Showing 51-60 from 148
...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity...
http://help.comodo.com/topic-72-1-284-3035-Unknown-Files---The-Sand-boxing-and-Scanning-Processes.html...analysis system is a cloud based service that is used to help determine whether a file exhibits malicious behavior. Once submitted to the system, the unknown executable will be automatically run in a virtual environment and all actions that it takes will be monitored. For example, processes spawned, files and registry key modifications, host state changes and network activity will...
http://help.comodo.com/topic-72-1-451-4846-Unknown-Files---The-Auto---Sandboxing-and-Scanning-Processes.html...analysis, cloud-based scanning, sand-boxing, host intrusion prevention and file-look up services. Back to index Antivirus Scan An audit performed by an antivirus application in order to detect malware and viruses in the file system and/or memory of a computer. Back to index ARP Address Resolution Protocol (ARP) is a protocol for mapping an IP address...
http://help.comodo.com/topic-72-1-451-5862-Appendix-3---Glossary-of-Terms.html...analysis, cloud-based scanning, sand-boxing, host intrusion prevention and file-look up services. Back to index Antivirus Scan An audit performed by an antivirus application in order to detect malware and viruses in the file system and/or memory of a computer. Back to index ARP Address Resolution Protocol (ARP) is a protocol for mapping an IP address...
http://help.comodo.com/topic-72-1-623-7599-Appendix-2---Glossary-of-Terms.html...analysis, cloud-based scanning, sand-boxing, host intrusion prevention and file-look up services. Back to index Antivirus Scan An audit performed by an antivirus application in order to detect malware and viruses in the file system and/or memory of a computer. Back to index ARP Address Resolution Protocol (ARP) is a protocol for mapping an IP address...
http://help.comodo.com/topic-72-1-522-6219-Appendix-3---Glossary-of-Terms.html...analysis, cloud-based scanning, sand-boxing, host intrusion prevention and file-look up services. Back to the top Antivirus Scan An audit performed by an antivirus application in order to detect malware and viruses in the file system and/or memory of a computer. Back to the top ARP Address Resolution Protocol (ARP) is a protocol for mapping an IP address...
http://help.comodo.com/topic-213-1-517-6066-Appendix-2---Glossary-of-Common-Terms.html...analysis, cloud-based scanning, sand-boxing, host intrusion prevention and file-look up services. Back to index Antivirus Scan An audit performed by an antivirus application in order to detect malware and viruses in the file system and/or memory of a computer. Back to index ARP Address Resolution Protocol (ARP) is a protocol for mapping an IP address...
http://help.comodo.com/topic-72-1-766-9036-Appendix-3---Glossary-of-Terms.html...cloud-based file verdict service that subjects unknown files to a range of tests in order to identify those that are malicious. Xcitium Client Security can automatically submit unknown files to Verdict for analysis. When the tests are complete, Verdict will award a trust verdict to the file. You can view the verdicts at 'Security' > 'Endpoint Security' > 'Verdict...
http://help.comodo.com/topic-463-1-1029-15680-Xcitium-Verdict-Cloud.html...analysis - Select this box and files which are identified as 'unknown' i.e. the files are neither in the safe-list or black list, from the cloud based scanning to Comodo for analysis. Heuristics Scanning Level - Select a level for Heuristics Scanning. Comodo AntiVirus employs various heuristic techniques to identify previously unknown viruses and Trojans. 'Heuristics' describes the method of analyzing...
http://help.comodo.com/topic-167-1-330-4276-Scanner-Settings.html...Cloud Based Behavior Analysis Any file that is identified as unrecognized is sent to the Comodo Instant Malware Analysis (CIMA) server for behavior analysis. Each file is executed in a virtual environment on Comodo servers and tested to determine whether it contains any malicious code. The results will be sent back to your computer in around 15 minutes. Comodo...
http://help.comodo.com/topic-72-1-451-4691-CIS-Complete---Installation-and-Activation.html