Showing 531-540 from 638
... Manage Quarantined Items The quarantine facility removes and isolates suspicious files into a safe location before analyzing them for possible infection. Any files transferred in this fashion are encrypted- meaning they cannot be run or executed. This isolation prevents infected files from affecting the rest of your PC. If a file cannot be disinfected, then it provides a reliable safe...
http://help.comodo.com/topic-72-1-522-6247-Manage-Quarantined-Items.html... Filtering Antivirus Logs Comodo Internet Security allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters: Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged...
http://help.comodo.com/topic-72-1-522-6265-Filtering-Antivirus-Logs.html... Protected Files The Protected Files tab displays a list of files and file groups that are protected from access by other programs, especially malicious programs such as virus, Trojans and spyware. It is also useful for safeguarding very valuable files (spreadsheets, databases, documents) by denying anyone and any program the ability to modify the file - avoiding the possibility of accidental...
http://help.comodo.com/topic-213-1-517-6025-Protected-Files.html... Blocked Files Defense+ allows you to lock-down files and folders by completely denying all access rights to them from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files that are placed...
http://help.comodo.com/topic-72-1-522-6310-Blocked-Files.html... Protected Files The Protected Files tab displays a list of files and file groups that are protected from access by other programs, especially malicious programs such as virus, Trojans and spyware. It is also useful for safeguarding very valuable files (spreadsheets, databases, documents) by denying anyone and any program the ability to modify the file - avoiding the possibility of accidental...
http://help.comodo.com/topic-72-1-522-6309-Protected-Files-.html... Filtering 'Tasks Launched' Logs CAVS allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged tasks...
http://help.comodo.com/topic-213-1-517-5996-Filtering-Tasks-Launched-Logs.html... Filtering Antivirus Logs CAVS allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters: Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged events for...
http://help.comodo.com/topic-213-1-517-5990-Filtering-Antivirus-Logs.html... Manage Detected Threats The 'Detected Threats' interface shows items identified as malicious, but which have yet to be processed. The interface also displays the current status of each item - whether it is quarantined, removed, trusted or submitted as a false positive to Comodo. You can also apply actions like move the detected threats to 'Quarantine' or 'Trusted files...
http://help.comodo.com/topic-394-1-767-9228-Manage-Detected-Threats.html... Active HIPS Rules Click 'Settings' > 'HIPS' > 'HIPS Rules' The rules screen shows your installed applications classified into file groups, and the HIPS ruleset that applies to them. You can change the ruleset of a specific application or file group, and create your own custom rulesets. Open the HIPS Rules panel Click 'Settings' at the top of...
http://help.comodo.com/topic-72-1-766-9164-Active-HIPS-Rules.html... Protected Data Files and Folders Click 'Settings' > 'HIPS' > 'Protected Objects' > 'Protected Data' Items in 'Protected Data' cannot be seen, accessed or modified by applications running in the container This fortifies files containing sensitive data from unrecognized and potentially malicious programs Protected Files and Protected Data Items in ' Protected Files ' can be read by any program, but...
http://help.comodo.com/topic-72-1-766-9190-Protected-Data-Files-and-Folders.html