Search Results

Showing 41-50 from 148

Manual Scanning (in Comodo Internet Security)

...analysis - Files which are identified as 'unknown' i.e. the files are neither in the safe-list or black list, from the cloud based scanning to Comodo for analysis. The files will be analyzed by experts at Comodo and added to the white list or black list accordingly. This will help maintaining the white list and black list more up-to-date...

http://help.comodo.com/topic-72-1-284-3012-Manual-Scanning.html
Installation (in Comodo Cloud Antivirus)

...Cloud Based Behavior Analysis If enabled, any file that is identified as unknown is submitted to Comodo Valkyrie for behavior analysis. Unknown files are subjected to a range of static and dynamic tests to determine whether they behave in a malicious manner. The results will be sent back to your computer in around 15 minutes. Comodo recommends users leave this...

http://help.comodo.com/topic-394-1-767-9216-Installation.html
Run A Rating Scan (in Comodo Internet Security)

...cloud based analysis Age : The period of time that the file has been stored on your computer Auto-run : Indicates whether the file is an auto-run file or not. Malicious auto-run files could be ruinous to your computer so we advise you clean or quarantine them immediately. Each file identified as 'Bad' is accompanied with a drop-down...

http://help.comodo.com/topic-72-1-721-8682-Run-a-Rating-Scan.html
Key Concepts (in Xcitium Enterprise)

...cloud-based file verdict service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious. XCS on managed Windows computers can automatically submit unknown files to Valkyrie for analysis. The results of these tests produce a trust verdict on the file which can be viewed from the Xcitium interface. Data...

http://help.comodo.com/topic-463-1-1029-15541-Key-Concepts.html
View Properties Of A Process (in Xcitium Cleaning Essentials)

...Cloud based verification of a file's digital signature  -  Local verifier of trusted vender Local check that the creator of the file is on the trusted vendor list  Checks that the file has a digital signature. If it does, then checks this signature is in the trusted vendor list.  CAMAS  File is uploaded to Comodo Automated Malware Analysis...

http://help.comodo.com/topic-119-1-328-3548-View-Properties-of-a-Process.html
Unknown Files - The Scanning Processes (in Comodo Internet Security)

...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...

http://help.comodo.com/topic-72-1-766-9196-Unknown-Files---The-Scanning-Processes.html
Unknown Files: The Scanning Processes (in Comodo Antivirus for Servers)

...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...

http://help.comodo.com/topic-213-1-517-8245-Unknown-Files:-The-Scanning-Processes.html
Unknown Files - The Scanning Processes (in Endpoint Manager)

...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...

http://help.comodo.com/topic-399-1-790-10410-Unknown-Files---The--Scanning-Processes.html
Unknown Files - The Auto - Sandboxing And Scanning Processes (in Comodo Internet Security)

...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...

http://help.comodo.com/topic-72-1-522-6372-Unknown-Files---The-Auto---Sandboxing-and-Scanning-Processes.html
Unknown Files - The Sand-boxing And Scanning Processes (in Comodo Internet Security)

...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity...

http://help.comodo.com/topic-72-1-284-3035-Unknown-Files---The-Sand-boxing-and-Scanning-Processes.html
Pages 5 of 15 « Prev     Next »   Jump to page