Search Results

Showing 581-590 from 639

Blocked Zones (in Endpoint Manager)

... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...

http://help.comodo.com/topic-399-1-904-11892-Blocked-Zones.html
Miscellaneous Settings (in Comodo Internet Security)

... Miscellaneous Settings Click 'Settings' > 'Advanced Protection' > 'Miscellaneous'  The 'Miscellaneous' panel allows you to: Configure protection against shellcode injections (buffer overflow attacks) Show alerts if applications try to change your browser settings Skip automatic cleanup of suspicious certificates Specify what actions are taken if CIS detects unrecognized auto-start entries or scheduled tasks Open the miscellaneous interface Click...

http://help.comodo.com/topic-72-1-766-11485-Miscellaneous-Settings.html
Filtering Defense+ Logs (in Comodo Internet Security)

... Filtering Defense+ Logs Comodo Internet Security allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters:   Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged...

http://help.comodo.com/topic-72-1-522-6267-Filtering-Defense+-Logs.html
Protected Registry Keys (in Xcitium Enterprise)

... Protected Registry Keys The 'Registry Keys' area lets you define system critical registry keys which should protected against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified. Open the 'Registry Keys' section Click 'Settings' on the XCS home screen Click 'HIPS' > 'Protected Objects' on the left. Click the 'Registry Keys' tab...

http://help.comodo.com/topic-463-1-1033-15980-Protected-Registry-Keys.html
Blocked Zones (in Xcitium Enterprise)

... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...

http://help.comodo.com/topic-463-1-1033-15961-Blocked-Zones.html
Protected Registry Keys (in Endpoint Manager)

... Protected Registry Keys The 'Registry Keys' area lets you define system critical registry keys which should protected against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified. Open the 'Registry Keys' section Click 'Settings' on the CCS home screen Click 'HIPS' > 'Protected Objects' on the left. Click the 'Registry Keys' tab...

http://help.comodo.com/topic-399-1-904-11882-Protected-Registry-Keys.html
Bookmarks - Import, Export And Back Up (in Comodo IceDragon)

... Bookmarks - Import, Export and Back up   You can import bookmarks from other browsers, export bookmarks to HTML and automatically create backups of your bookmarks on a daily basis. Click the following links for more help: Import bookmarks Import bookmarks from any browser as a HTML file Export bookmarks Restore from backup   Import bookmarks from Microsoft Edge and Internet...

http://help.comodo.com/topic-169-1-413-4483-Bookmarks---Import,-Export-and-Back-up.html
Protected Files (in Endpoint Manager)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-399-1-904-11880-Protected-Files.html
Assign Configuration Profiles To User Devices (in Xcitium Enterprise)

... Assign Configuration Profiles to User Devices Click 'Assets' > 'User Management' > 'User List' Profiles assigned to a user will apply to all devices owned by the user. You can assign multiple profiles for different operating systems to a user. Xcitium applies appropriate profiles to each device depending on its OS. Manage configuration profiles assigned to a user Click 'Assets...

http://help.comodo.com/topic-463-1-1029-15567-Assign-Configuration-Profiles-to-User-Devices.html
COM Groups (in Xcitium Enterprise)

... COM Groups Click 'Settings' > 'HIPS' > 'HIPS Groups' > 'COM Groups' COM groups are predefined collections of COM interfaces. COM interfaces are used by Windows to define how objects interact within a single application or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch attacks...

http://help.comodo.com/topic-463-1-1033-15959-COM-Groups.html
Pages 59 of 64 « Prev     Next »   Jump to page