Showing 501-510 from 547
...state. Turn off computer if no threats are found at the end of the scan - Selecting this option turns your computer off, if no threats are found during the scan. This is useful when you are scheduling the scans to run at nights. Click 'OK' to save the profile. Note: The scheduled scan will run only if it is enabled...
http://help.comodo.com/topic-72-1-623-7729-Scan-Profiles.html...state changes and network activity will be recorded. If these behaviors are found to be malicious, the file is submitted to our technicians for further manual checks and confirmation. If the manual testing confirms it as a malware, then it will be added to the global blacklist which will benefit all users. The results will be sent back...
http://help.comodo.com/topic-72-1-623-7755-Unknown-Files---The-Scanning-Processes.html...states how the customer answered the alert. The Alerts logs can be viewed by selecting 'Alerts' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time of the alert generation. Type - Indicates the type of the alert - Antivirus, Firewall or Advanced Protection (HIPS/Auto-Containment) Description - Brief description of the file...
http://help.comodo.com/topic-399-1-790-10346-Alerts-Logs.html...state 'Block File' if the action was not allowed. Target - Location of the file, COM interface or registry key accessed by the process. Alert - Click 'Related Alert' to view the notification generated by the event. Note : Alerts are only shown if 'Do not pop-up alerts' is disabled in 'Settings' > 'HIPS Configuration > 'HIPS Settings'. See HIPS Settings for more...
http://help.comodo.com/topic-399-1-904-11828-HIPS-Logs.html...Comodo Client - Security, please ensure that your computer complies with the minimum system requirements as stated below. CCS for MAC solution is compatible with the following hardware platform: Mac Intel x86_64 Operating systems: Mac OS X 10.11.x Mac OS X 10.12.x Mac OS X 10.13.x Mac OS X 10.14.x Mac OS X 10.15.x ...
http://help.comodo.com/topic-467-1-1055-16367-System-Requirements.html...State – Whether the device was allowed or blocked. Export - Save the logs as a HTML file. You can also right-click inside the log viewer and choose 'Export'. Open log file - Browse to and view a saved log file. Cleanup log file - Delete the selected event log. Refresh - Reload the current list and show the latest logs. Click any column...
http://help.comodo.com/topic-399-1-904-11902-Device-Control-Logs.html...state-of-the-art antivirus engine from Comodo, a leader in Internet Security. The antivirus engine uses constantly updated virus signature database and provides comprehensive protection against malware outbreaks on your network. Comodo Antivirus periodically scans all files and documents in the network and automatically moves any threats to quarantine, in addition to on-access scans run based on the ATP profile...
http://help.comodo.com/topic-451-1-936-12822-Comodo-Antivirus.html...state. Enter the name of the restore point Shell Execute Basic Enter the execution command for the process Enter the parameters to be passed to the process Advanced Enter the working directory for the process Choose the execution options: Wait for process to finish – Completes the process before termination Hide Window – Executes the process at the background File Transfer Enter...
http://help.comodo.com/topic-289-1-719-8563-Manage-Procedures.html...state of the firewall. This includes running services, memory and disk use, active modules, uptime and user access. See System Status for more details. Network Status – Details about active network interfaces. See Network Status for more details. System Graphs – Real-time resource usage data, including CPU, physical memory, disk space and more. See System Usage Summaries for more details. Traffic...
http://help.comodo.com/topic-451-1-936-12759-View-DFW-Virtual-Appliance-Status.html...state changes and network activity will be recorded. If these behaviors are found to be malicious then the signature of the executable is automatically added to the antivirus black list. If no malicious behavior is recorded then the file is placed into 'Unrecognized Files' and will be submitted to our technicians for further checks. Note: Behavior Analysis can identify malicious...
http://help.comodo.com/topic-213-1-517-8245-Unknown-Files:-The-Scanning-Processes.html