Showing 621-630 from 639
... Website Filtering Rules Click ‘Settings’ > ‘Website Filtering’ > ‘Rules’ tab The website filtering rule-configuration interface lets you create rules which are as sweeping or as granular as you require. Rules can be created on a per-user basis, allowing you to control exactly which websites certain people can or cannot visit. You can also disable or enable...
http://help.comodo.com/topic-72-1-766-9194-Website-Filtering-Rules.html... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...
http://help.comodo.com/topic-463-1-1033-15978-Protected-Files.html... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...
http://help.comodo.com/topic-467-1-1050-16667-Protected-Files.html... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...
http://help.comodo.com/topic-467-1-1050-16656-Blocked-Zones.html... Protected COM Interfaces The Component Object Model (COM) is Microsoft's object-oriented programming model. It defines how objects interact within a single application, or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malware for launching attacks on your computer. Comodo Client Security automatically protects COM interfaces against...
http://help.comodo.com/topic-467-1-1050-16670-Protected-COM-Interfaces.html... Protected COM Interfaces The Component Object Model (COM) is Microsoft's object-oriented programming model. It defines how objects interact within a single application, or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malware for launching attacks on your computer. Xcitium Client Security automatically protects COM interfaces against modification...
http://help.comodo.com/topic-463-1-1033-15981-Protected-COM-interfaces.html... COM Groups Click 'Settings' > 'HIPS' > 'HIPS Groups' > 'COM Groups' COM groups are predefined collections of COM interfaces. COM interfaces are used by Windows to define how objects interact within a single application or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch...
http://help.comodo.com/topic-467-1-1050-16664-COM-Groups.html... Manage Alerts Click 'Assets' > 'Configuration Templates' > 'Alerts' You can create procedures and monitors to track certain activities and generate an alert if their conditions are met. For example, 'Generate an alert if CPU usage exceeds 90%', or 'Alert me when all Windows patches have been installed.' The 'Alerts' section contains templates of settings for these alerts. For example...
http://help.comodo.com/topic-463-1-1029-15721-Manage-Alerts.html... Protected Registry Keys The 'Registry Keys' area lets you define system critical registry keys which should protected against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified. Open the 'Registry Keys' section Click 'Settings' on the CCS home screen Click 'HIPS' > 'Protected Objects' on the left. Click the 'Registry Keys' tab...
http://help.comodo.com/topic-467-1-1050-16669-Protected-Registry-Keys.html... Blacklist and Whitelist Applications Click 'Applications' > 'Mobile Applications' The mobile applications area shows a list of applications installed on all enrolled Android and iOS devices. You can review the list and decide which apps should be allowed or blocked. If a suspicious or malicious application is identified then it can be moved to the blacklist. This blocks the application...
http://help.comodo.com/topic-399-1-786-10167-Blacklist-and-Whitelist-Applications.html