Showing 411-420 from 547
...states. - Opens the 'Edit' interface and enables to edit the parameters of the rule. The Edit interface is similar to Add Rule interface. See Creating System Access Firewall rules for more details. - Removes the rule. Clicking the right arrow button beside 'Show rules of system services' displays the list of pre-configured/auto-created firewall rules for system...
http://help.comodo.com/topic-451-1-936-12796-Configure-System-Access.html...Stateful mode; Seamless integration into the Windows operating system allows scanning specific objects ‘on the fly’; Daily, automatic updates of virus definitions; Isolates suspicious files in quarantine preventing further infection; Built in scheduler allows you to run scans at a time that suits you; Simple to use - install it and forget it - Comodo AV protects you in the background. Intuitive...
http://help.comodo.com/topic-72-1-284-2953-Special-Features.html...stated below: Windows 8 - CIS v.5.12 and above (Both 32-bit and 64-bit versions) Windows 7 (Both 32-bit and 64-bit versions) Windows Vista (Both 32-bit and 64-bit versions) Windows XP (Both 32-bit and 64-bit versions) Internet Explorer Version 5.1 or above 152 MB available RAM 400 MB hard disk space for both 32-bit and 64-bit versions...
http://help.comodo.com/topic-72-1-284-2954-System-Requirements.html...state of enabled. Advanced users wishing to gain greater insight into CIS actions and/or to have more control over security decisions may wish to disable this option. Choosing Installation Location Click the 'Files Locations' tab to choose the installation path. This screen allows you to select the folder in your hard drive for installing Comodo Internet Security. The default...
http://help.comodo.com/topic-72-1-284-3004-CIS-Premium-Installation.html...state of enabled. Advanced users wishing to gain greater insight into CIS actions and/or to have more control over security decisions may wish to disable this option. Choosing Installation Location Click the 'Files Locations' tab to choose the installation path. This screen allows you to select the folder in your hard drive for installing Comodo Internet Security...
http://help.comodo.com/topic-72-1-284-3005-CIS-Pro-Installation-and-Activation.html...States)). Themes The 'Themes' drop-down allows you to choose the colors and appearance of the GUI as you prefer (Default = Comodo Default Normal). In order for your language and theme choices to take effect, you must restart the Comodo Internet Security application. Click 'Yes' to restart the application. You can also...
http://help.comodo.com/topic-72-1-284-3042-Appearance.html...states of Antivirus, Firewall and Defense+. Setup the Firewall for maximum security and usability - A brief outline of the setting up a secure connection to Internet Block Internet Access while allowing local network (LAN) Access - guidance on configuring the Firewall to allow only Intranet or LAN connection and to block Internet connection Block/Allow websites selectively to users of your computer...
http://help.comodo.com/topic-72-1-623-7597-Appendix-1-CIS-How-to...-Tutorials.html...state changes and network activity will be recorded. If these behaviors are found to be malicious then the signature of the executable is automatically added to the antivirus black list. If no malicious behavior is recorded then the file is placed into 'Unrecognized Files' and will be submitted to our technicians for further checks. Note: Behavior Analysis can identify...
http://help.comodo.com/topic-72-1-284-3035-Unknown-Files---The-Sand-boxing-and-Scanning-Processes.html...state of enabled. Advanced users wishing to gain greater insight into CIS actions and/or to have more control over security decisions may wish to disable this option. Choosing Installation Location Click the 'Files Locations' tab to choose the installation path. This interface allows you to set the installation folder for Comodo Internet Security. The default path is C:Program...
http://help.comodo.com/topic-72-1-284-3050-Installing-Comodo-Internet-Security-2012-Complete.html...state-of-the-art network intrusion prevention and detection system (IDS/IPS) directly built-in to its IP tables. Snort employs signature, protocol, and anomaly-based inspection of incoming traffic to detect and block intrusion attempts. Snort uses IPS 'rulesets'. Each ruleset contains a number of ips and application rules to identify applications that generate traffic on your network. Application identification...
http://help.comodo.com/topic-451-1-935-12753-Step-5---Configure-Firewall-Policy.html