Showing 551-560 from 638
... Manage Add-on Permissions Add-ons are small pieces of software designed to expand the functionality of Ice Dragon. Add-ons are broadly classified as: Extensions - Add new features to the browser. Examples include extensions to auto-update Facebook profiles, analyze your typing skills, detect website trackers, compare prices from different e-merchants and more. Appearance – Customize how...
http://help.comodo.com/topic-169-1-413-4493-Manage-Add-on-Permissions.html... Restrictions Settings for Mac OS Profile The 'Restrictions' section allows you to modify the profile to enable or disable selected device features. Click 'Assets' > 'Configuration Templates' > 'Profiles' Open the Mac OS profile you want to work on Click the 'Restrictions' tab then 'Edit', if it has already been added to the profile OR Click 'Add Profile Section' >...
http://help.comodo.com/topic-463-1-1029-15701-Restrictions-Settings-for-Mac-OS-Profile.html... Network Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Network Zones' A 'Network Zone' can consist of an individual machine (like a home computer connected to the internet) or a network of thousands of machines. You can grant or deny access to a network zone as required. Background Note: A computer network is a connection between computers...
http://help.comodo.com/topic-467-1-1050-16655-Network-Zones.html... Active HIPS Rules Click 'Settings' > 'HIPS' > 'HIPS Rules' The rules screen shows your installed applications classified into file groups, and the HIPS ruleset that applies to them. You can change the ruleset of a specific application or file group, and create your own custom rulesets. Open the HIPS Rules panel Click 'Settings' on the CCS home Click...
http://help.comodo.com/topic-467-1-1050-16660-Active-HIPS-Rules.html... Create and Manage COM Groups Click 'Settings' > 'System Templates' > 'COM Variables' Each COM group is a handy collection of COM interfaces falling under a certain category. Xcitium Enterprise ships with a set of predefined COM Groups that are available for use in configuration profiles, for example to add a COM group to the 'Protected Objects' list in the...
http://help.comodo.com/topic-463-1-1029-15776-Create-and-Manage-COM-Groups.html... View Active Process List Click 'Tasks' > 'Advanced Tasks' > 'View Active Processes' The active process list shows all processes started by applications currently running on your system. XCS can identify the parent application of a process to detect when a non-trusted application is trying to spawn a trusted application. XCS can then deny access rights...
http://help.comodo.com/topic-463-1-1033-15861-View-Active-Process-List.html... Network Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Network Zones' A 'Network Zone' can consist of an individual machine (like a home computer connected to the internet) or a network of thousands of machines. You can grant or deny access to a network zone as required. Background Note: A computer network is a connection between computers through...
http://help.comodo.com/topic-463-1-1033-15960-Network-Zones.html... Active HIPS Rules Click 'Settings' > 'HIPS' > 'HIPS Rules' The rules screen shows your installed applications classified into file groups, and the HIPS ruleset that applies to them. You can change the ruleset of a specific application or file group, and create your own custom rulesets. Open the HIPS Rules panel Click 'Settings' on the XCS home Click 'HIPS...
http://help.comodo.com/topic-463-1-1033-15931-Active-HIPS-Rules.html... Protected Files and Folders Click 'Settings' > 'Containment' >'Protected Objects' > 'Protected Data' Items in 'Protected Data' cannot be seen, accessed or modified by applications running in the container. This fortifies files containing sensitive data from unrecognized and potentially malicious programs. Protected Files and Protected Data Items in ' Protected Files ' ('Settings' > 'HIPS' > 'Protected Objects' > 'Protected Files...
http://help.comodo.com/topic-463-1-1033-15964-Protected-Files-and-Folders.html... Manage Quarantined Items The quarantine facility removes and isolates suspicious files into a safe location before analyzing them for possible infection. Any files transferred in this fashion are encrypted- meaning they cannot be run or executed. This isolation prevents infected files from affecting the rest of your PC. If a file cannot be disinfected, then it provides a reliable safe...
http://help.comodo.com/topic-399-1-790-10291-Manage-Quarantined-Items.html