Showing 471-480 from 502
...manually or by importing user groups from an AD server. Device Group - An admin-defined grouping of Android, iOS, Linux, MAC or Windows devices. Configuration profiles applied to a device group will be deployed to all devices in the group. Quarantine - Malware found on managed networks can either be deleted or isolated in a secure environment known as 'quarantine'. Files moved to quarantine are encrypted so they cannot be executed. Admins can review quarantined items and delete or release the files. Quarantined files can also be added to the local whitelist and submitted to Xcitium as a potential false-positive...
http://help.comodo.com/topic-463-1-1029-15541-Key-Concepts.html...updated automatically prior to the scan. Click 'Send to Background' to make the task consumer fewer resources. Background tasks can be viewed in the 'Task Manager' interface. Click 'Stop' If you do not want the scan to continue at this time. Results will appear at the end of the scan. The results show the number of objects scanned and any identified threats: Select 'Clean' from the drop-down at top-right and click 'Apply Selected Actions' to remove all threats from your computer. See ' Process Infected Files ' if you need more help. Step 4 - Select your location Select your...
http://help.comodo.com/topic-72-1-772-9446-CIS-Complete---Installation-and-Activation.html...Manually add individual keys or registry groups Click the 'Add' button Registry Groups – Select a pre-defined group of important registry keys. XCS ships with the following, pre-defined groups: Automatic Startup keys Comodo Keys Internet Explorer Keys Important Keys Temporary Keys You can also create custom groups of the keys you want to protect. See Registry Groups in the HIPS Groups if you want help on this. Click the 'Add' button > 'Registry Groups' > Select a key group from the list > Click 'OK' Registry Entries - Add individual keys to the protected list Click 'Add' > 'Registry Entries...
http://help.comodo.com/topic-463-1-1033-15965-Protected-Keys.html...updated antivirus scanner which provides dependable protection against known malicious files. Comodo Automated Malware Analysis (CAMAS) – A cloud based behavior analysis service which improves detection of zero-day threats by rigorously testing the run-time actions of unknown files. Based on the analysis files are identified as: Safe – Files identified as known good files from the whitelist/clean/safe are allowed to be downloaded at the endpoint Threats – Files identified as known bad from the blacklist/malicious/threats are blocked and a warning is displayed at the endpoint Unknown – Files that could not be identified are classified as 'Unknown'. These files are subjected...
http://help.comodo.com/topic-451-1-936-12787-Advanced-Threat-Protection.html...manual Antivirus scans in addition to the real-time scanning. On-Demand scanning is also seamlessly integrated into the Windows operating system. Users can scan specific objects ‘on the fly’ by simply right-clicking on a file, folder or drive and selecting Scan with Comodo AntiVirus ’ from the context sensitive menu . The Antivirus tasks center can be accessed at all times by clicking on the Antivirus tab from the navigation panel. The Antivirus main configuration area provides easy access to all the features. Click the links below to see detailed explanations of each area in this section...
http://help.comodo.com/topic-72-1-284-2943-Antivirus-Tasks-Introduction.html...updated automatically prior to the scan. Click 'Send to Background' to make the task consumer fewer resources. Background tasks can be viewed in the 'Task Manager' interface. Click 'Stop' If you do not want the scan to continue at this time. Results will appear at the end of the scan. The results show the number of objects scanned and any identified threats: Select 'Clean' from the drop-down at top-right and click 'Apply Selected Actions' to remove all threats from your computer. See ' Process Infected Files ' if you need more help. Step 4 - Select your location Select your...
http://help.comodo.com/topic-72-1-772-9445--CIS-Pro---Installation-and-Activation.html...manual scans run by the user and files identified as malicious by Valkyrie analysis. To view Antivirus logs Click 'View Logs' on the CCAV home screen OR click the 'View Logs' button on the widget Select 'Antivirus' from the 'Log Type' drop-down at the top left Column Descriptions 1 . Date/Time - The precise date and time of the antivirus event 2. Path - The installation/storage path of the file identified as malware 3. Type – Indicates the type of scan from which the item was identified 4. Status - Gives the status of the action taken. It can be either 'Ignored', 'Blocked' 'Quarantined...
http://help.comodo.com/topic-394-1-767-9234-Antivirus-Logs.html...Manually add an individual file, folder, file group or file group Click 'Settings' on the CIS home-screen Click 'HIPS' > 'Protected Objects' > 'Protected Files' Click the 'Add' button You can add items using any of the following methods: Select from File Groups Browse to the File Browse to the Folder Select from currently running Processes Add a File Group A file group is a pre-set category of files or folders. Adding a file group to protected files is a convenient way to protect an entire class of files and folders. For example - by protecting the 'Executables' group...
http://help.comodo.com/topic-72-1-766-9186-Protected-Files.html...update any of the information you have entered so far. To send the quote from QM, click the 'Send' button. The quote 'Status' will change to 'Published' Customers will receive a notification email which contains a link to a web-page containing your quote. Customers can provide feedback or accept/reject your quote on this page. Your quote is securely hosted on https://quote.comodo.com . See Step 5 for more details on quote finalization You can set reminders per quote from main 'Quotes' interface. Click 'Quote Manager', then click any quote in the list. Click 'Download PDF' on the details screen...
http://help.comodo.com/topic-289-1-776-9770-Step-4---Generate-and-Send-a-Quote.html...manually enter your username/password. All saved passwords are securely stored in your Dragon user profile. You can also sync your passwords with your account so you can access you saved passwords on other devices you use. You need to sign in to Comodo Dragon to sync passwords. You should turn off this feature if you share the browser with another user. Access password settings Click the menu at top-right Click 'Autofill' > 'Passwords' OR Click the hamburger icon at top-left > 'Passwords' section: By default, Comodo Dragon offers to save your web passwords. If enabled, Dragon will...
http://help.comodo.com/topic-120-1-279-4309-Manage-Website-Passwords.html