Search Results

Showing 641-650 from 854

View Security Events By Files (in Endpoint Manager)

...run entry removed. In the case of a service, CCS disables the service Auto-start process quarantined. Corresponding auto-start entry removed. In the case of a service, CCS disables the service Processes restored from quarantine. File deleted from the endpoint. Number of devices On how many devices the event was detected. File Name The label of the executable file affected by the action. Click the name of a file to open its 'File Details' interface. See View the details of a file for more details. File Path The installation location of the executable file on the endpoint. Click...

http://help.comodo.com/topic-399-1-786-13041-View-Security-Events-by-Files.html
Quarantine (in Comodo Antispam Gateway)

...button OR Click on the email link in the subject column that you want to view its details The selected email opens: By default, the email opens in normal view and shown in plain text, where the images, banners and links are not be displayed. Click 'Html source' to view the source code of the mail. Click the 'Original View' tab to view images and links. A warning message is displayed as follows: Click 'OK' to view the email. Check the details of the mail and ascertain whether it is a spam mail or not. You can choose to either...

http://help.comodo.com/topic-157-1-294-3413-Quarantine.html
Quarantine (in Xcitium Secure Email Gateway MSP)

...button. OR Click on the email link in the subject column that you want to view its details. The selected mail opens: By default, the email opens in normal view and shown in plain text, where the images, banners and links are not be displayed. Click 'Html source' to view the source code of the mail. Click the 'Original View' tab to view images and links. A warning message will be displayed as follows: Click 'OK' to view the email. Check the details of the mail and ascertain whether it is a spam mail or not. You can choose...

http://help.comodo.com/topic-445-1-917-12268-Quarantine.html
Manage Policies (in Comodo One MSP)

...button at the top of the interface The 'Create Policy' dialog will be displayed: The 'Create Policy' dialog will be displayed: The monitoring modules are displayed on the left side of the screen and on the right side, you can configure the parameters for a selected a module. The table below provides the details of the monitoring modules.   Monitoring Modules Name Description RAM Monitor Checks if RAM memory usage exceeds a bottom threshold for more than a specified time and generates a service desk ticket. Traffic Monitor Checks if network traffic exceeds a bottom threshold for more than...

http://help.comodo.com/topic-289-1-719-8565-Manage-Policies.html
Vulnerability Management (in Endpoint Manager)

...button above the table Vulnerable Devices - A list of devices affected by listed vulnerabilities. Allows you patch affected device with a single click. Vulnerability List Click 'Applications' > 'Vulnerability Management' Click the 'Vulnerability List' tab Vulnerability List - Column Descriptions Column Heading Description Vulnerability Name The vulnerability identifier. This is same as the CVE code. Vendor Developer of the affected software and the corresponding patch. CVE Addressed Identification code of the security threat. Click this to view vulnerability details, vendor and affected devices. Severity Criticality of the vulnerability. The possible levels are: Critical - Vulnerabilities that can be exploited without warnings...

http://help.comodo.com/topic-399-1-786-10191-Vulnerability-Management.html
The Main Interface (in Comodo Cloud Antivirus)

...run a full scan to identify unknown files on your computer. - Indicates that the detected unknown files were submitted to Valkyrie and are currently under analysis after auto-submission. You can also submit unknown files manually for Valkyrie analysis: See the explanation ' manually submit a file' for details on manually submitting files. See Sandbox Settings for more details on configuring CCAV to automatically submit unknown files for analysis. - Indicates that all unknown files have been submitted and analyzed by Valkyrie and there is no unknown or pending files left in your computer. At the right of the pie chart...

http://help.comodo.com/topic-394-1-767-9218-The-Main-Interface.html
CIS Pro-Installation And Activation (in Comodo Internet Security)

...button Repeat process until all required programs have been removed Comodo Internet Security 2012 Pro can be downloaded from  http://www.comodo.com/home/download/download.php?prod=cis-pro  after signing up for subscription and includes Comodo Dragon ,  GeekBuddy and the Comodo Guarantee . Choose whether you want the 32 or 64 bit version of CIS then click 'download’ If you are unsure which version you need, select the 32/64-bit Windows Installer. This executable contains BOTH 32 and 64 bit installers. The setup routine will automatically detect which version of Windows you have and install the appropriate version. Please note, the Universal Windows Installer...

http://help.comodo.com/topic-72-1-284-3005-CIS-Pro-Installation-and-Activation.html
View And Manage Autorun Items (in Xcitium Enterprise)

...runs page: View details of a terminated autorun item Restore autorun item on devices Delete autorun item from devices Rate autorun items as unrecognized, trusted or malicious Export the list of autorun items as a CSV file View Details of a Terminated Autorun Item Click 'Security' > 'Endpoint Security' > 'Antivirus' > 'Autoruns Items' Click the file name of an item in the list: This will open the file details interface which shows: File Info - General information such as file-name, hash, file rating, number of devices on which the file was terminated, and more. Device List - Shows a list...

http://help.comodo.com/topic-463-1-1029-15769-View-and-Manage-Autorun-Items.html
View And Manage Autorun Alerts (in Endpoint Manager)

...runs page: View details of a terminated autorun item Restore autorun item on devices Delete autorun item from devices Rate autorun items as unrecognized, trusted or malicious Export the list of autorun items as a CSV file View Details of a Terminated Autorun Item Click 'Security Sub-Systems' > 'Antivirus' > 'Autoruns Items.' Click the file name of an item in the list: This will open the file details interface which shows: File Info - General information such as file-name, hash, file rating, number of devices on which the file was terminated, and more. Device List - Shows a list...

http://help.comodo.com/topic-399-1-786-15299-View-and-Manage-Autorun-Alerts.html
How To Manage Your Quarantined Mails (in Comodo Antispam Gateway)

...button. OR Click on the email link in the subject column that you want to view its details. The selected mail opens: By default, the email opens in plain text, so images, banners and links are not be displayed. Click 'Html source' to view the source code of the mail. Click the 'Original View' tab. to view the mail with images and links. A warning is displayed before you view the selected email in original. Click 'OK' to view the email. Check the details of the mail and ascertain whether it is a spam mail or not. You can choose...

http://help.comodo.com/topic-157-1-294-3402-How-to-Manage-your-Quarantined-Mails.html
Pages 65 of 86 « Prev     Next »   Jump to page