Search Results

Showing 451-460 from 502

Scan And Clean Your Computer (in Advanced Endpoint Protection)

...updates are available they will be downloaded and installed. The scan, based on the profile you selected, will begin immediately.   The progress dialog shows the profile name, the location that is currently being scanned, the start time and duration of the scan, the total number of objects scanned so far, and the number of threats found: Click 'Pause' to suspend the scan Click 'Resume' to recommence the scan Click 'Stop Scan' to abort the scan altogether Results are shown at the end of the scan: Click the 'Results' button to see detailed file information. The results window lists...

http://help.comodo.com/topic-467-1-1052-16353-Scan-and-Clean-Your-Computer.html
Installing Comodo Internet Security 2012 Complete (in Comodo Internet Security)

...manually set-up their own trusted networks (this can be done in 'Network Zones' and through the 'Stealth Ports Wizard' ) CIS checks if the new network is an unencrypted WIFI network or not and if it is, the following warning will be displayed:     Select your choice from the two options above. If you select, 'Secure communication with TrustConnect', you will be presented with the opportunity to login into your existing account or create a new account:     Refer to the section TrustConnect Overview for more details. If you do not want to encrypt your traffic between...

http://help.comodo.com/topic-72-1-284-3050-Installing-Comodo-Internet-Security-2012-Complete.html
Appendix 1 - CCS How To... Tutorials (in Advanced Endpoint Protection)

...manual scan on selected folders/files to check for viruses and other malware Create an Antivirus scan schedule  - Set up antivirus scans to automatically run at specific times. Run an untrusted program inside the container  - Launch programs that you do not trust inside the container to eliminate the possibility of them causing damage to your computer Run browsers inside the Container  - Run your browser inside the container when you plan to visit untrusted websites  Restore incorrectly quarantined item(s)  - Restore files and executables that had been moved to quarantine by mistake Submit quarantined items to Comodo...

http://help.comodo.com/topic-467-1-1050-16702-Appendix-1---CCS-How-to...-Tutorials.html
Appendix 1 CIS How To... Tutorials (in Comodo Internet Security)

...manual scan on selected folders/files to check for viruses and other malware. Create an Antivirus scanning schedule - Guidance on time-table scheduling of antivirus scans to be run on selected items at selected intervals Run an untrusted program inside sandbox - Guidance on executing a program that you do not trust to be safe, inside sandbox to protect any harmful effects of the program upon your system. Run Browsers inside Sandbox - Guidance on running your browser, inside sandbox when you plan to visit untrusted websites. Run Untrusted Programs inside Virtual Desktop - Guidance on executing a program that you do not trust...

http://help.comodo.com/topic-72-1-623-7597-Appendix-1-CIS-How-to...-Tutorials.html
CIS Pro-Installation And Activation (in Comodo Internet Security)

...manually set-up their own trusted networks (this can be done in ' Network Zones ' and through the ' Stealth Ports Wizard '). CIS checks if the new network is an unencrypted WIFI network or not and if it is, the following warning will be displayed:     Select your choice from the two options above. If you select, 'Secure communication with TrustConnect', you will be presented with the opportunity to login into your existing account or create a new account:     Refer to the section TrustConnect Overview for more details. If you do not want to encrypt your traffic between...

http://help.comodo.com/topic-72-1-284-3005-CIS-Pro-Installation-and-Activation.html
CIS Premium Installation (in Comodo Internet Security)

...manually set-up their own trusted networks (this can be done in   'Network Zones' and through the 'Stealth Ports Wizard' ) CIS checks if the new network is an unencrypted WIFI network or not and if it is, the following warning will be displayed:     Select your choice from the two options above. If you select, 'Secure communication with TrustConnect', you will be presented with the opportunity to login into your existing account or create a new account:      Refer to the section TrustConnect Overview for more details.   If you do not want to encrypt your...

http://help.comodo.com/topic-72-1-284-3004-CIS-Premium-Installation.html
Appendix 2 - Comodo Secure DNS Service (in Advanced Endpoint Protection)

...updates a DNS record, fundamentally eliminating the concept of a TTL. Smarter - Comodo's highly structured search and guide pages get you where you want to  be,  when you inadvertently attempt to go to a site that doesn't exist. Safer - As a leading provider of computer security solutions, Comodo is keenly aware of the dangers that plague the internet today. Secure DNS helps users keep safe online with its malware domain filtering feature. Secure DNS references a real-time block list (RBL) of harmful websites (i.e. phishing sites, malware sites, spyware sites, excessive advertising sites...

http://help.comodo.com/topic-467-1-1050-16720-Appendix-2---Comodo-Secure-DNS-Service.html
Protected Files And Folders (in Comodo Internet Security)

...manually add an individual file, file group or process Click the 'Add' button. Click here for a description of the choices available when selecting a file. Exceptions   Users can choose to selectively allow another application (or file group) to modify a protected file by affording the appropriate Access Right in ' Computer Security Policy '. A simplistic example would be the imaginary file 'Accounts.ods'. You would want the Open Office Calc program to be able to modify this file as you are working on it, but you would not want it to be accessed by a potential malicious program. You would...

http://help.comodo.com/topic-72-1-284-3031-Protected-Files-and-Folders.html
Scan Exclusions (in Advanced Endpoint Protection)

...manually. Note - excluded items are skipped by the real-time scanner but will be scanned during on-demand scans. See  'Exclude Programs/Applications from real-time scans ' for more details. Exclude Drives/Folders/Files from all types of scans Click 'Settings' on the CCS home screen Click 'Advanced Protection' > 'Scan Exclusions' Open the 'Excluded Paths' tab Click the 'Add' button: You can add a: File  Group Drive partition/Folder or an individual file   Add a File Group Choose 'File Groups' to exclude a pre-set category of files or folders. This provides a convenient way to apply a generic ruleset...

http://help.comodo.com/topic-467-1-1050-16695-Scan-Exclusions.html
Create, Schedule And Run A Custom Scan Profile (in Xcitium Enterprise)

...manually handling detected threats. Enabled = Threats are handled automatically. Choose the action that XCS should automatically take: Quarantine Threats - Malicious items will be moved to quarantine. You can review quarantined items and delete them permanently or restore them. See ' Manage Quarantined Items ' for more details. Disinfect Threats - If a disinfection routine exists, XCS will remove the virus and keep the original file. If not, the file will be quarantined. ( Default ) Show scan results window - You will see a summary of results at the end of the scan. This includes the number of objects scanned and the number of threats found...

http://help.comodo.com/topic-463-1-1033-15953-Create,-Schedule-and-Run-a-Custom-Scan-Profile.html
Pages 46 of 51 « Prev     Next »   Jump to page