Search Results

Showing 421-430 from 854

Protected Keys (in Endpoint Manager)

...running in the container. Adding important registry keys to this area will protect them from unknown and potentially malicious programs. Open the 'Protected Keys' section Click 'Settings' on the CCS home screen Click 'Containment' > 'Protected Objects' Select the 'Protected Keys' tab The buttons at the top provide the following options: Add - Select registry groups or individual keys that you want...

http://help.comodo.com/topic-399-1-904-13786-Protected-Keys.html
Protected Keys (in Xcitium Enterprise)

...running in the container. Adding important registry keys to this area will protect them from unknown and potentially malicious programs. Open the 'Protected Keys' section Click 'Settings' on the XCS home screen Click 'Containment' > 'Protected Objects' Select the 'Protected Keys' tab The buttons at the top provide the following options: Add - Select registry groups or individual keys that you want...

http://help.comodo.com/topic-463-1-1033-15965-Protected-Keys.html
The Main Interface (in Threat Hunter Assessment Tool (THAT))

...run scans, view results and generate risk reports.  Main Functional Areas  Title Bar – Shows Product name and current step involved                       Step 1: Scanning Network to Find Endpoints               Step 2: Scanning Any Kind of Threats  Menu Bar – Shows the status of the scan and contains the following buttons...

http://help.comodo.com/topic-1400006-1-1400007-60-The-Main-Interface.html
View Active Internet Connections (in Comodo Internet Security)

...running processes are unsafe and to shut them all down with a single click. You can also use Killswitch to trace back to the malware that generated the process.   Comodo KillSwitch can be directly accessed from the 'View Connections' by clicking the 'More' button.     If Comodo KillSwitch is already installed in your computer, clicking 'More' will open...

http://help.comodo.com/topic-72-1-451-5719-View-Active-Internet-Connections.html
Active Directory Integration (in Comodo Dome Firewall)

...button to choose which users should not be tracked. Sync Agent Configuration – Enables you to export the current configuration of the agent. Click 'Apply' to save the configuration Click 'Save and Close' to close the application window. The agent process will continue to run in the background.   The agent is now configured to connect to the virtual appliance. The next...

http://help.comodo.com/topic-451-1-936-12832-Active-Directory-Integration.html
Active Directory Integration (in Comodo Dome Firewall)

...button to specify users who should not be tracked. Sync Agent Configuration - Enables you to export the current configuration of the agent. Click 'Apply' to save your configuration Click 'Save and Close' to close the application window. The agent process will continue to run in the background. The agent is now configured to connect to DCF. The next step is to configure...

http://help.comodo.com/topic-451-1-940-12920-Active-Directory-Integration.html
FAQ (in Comodo Anti-Theft For Android)

...run the installer again and reinstall Anti-Theft. How do I uninstall Comodo Anti-Theft? To uninstall Comodo Anti-Theft you first need to remove it's protection: Tap 'Device Admin' from the Comodo Antitheft home screen Tap the 'Deactivate' button Type your password and tap 'Unlock' Now, go to 'Apps' on your device, select 'Anti-Theft' and uninstall it. I forgot...

http://help.comodo.com/topic-168-1-674-8695-FAQ.html
Comodo Firewall – Summary (in Comodo Internet Security)

...Run a Program in the Sandbox .    4. Live Support The bottom left corner of the interface has a live support area that enables the user to get support/ assistance from competent and friendly computer experts at Comodo, when a necessity occurs. Clicking the 'CHAT NOW' button launches the GeekBuddy to start a chat session for getting personal...

http://help.comodo.com/topic-72-1-284-3010-Comodo-Firewall-–-Summary.html
Identify And Kill Unsafe Running Processes (in Endpoint Manager)

...running processes are unsafe and to shut them all down with a single click. You can also use Killswitch to trace back to the malware that generated the process. Comodo KillSwitch can be directly accessed from the CCS interface by clicking the 'Watch Activity' button in the 'Advanced Tasks' interface. If you do not already have KillSwitch installed, then clicking...

http://help.comodo.com/topic-399-1-790-10304-Identify-and-Kill-Unsafe-Running-Processes.html
Identify And Kill Unsafe Running Processes (in Comodo Antivirus for Servers)

...running processes are unsafe and to shut them all down with a single click. You can also use Killswitch to trace back to the malware that generated the process. Comodo KillSwitch can be directly accessed from the CAVS interface by clicking the 'Watch Activity' button in the 'Advanced Tasks' interface. Clicking the 'Watch Activity' for the first time, CAVS will...

http://help.comodo.com/topic-213-1-517-6006-Identify-and-Kill-Unsafe-Running-Processes.html
Pages 43 of 86 « Prev     Next »   Jump to page