Search Results

Showing 621-630 from 639

Website Filtering Rules (in Comodo Internet Security)

... Website Filtering Rules   Click ‘Settings’ > ‘Website Filtering’ > ‘Rules’ tab The website filtering rule-configuration interface lets you create rules which are as sweeping or as granular as you require. Rules can be created on a per-user basis, allowing you to control exactly which websites certain people can or cannot visit. You can also disable or enable...

http://help.comodo.com/topic-72-1-766-9194-Website-Filtering-Rules.html
Protected Files (in Xcitium Enterprise)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-463-1-1033-15978-Protected-Files.html
Protected Files (in Advanced Endpoint Protection)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-467-1-1050-16667-Protected-Files.html
Blocked Zones (in Advanced Endpoint Protection)

... Blocked Zones Click 'Settings' > 'Firewall' > 'Network Zones' > 'Blocked Zones'. A computer network lets you share information and resources with other users and computers. There are some networks which you trust and want to grant access to, including your home or work network. Conversely, there may be other networks with which you want to restrict communication, or even...

http://help.comodo.com/topic-467-1-1050-16656-Blocked-Zones.html
Protected COM Interfaces (in Advanced Endpoint Protection)

... Protected COM Interfaces   The Component Object Model (COM) is Microsoft's object-oriented programming model. It defines how objects interact within a single application, or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malware for launching attacks on your computer. Comodo Client Security automatically protects COM interfaces against...

http://help.comodo.com/topic-467-1-1050-16670-Protected-COM-Interfaces.html
Protected COM Interfaces (in Xcitium Enterprise)

... Protected COM Interfaces The Component Object Model (COM) is Microsoft's object-oriented programming model. It defines how objects interact within a single application, or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malware for launching attacks on your computer. Xcitium Client Security automatically protects COM interfaces against modification...

http://help.comodo.com/topic-463-1-1033-15981-Protected-COM-interfaces.html
COM Groups (in Advanced Endpoint Protection)

... COM Groups   Click 'Settings' > 'HIPS' > 'HIPS Groups' > 'COM Groups' COM groups are predefined collections of COM interfaces. COM interfaces are used by Windows to define how objects interact within a single application or between applications. COM is used as the basis for Active X and OLE - two favorite targets of hackers and malicious programs to launch...

http://help.comodo.com/topic-467-1-1050-16664-COM-Groups.html
Manage Alerts (in Xcitium Enterprise)

... Manage Alerts Click 'Assets' > 'Configuration Templates' > 'Alerts' You can create procedures and monitors to track certain activities and generate an alert if their conditions are met. For example, 'Generate an alert if CPU usage exceeds 90%', or 'Alert me when all Windows patches have been installed.' The 'Alerts' section contains templates of settings for these alerts. For example...

http://help.comodo.com/topic-463-1-1029-15721-Manage-Alerts.html
Protected Registry Keys (in Advanced Endpoint Protection)

... Protected Registry Keys The 'Registry Keys' area lets you define system critical registry keys which should protected against modification. Irreversible damage can be caused to your system if important registry keys are corrupted or modified. Open the 'Registry Keys' section Click 'Settings' on the CCS home screen Click 'HIPS' > 'Protected Objects' on the left. Click the 'Registry Keys' tab...

http://help.comodo.com/topic-467-1-1050-16669-Protected-Registry-Keys.html
Blacklist And Whitelist Applications (in Endpoint Manager)

... Blacklist and Whitelist Applications Click 'Applications' > 'Mobile Applications' The mobile applications area shows a list of applications installed on all enrolled Android and iOS devices. You can review the list and decide which apps should be allowed or blocked. If a suspicious or malicious application is identified then it can be moved to the blacklist. This blocks the application...

http://help.comodo.com/topic-399-1-786-10167-Blacklist-and-Whitelist-Applications.html
Pages 63 of 64 « Prev     Next »   Jump to page