Showing 511-520 from 638
... Browser Settings Protection Browsers that are protected include IE, Comodo Dragon, Ice Dragon, Firefox and Chrome. If protection is switched on, the blocked apps will be automatically added to the list. You can also manually add individual apps and configure their browser access settings. To open the 'Browser Settings Protection' interface Click 'Settings' at the top left of the CCAV...
http://help.comodo.com/topic-394-1-767-11312-Browser-Settings-Protection.html... DLP Quarantined Files Click 'Security' > 'Endpoint Security' > 'Data Loss Prevention' > 'Quarantined Files' The DLP quarantined files screen shows files that were quarantined on endpoints by a discovery rule. Click 'Security' > 'Endpoint Security' > 'Data Loss Prevention' Select the 'Quarantined Files' tab Select a group to view only the DLP quarantined files on the devices in that...
http://help.comodo.com/topic-463-1-1029-16150-DLP-Quarantined-Files.html... Filtering Viruscope Logs Comodo Internet Security allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters Preset Time Filters Advanced Filters Preset Time Filters: Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged...
http://help.comodo.com/topic-72-1-623-7952-Filtering-Viruscope-Logs.html... Create and Manage File Groups Click 'Settings' > 'System Templates' > 'File Groups Variables' File groups are handy, predefined groupings of one or more file types. You can select a file group as the target of various functions and rules. For example, you scan specify that a file group is excluded from AV scans, or that everything in a file...
http://help.comodo.com/topic-463-1-1029-15777-Create-and-Manage-File-Groups.html... Configuring the Sandbox The 'Sandbox Settings' section of 'Advanced Settings' allows you to configure the Sandbox settings that determine how proactive the Sandbox should be and which types of files it should check. The 'Sandbox' panel can be accessed by clicking 'Tasks > Sandbox Tasks > Open Advanced Settings > Security Settings > HIPS > Sandbox Click the following...
http://help.comodo.com/topic-72-1-623-7736-Configuring-the-Sandbox.html... Protected COM Interfaces Component Object Model (COM) is Microsoft's object-oriented programming model that defines how objects interact within a single application or between applications - specifying how components work together and inter-operate. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch attacks on your computer...
http://help.comodo.com/topic-72-1-623-7752-Protected-COM-interfaces.html... Protected Registry Keys The 'Registry Protection' panel allows you to protect system critical registry keys against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified in any way. It is essential that your registry keys are protected against any type of attack. Click the 'Registry Keys' tab in the Protected...
http://help.comodo.com/topic-72-1-623-7751-Protected-Registry-Keys.html... Set Your Homepage You can configure IceDragon to open at a specific page, or open a set of pages at startup. You can also make it start with a blank page or with the pages that were open at the end of your last session Click the following links for more help: Configure startup Configure Home page Configure...
http://help.comodo.com/topic-169-1-413-4463-Set-Your-Homepage.html... Blocked Files Defense+ allows you to lock-down files and folders by completely denying all access rights to them from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files that are placed...
http://help.comodo.com/topic-72-1-623-7750-Blocked-Files.html... Manage Quarantined Items The quarantine facility removes and isolates suspicious files into a safe location before analyzing them for possible infection. Any files transferred in this fashion are encrypted- meaning they cannot be run or executed. This isolation prevents infected files from affecting the rest of your PC. If a file cannot be disinfected, then it provides a reliable safe...
http://help.comodo.com/topic-72-1-623-7612-Manage-Quarantined-Items.html