Showing 651-660 from 1131
...firewall, HIPS, containment, website filtering, VirusScope and secure shopping events Logs are also created for 'Alerts Displayed', 'Tasks Launched', 'File List' changes, 'Vendor list changes', 'Trusted Certificate Authorities changes' and 'CIS Configuration Changes' Log settings let you specify the log storage location, the maximum size of log files, and how CIS should react if the maximum file size is reached...
http://help.comodo.com/topic-72-1-766-9135-Log-Settings.html...filters to be applied to the Firewall log viewer. Only those Defense+ entries selected based on your set filter criteria will be displayed in the log viewer. For clearing all the filters, open 'Advanced Filter' pane and remove all the filters one-by-one by clicking the 'X' button at the top right of each filter pane and click 'Apply'. ...
http://help.comodo.com/topic-72-1-623-7707-Filtering-Defense+-Logs.html...Firewall and Defense+ events. Logs are also created for 'Alerts Displayed', 'Tasks Launched' and 'Configuration Changes'. This 'Logging' interface allows you to specify whether you want to enable logging; the maximum size of the log file and how CIS should react if the maximum file size is exceeded. Note: If you wish to actually view, manage and export logs, then...
http://help.comodo.com/topic-72-1-522-6294-Log-Settings.html...firewall, HIPS, containment, device control, VirusScope and autorun events. Logs are also created for 'Alerts Displayed', 'Tasks Launched', 'File List' changes, 'Vendor list changes' and 'CCS Configuration Changes'. Log settings let you specify the storage location, the maximum size of log files, and how CCS should react if the maximum file size is exceeded. Note : You can view logs themselves...
http://help.comodo.com/topic-399-1-904-11846-Log-Settings.html...firewall and sandbox activity in greater detail. This includes the number of detected threats, last virus database update time, number of inbound and outbound connections and more. This view also allows you to quickly change security settings for each component. Click the following links for more information: The Home Screen The Tasks Interface The Widget The System Tray Icon...
http://help.comodo.com/topic-72-1-451-4701-The-Main-Interface.html...select the next filter type and click 'Add'. You can also remove a filter type by clicking the 'X' button at the top right of the filter pane. Click 'Apply' for the filters to be applied to the Firewall log viewer. Only those Defense+ entries selected based on your set filter criteria will be displayed in the log viewer. ...
http://help.comodo.com/topic-72-1-451-4726-Filtering-Defense+-Logs.html...Firewall, HIPS and Antivirus modules. Applications in the container cannot make permanent changes to other processes, programs or data on your 'real' system. They are executed under a carefully selected set of privileges and write to a virtual file system and registry instead of the real system. After an unknown application has been placed in the container, CIS also automatically...
http://help.comodo.com/topic-72-1-766-9191-Containment---An-Overview.html...Firewall and Defense+ events. Logs are also created for 'Alerts Displayed', 'Tasks Launched' and 'Configuration Changes'. This 'Logging' interface allows you to specify whether you want to enable logging; the maximum size of the log file and how CIS should react if the maximum file size is exceeded. Note: If you wish to actually view, manage and export logs, then...
http://help.comodo.com/topic-72-1-451-4753-Log-Settings.html...Firewall, Defense+ and Antivirus modules. Applications in the sandbox are executed under a carefully selected set of privileges and write to a virtual file system and registry instead of the real system. This delivers the smoothest user experience possible by allowing unknown applications to run and operate as they normally would while denying them the potential to cause lasting damage...
http://help.comodo.com/topic-72-1-522-6313-The-Sandbox---An-Overview.html...Firewall, Defense+ and Antivirus modules. Applications in the sandbox are executed under a carefully selected set of privileges and write to a virtual file system and registry instead of the real system. This delivers the smoothest user experience possible by allowing unknown applications to run and operate as they normally would while denying them the potential to cause lasting damage...
http://help.comodo.com/topic-72-1-623-7754-The-Sandbox---An-Overview.html