Search Results

Showing 621-630 from 638

Filtering File List Changes Logs (in Endpoint Manager)

... Filtering File List Changes Logs CCS allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters: Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged events...

http://help.comodo.com/topic-399-1-790-10371-Filtering-File-List-Changes-Logs.html
Blocked Zones (in Advanced Endpoint Protection)

... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...

http://help.comodo.com/topic-467-1-1050-16656-Blocked-Zones.html
Protected COM Interfaces (in Advanced Endpoint Protection)

... Protected COM Interfaces   The Component Object Model (COM) is Microsoft's object-oriented programming model. It defines how objects interact within a single application, or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malware for launching attacks on your computer. Comodo Client Security automatically protects COM interfaces against...

http://help.comodo.com/topic-467-1-1050-16670-Protected-COM-Interfaces.html
Blacklist And Whitelist Applications (in Xcitium Enterprise)

... Blacklist and Whitelist Applications Click 'Software Inventory' > 'Applications' > 'Mobile Applications'. The mobile applications area shows a list of applications installed on all enrolled Android and iOS devices. You can review the list and decide which apps should be allowed or blocked. If a suspicious or malicious application is identified then it can be moved to the blacklist. This...

http://help.comodo.com/topic-463-1-1029-15741-Blacklist-and-Whitelist-Applications.html
Manage Alerts (in Endpoint Manager)

... Manage Alerts Click 'Configuration Templates' > 'Alerts' You can create procedures and monitors to track certain activities and generate an alert if their conditions are met. For example, 'Generate an alert if CPU usage exceeds 90%', or 'Alert me when all Windows patches have been installed.' The 'Alerts' section contains templates of settings for these alerts. For example 'Send a...

http://help.comodo.com/topic-399-1-786-10972-Manage-Alerts.html
Install 3rd Party Application Patches On Windows Endpoints (in Xcitium Enterprise)

... Install 3rd Party Application Patches on Windows Endpoints Click 'Software Inventory' > 'Applications' > 'Patch Management' > 'Third Party Applications' This area lets you apply patches and updates to 3rd party applications on Windows devices. Xcitium checks third party applications on endpoints in areas such as program files, registry, start menu, users appdata if any patches are available for them...

http://help.comodo.com/topic-463-1-1029-15744-Install-3rd-Party-Application-Patches-on-Windows-Endpoints.html
COM Groups (in Advanced Endpoint Protection)

... COM Groups   Click 'Settings' > 'HIPS' > 'HIPS Groups' > 'COM Groups' COM groups are predefined collections of COM interfaces. COM interfaces are used by Windows to define how objects interact within a single application or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch...

http://help.comodo.com/topic-467-1-1050-16664-COM-Groups.html
Protected Registry Keys (in Advanced Endpoint Protection)

... Protected Registry Keys The 'Registry Keys' area lets you define system critical registry keys which should protected against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified. Open the 'Registry Keys' section Click 'Settings' on the CCS home screen Click 'HIPS' > 'Protected Objects' on the left. Click the 'Registry Keys' tab...

http://help.comodo.com/topic-467-1-1050-16669-Protected-Registry-Keys.html
COM Groups (in Comodo Internet Security)

... COM Groups Click 'Settings' > 'HIPS' > 'HIPS Groups' > 'COM Groups' COM groups are predefined groups of COM interfaces. COM interfaces are used by Windows to define how objects interact within a single application or between applications.  COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch...

http://help.comodo.com/topic-72-1-766-9198-COM-Groups.html
Assign Configuration Profiles To A Users Devices (in Endpoint Manager)

... Assign Configuration Profiles to a User's Devices   Click 'Users' > 'User List' Profiles assigned to a user will apply to all devices owned by the user You can apply multiple profiles for different operating systems to a user. Endpoint Manager will apply the appropriate profile to a device depending on its OS. Manage configuration profiles assigned to a...

http://help.comodo.com/topic-399-1-786-10128-Assign-Configuration-Profiles-to-a-Users-Devices.html
Pages 63 of 64 « Prev     Next »   Jump to page