Search Results

Showing 581-590 from 638

Handle Malware On Scanned Devices (in Endpoint Manager)

... Handle Malware on Scanned Devices Click 'Security' > 'Endpoint Security Status' Click the 'Protective Action' button to remove, ignore or quarantine the malware. Tip : This interface lets you apply actions to all malware found on specific devices. If you instead want to apply actions to individual malware, please use the 'Blocked Threats'. Click 'Security' > 'Blocked Threats'. See View and...

http://help.comodo.com/topic-399-1-786-10183-Handle-Malware-on-Scanned-Devices.html
Filtering Defense+ Logs (in Comodo Internet Security)

... Filtering Defense+ Logs Comodo Internet Security allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters:   Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged...

http://help.comodo.com/topic-72-1-522-6267-Filtering-Defense+-Logs.html
Blocked Files (in Xcitium Enterprise)

... Blocked Files XCS allows you to lock-down files and folders by denying all access rights to them from other processes or users - effectively cutting them off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files in 'Protected Files', users cannot...

http://help.comodo.com/topic-463-1-1033-15979-Blocked-Files.html
Protected Files (in Xcitium Enterprise)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-463-1-1033-15978-Protected-Files.html
Protected Files (in Endpoint Manager)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-399-1-904-11880-Protected-Files.html
Unrecognized Files (in Comodo Internet Security)

... Unrecognized Files The Unrecognized Files tab displays the list files that are identified as suspicious by Defense+. Also you can manually add suspicious and unclassified files to this area for later submission to Comodo for analysis.   The 'Lookup...' button allows you to check for information on the files by consulting the master Comodo safe list, Select the file(s...

http://help.comodo.com/topic-72-1-284-3025-Unrecognized-Files.html
Protected Files (in Advanced Endpoint Protection)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-467-1-1050-16667-Protected-Files.html
Blocked Files (in Advanced Endpoint Protection)

... Blocked Files   CCS allows you to lock-down files and folders by denying all access rights to them from other processes or users - effectively cutting them off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files in 'Protected Files', users...

http://help.comodo.com/topic-467-1-1050-16668-Blocked-Files.html
Manage Extensions (in Comodo Dragon Web Browser)

... Manage Extensions   Extensions let you add a wide variety of new features and capabilities to Comodo Dragon. For example, you could add an extension that improves security, or an extension that lets you quickly share items on social media. The extensions manager lets you view and manage all extensions you currently have installed. Access the extensions manager Click the...

http://help.comodo.com/topic-120-1-279-2565-Manage-Extensions.html
Create Rules To Auto-Contain Applications (in Comodo Internet Security)

... Create Rules to Auto-Contain Applications   Click 'Settings' > 'Containment' > 'Auto-Containment' Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal...

http://help.comodo.com/topic-72-1-766-9084-Create-Rules-to-Auto-Contain-Applications.html
Pages 59 of 64 « Prev     Next »   Jump to page