Showing 621-630 from 638
... Filtering File List Changes Logs CCS allows you to create custom views of all logged events according to user defined criteria. You can use the following types of filters: Preset Time Filters Advanced Filters Preset Time Filters: Clicking on the handle at the bottom enables you to filter the logs for a selected time period: Today - Displays all logged events...
http://help.comodo.com/topic-399-1-790-10371-Filtering-File-List-Changes-Logs.html... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...
http://help.comodo.com/topic-467-1-1050-16656-Blocked-Zones.html... Protected COM Interfaces The Component Object Model (COM) is Microsoft's object-oriented programming model. It defines how objects interact within a single application, or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malware for launching attacks on your computer. Comodo Client Security automatically protects COM interfaces against...
http://help.comodo.com/topic-467-1-1050-16670-Protected-COM-Interfaces.html... Blacklist and Whitelist Applications Click 'Software Inventory' > 'Applications' > 'Mobile Applications'. The mobile applications area shows a list of applications installed on all enrolled Android and iOS devices. You can review the list and decide which apps should be allowed or blocked. If a suspicious or malicious application is identified then it can be moved to the blacklist. This...
http://help.comodo.com/topic-463-1-1029-15741-Blacklist-and-Whitelist-Applications.html... Manage Alerts Click 'Configuration Templates' > 'Alerts' You can create procedures and monitors to track certain activities and generate an alert if their conditions are met. For example, 'Generate an alert if CPU usage exceeds 90%', or 'Alert me when all Windows patches have been installed.' The 'Alerts' section contains templates of settings for these alerts. For example 'Send a...
http://help.comodo.com/topic-399-1-786-10972-Manage-Alerts.html... Install 3rd Party Application Patches on Windows Endpoints Click 'Software Inventory' > 'Applications' > 'Patch Management' > 'Third Party Applications' This area lets you apply patches and updates to 3rd party applications on Windows devices. Xcitium checks third party applications on endpoints in areas such as program files, registry, start menu, users appdata if any patches are available for them...
http://help.comodo.com/topic-463-1-1029-15744-Install-3rd-Party-Application-Patches-on-Windows-Endpoints.html... COM Groups Click 'Settings' > 'HIPS' > 'HIPS Groups' > 'COM Groups' COM groups are predefined collections of COM interfaces. COM interfaces are used by Windows to define how objects interact within a single application or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch...
http://help.comodo.com/topic-467-1-1050-16664-COM-Groups.html... Protected Registry Keys The 'Registry Keys' area lets you define system critical registry keys which should protected against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified. Open the 'Registry Keys' section Click 'Settings' on the CCS home screen Click 'HIPS' > 'Protected Objects' on the left. Click the 'Registry Keys' tab...
http://help.comodo.com/topic-467-1-1050-16669-Protected-Registry-Keys.html... COM Groups Click 'Settings' > 'HIPS' > 'HIPS Groups' > 'COM Groups' COM groups are predefined groups of COM interfaces. COM interfaces are used by Windows to define how objects interact within a single application or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch...
http://help.comodo.com/topic-72-1-766-9198-COM-Groups.html... Assign Configuration Profiles to a User's Devices Click 'Users' > 'User List' Profiles assigned to a user will apply to all devices owned by the user You can apply multiple profiles for different operating systems to a user. Endpoint Manager will apply the appropriate profile to a device depending on its OS. Manage configuration profiles assigned to a...
http://help.comodo.com/topic-399-1-786-10128-Assign-Configuration-Profiles-to-a-Users-Devices.html