Showing 41-50 from 148
...analysis - Files which are identified as 'unknown' i.e. the files are neither in the safe-list or black list, from the cloud based scanning to Comodo for analysis. The files will be analyzed by experts at Comodo and added to the white list or black list accordingly. This will help maintaining the white list and black list more up-to-date...
http://help.comodo.com/topic-72-1-284-3012-Manual-Scanning.html...Cloud Based Behavior Analysis If enabled, any file that is identified as unknown is submitted to Comodo Valkyrie for behavior analysis. Unknown files are subjected to a range of static and dynamic tests to determine whether they behave in a malicious manner. The results will be sent back to your computer in around 15 minutes. Comodo recommends users leave this...
http://help.comodo.com/topic-394-1-767-9216-Installation.html...cloud based analysis Age : The period of time that the file has been stored on your computer Auto-run : Indicates whether the file is an auto-run file or not. Malicious auto-run files could be ruinous to your computer so we advise you clean or quarantine them immediately. Each file identified as 'Bad' is accompanied with a drop-down...
http://help.comodo.com/topic-72-1-721-8682-Run-a-Rating-Scan.html...cloud-based file verdict service that tests unknown files with a range of static and behavioral checks in order to identify those that are malicious. XCS on managed Windows computers can automatically submit unknown files to Valkyrie for analysis. The results of these tests produce a trust verdict on the file which can be viewed from the Xcitium interface. Data...
http://help.comodo.com/topic-463-1-1029-15541-Key-Concepts.html...Cloud based verification of a file's digital signature - Local verifier of trusted vender Local check that the creator of the file is on the trusted vendor list Checks that the file has a digital signature. If it does, then checks this signature is in the trusted vendor list. CAMAS File is uploaded to Comodo Automated Malware Analysis...
http://help.comodo.com/topic-119-1-328-3548-View-Properties-of-a-Process.html...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...
http://help.comodo.com/topic-72-1-766-9196-Unknown-Files---The-Scanning-Processes.html...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...
http://help.comodo.com/topic-213-1-517-8245-Unknown-Files:-The-Scanning-Processes.html...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...
http://help.comodo.com/topic-399-1-790-10410-Unknown-Files---The--Scanning-Processes.html...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...
http://help.comodo.com/topic-72-1-522-6372-Unknown-Files---The-Auto---Sandboxing-and-Scanning-Processes.html...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity...
http://help.comodo.com/topic-72-1-284-3035-Unknown-Files---The-Sand-boxing-and-Scanning-Processes.html