Property' dialog and click 'OK' The application will be added and displayed in the list. Click "OK" to apply your settings Add a current running application Click 'Add' then 'Applications' from the drop-down Navigate to the file you want...
http://help.comodo.com/topic-72-1-766-13949-Script-Analysis-Settings.html...manually or automatically via a profile schedule. Third Party Patch Logs - A record of patch installations for non-Xcitium applications. Installation Logs - Apps installed on the device from the Windows Application store. Note : Xcitium is capable of remotely installing applications from its application store. This feature will be available in future versions. Uninstallation Logs - Apps uninstalled from the device through Xcitium. You can remotely uninstall unwanted apps from Windows devices in two ways: 'Device Details' > 'Software Inventory' interface - See View and Manage Applications Installed on a Device for more details. 'Software Inventory' > 'Applications' > 'Global Software...
http://help.comodo.com/topic-463-1-1029-15591-Manage-Windows-Devices.html