Search Results

Showing 551-560 from 638

Manage Add-on Permissions (in Comodo IceDragon)

... Manage Add-on Permissions    Add-ons are small pieces of software designed to expand the functionality of Ice Dragon. Add-ons are broadly classified as: Extensions - Add new features to the browser. Examples include extensions to auto-update Facebook profiles, analyze your typing skills, detect website trackers, compare prices from different e-merchants and more. Appearance – Customize how...

http://help.comodo.com/topic-169-1-413-4493-Manage-Add-on-Permissions.html
Restrictions Settings For Mac OS Profile (in Xcitium Enterprise)

... Restrictions Settings for Mac OS Profile The 'Restrictions' section allows you to modify the profile to enable or disable selected device features. Click 'Assets' > 'Configuration Templates' > 'Profiles' Open the Mac OS profile you want to work on Click the 'Restrictions' tab then 'Edit', if it has already been added to the profile OR Click 'Add Profile Section' >...

http://help.comodo.com/topic-463-1-1029-15701-Restrictions-Settings-for-Mac-OS-Profile.html
Network Zones (in Advanced Endpoint Protection)

... Network Zones   Click 'Settings' > 'Firewall' > 'Network Zones' > 'Network Zones' A 'Network Zone' can consist of an individual machine (like a home computer connected to the internet) or a network of thousands of machines. You can grant or deny access to a network zone as required.   Background Note: A computer network is a connection between computers...

http://help.comodo.com/topic-467-1-1050-16655-Network-Zones.html
Active HIPS Rules (in Advanced Endpoint Protection)

... Active HIPS Rules   Click 'Settings' > 'HIPS' > 'HIPS Rules' The rules screen shows your installed applications classified into file groups, and the HIPS ruleset that applies to them. You can change the ruleset of a specific application or file group, and create your own custom rulesets. Open the HIPS Rules panel Click 'Settings' on the CCS home Click...

http://help.comodo.com/topic-467-1-1050-16660-Active-HIPS-Rules.html
Create And Manage COM Groups (in Xcitium Enterprise)

... Create and Manage COM Groups Click 'Settings' > 'System Templates' > 'COM Variables' Each COM group is a handy collection of COM interfaces falling under a certain category. Xcitium Enterprise ships with a set of predefined COM Groups that are available for use in configuration profiles, for example to add a COM group to the 'Protected Objects' list in the...

http://help.comodo.com/topic-463-1-1029-15776-Create-and-Manage-COM-Groups.html
View Active Process List (in Xcitium Enterprise)

... View Active Process List    Click 'Tasks' > 'Advanced Tasks' > 'View Active Processes'  The active process list shows all processes started by applications currently running on your system. XCS can identify the parent application of a process to detect when a non-trusted application is trying to spawn a trusted application. XCS can then deny access rights...

http://help.comodo.com/topic-463-1-1033-15861-View-Active-Process-List.html
Network Zones (in Xcitium Enterprise)

... Network Zones   Click 'Settings' > 'Firewall' > 'Network Zones' > 'Network Zones' A 'Network Zone' can consist of an individual machine (like a home computer connected to the internet) or a network of thousands of machines. You can grant or deny access to a network zone as required. Background Note: A computer network is a connection between computers through...

http://help.comodo.com/topic-463-1-1033-15960-Network-Zones.html
Active HIPS Rules (in Xcitium Enterprise)

... Active HIPS Rules Click 'Settings' > 'HIPS' > 'HIPS Rules' The rules screen shows your installed applications classified into file groups, and the HIPS ruleset that applies to them. You can change the ruleset of a specific application or file group, and create your own custom rulesets. Open the HIPS Rules panel Click 'Settings' on the XCS home Click 'HIPS...

http://help.comodo.com/topic-463-1-1033-15931-Active-HIPS-Rules.html
Protected Files And Folders (in Xcitium Enterprise)

... Protected Files and Folders Click 'Settings' > 'Containment' >'Protected Objects' > 'Protected Data' Items in 'Protected Data' cannot be seen, accessed or modified by applications running in the container. This fortifies files containing sensitive data from unrecognized and potentially malicious programs. Protected Files and Protected Data Items in ' Protected Files ' ('Settings' > 'HIPS' > 'Protected Objects' > 'Protected Files...

http://help.comodo.com/topic-463-1-1033-15964-Protected-Files-and-Folders.html
Manage Quarantined Items (in Endpoint Manager)

... Manage Quarantined Items The quarantine facility removes and isolates suspicious files into a safe location before analyzing them for possible infection. Any files transferred in this fashion are encrypted- meaning they cannot be run or executed. This isolation prevents infected files from affecting the rest of your PC. If a file cannot be disinfected, then it provides a reliable safe...

http://help.comodo.com/topic-399-1-790-10291-Manage-Quarantined-Items.html
Pages 56 of 64 « Prev     Next »   Jump to page