Search Results

Showing 411-420 from 505

Special Features (in Comodo Internet Security)

...scans at a time that suits you; Simple to use - install it and forget it - Comodo AV protects you in the background. Intuitive Graphical User Interface Advanced and Compact View summary screens gives an at-a-glance snapshot of your security settings; Easy and quick navigation between each module of the firewall, Antivirus and Defense+; Simple point and click configuration - no steep learning curves; New completely redesigned security rules interface - you can quickly set granular access rights and privileges on a global or per application. The firewall also contains preset policies and wizards that help simplify the rule setting process...

http://help.comodo.com/topic-72-1-522-6222-Special-Features.html
Special Features (in Comodo Internet Security)

...scans at a time that suits you; Simple to use - install it and forget it - Comodo AV protects you in the background. Intuitive Graphical User Interface Advanced and Compact View summary screens gives an at-a-glance snapshot of your security settings; Easy and quick navigation between each module of the firewall, Antivirus and Defense+; Simple point and click configuration - no steep learning curves; New completely redesigned security rules interface - you can quickly set granular access rights and privileges on a global or per application. The firewall also contains preset policies and wizards that help simplify the rule setting process...

http://help.comodo.com/topic-72-1-451-4686-Special-Features.html
Special Features (in Comodo Internet Security)

...scans at a time that suits you; Simple to use - install it and forget it - Comodo AV protects you in the background. Intuitive Graphical User Interface Summary screen gives an at-a-glance snapshot of your security settings; Easy and quick navigation between each module of the firewall; Simple point and click configuration - no steep learning curves; New completely redesigned security rules interface - you can quickly set granular access rights and privileges on a global or per application. The firewall also contains preset policies and wizards that help simplify the rule setting process. Comodo GeekBuddy (Pro and Complete versions only...

http://help.comodo.com/topic-72-1-284-2953-Special-Features.html
HIPS Behavior Settings (in Comodo Antivirus for Servers)

...disable monitoring of an activity, entity or object using this interface it completely switches off monitoring of that activity on a global basis - effectively creating a universal ' Allow ' rule for that activity . This 'Allow' setting over-rules any Ruleset specific 'Block' or 'Ask' setting for that activity that you may have selected using the ' Access Rights ' and ' Protection Settings ' interface. Activities To Monitor: Interprocess Memory Access - Malware programs use memory space modification to inject malicious code for numerous types of attacks, including recording your keyboard strokes; modifying the behavior of the invaded application; stealing confidential data by sending confidential information...

http://help.comodo.com/topic-213-1-517-6021-HIPS-Behavior-Settings.html
Security Events (in Endpoint Manager)

...scan results screen File added to the exclusions list Containment - Windows devices File blocked, ignored, or run in the container by:  Auto-containment rules in the profile on the device A local user running the file in the container on a one-off basis  File Rating  - Windows devices Unrecognized and malicious files added to, or removed from, the XCS 'File list.' Changes to the trust rating of a file See Manage File Trust Ratings on Windows Devices for more details. Autorun Control – Windows devices Records the action taken by XCS on apps that try to modify Windows...

http://help.comodo.com/topic-399-1-786-13040-Security-Events.html
Special Features (in Endpoint Manager)

...scans at a time that suits you; Simple to use - install it and forget it - Comodo AV protects you in the background. Intuitive Graphical User Interface Advanced and Compact View summary screens gives an at-a-glance snapshot of your security settings; Easy and quick navigation between each module; Simple point and click configuration - no steep learning curves; New completely redesigned security rules interface - you can quickly set granular access rights and privileges on a global or per application. The firewall also contains preset policies and wizards that help simplify the rule setting process. Comodo Client Security - Extended Features Highly...

http://help.comodo.com/topic-399-1-790-10281-Special-Features.html
HIPS Settings (in Endpoint Manager)

...scanning software and intrusion-detection systems. Leave this option selected, and HIPS generates alerts when an application attempts to modify the memory space allocated to another application  (Default = Enabled) Windows/WinEvent Hooks -  In the Microsoft Windows® operating system, a hook is a mechanism by which a function can intercept events before they reach an application. Example intercepted events include messages, mouse actions and keystrokes. Hooks can react to these events and, in some cases, modify or discard them. Originally developed to allow legitimate software developers to develop more powerful and useful applications, hooks have also been exploited by hackers...

http://help.comodo.com/topic-399-1-786-10207-HIPS-Settings.html
HIPS Settings (in Endpoint Manager)

...disable monitoring of an activity or object here, it completely switches off monitoring of that activity on a global basis - effectively creating a universal ' Allow ' rule for the activity. This 'Allow' setting over-rules any specific 'Block' or 'Ask' setting for the activity that you may have created in the ' Access Rights ' and ' Protection Settings ' interface. Activities To Monitor: Interprocess Memory Access - Malware programs use memory space modification to inject malicious code for numerous types of attacks. These include recording your keyboard strokes; modifying the behavior of applications and stealing data by sending confidential information from one process to another...

http://help.comodo.com/topic-399-1-904-11864-HIPS-Settings.html
HIPS Settings (in Xcitium Enterprise)

...disable monitoring of an activity or object here, it completely switches off monitoring of that activity on a global basis - effectively creating a universal ' Allow ' rule for the activity. This 'Allow' setting over-rules any specific 'Block' or 'Ask' setting for the activity that you may have created in the ' Access Rights ' and ' Protection Settings ' interface. Activities To Monitor: Interprocess Memory Access - Malware programs use memory space modification to inject malicious code for numerous types of attacks. These include recording your keyboard strokes; modifying the behavior of applications and stealing data by sending confidential information from one process to another...

http://help.comodo.com/topic-463-1-1033-15930-HIPS-Settings.html
HIPS Settings (in Comodo Internet Security)

...disable monitoring of an activity, entity or object using this interface it completely switches off monitoring of that activity on a global basis - effectively creating a universal ' Allow ' rule for that activity . This 'Allow' setting over-rules any Ruleset specific 'Block' or 'Ask' setting for that activity that you may have selected using the ' Access Rights ' and ' Protection Settings ' interface. Activities To Monitor: Interprocess Memory Access - Malware programs use memory space modification to inject malicious code for numerous types of attacks. These include recording your keyboard strokes; modifying the behavior of applications and stealing data by sending confidential information from...

http://help.comodo.com/topic-72-1-766-9163-HIPS-Settings.html
Pages 42 of 51 « Prev     Next »   Jump to page