Showing 581-590 from 639
... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...
http://help.comodo.com/topic-399-1-904-11892-Blocked-Zones.html... Miscellaneous Settings Click 'Settings' > 'Advanced Protection' > 'Miscellaneous' The 'Miscellaneous' panel allows you to: Configure protection against shellcode injections (buffer overflow attacks) Show alerts if applications try to change your browser settings Skip automatic cleanup of suspicious certificates Specify what actions are taken if CIS detects unrecognized auto-start entries or scheduled tasks Open the miscellaneous interface Click...
http://help.comodo.com/topic-72-1-766-11485-Miscellaneous-Settings.html... Filtering Defense+ Logs Comodo Internet Security allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters: Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged...
http://help.comodo.com/topic-72-1-522-6267-Filtering-Defense+-Logs.html... Protected Registry Keys The 'Registry Keys' area lets you define system critical registry keys which should protected against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified. Open the 'Registry Keys' section Click 'Settings' on the XCS home screen Click 'HIPS' > 'Protected Objects' on the left. Click the 'Registry Keys' tab...
http://help.comodo.com/topic-463-1-1033-15980-Protected-Registry-Keys.html... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...
http://help.comodo.com/topic-463-1-1033-15961-Blocked-Zones.html... Protected Registry Keys The 'Registry Keys' area lets you define system critical registry keys which should protected against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified. Open the 'Registry Keys' section Click 'Settings' on the CCS home screen Click 'HIPS' > 'Protected Objects' on the left. Click the 'Registry Keys' tab...
http://help.comodo.com/topic-399-1-904-11882-Protected-Registry-Keys.html... Bookmarks - Import, Export and Back up You can import bookmarks from other browsers, export bookmarks to HTML and automatically create backups of your bookmarks on a daily basis. Click the following links for more help: Import bookmarks Import bookmarks from any browser as a HTML file Export bookmarks Restore from backup Import bookmarks from Microsoft Edge and Internet...
http://help.comodo.com/topic-169-1-413-4483-Bookmarks---Import,-Export-and-Back-up.html... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...
http://help.comodo.com/topic-399-1-904-11880-Protected-Files.html... Assign Configuration Profiles to User Devices Click 'Assets' > 'User Management' > 'User List' Profiles assigned to a user will apply to all devices owned by the user. You can assign multiple profiles for different operating systems to a user. Xcitium applies appropriate profiles to each device depending on its OS. Manage configuration profiles assigned to a user Click 'Assets...
http://help.comodo.com/topic-463-1-1029-15567-Assign-Configuration-Profiles-to-User-Devices.html... COM Groups Click 'Settings' > 'HIPS' > 'HIPS Groups' > 'COM Groups' COM groups are predefined collections of COM interfaces. COM interfaces are used by Windows to define how objects interact within a single application or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch attacks...
http://help.comodo.com/topic-463-1-1033-15959-COM-Groups.html