Showing 61-70 from 91
...Shared Space The Virtual Desktop Containment Statistics Analyzer DLP Tasks - Introduction Advanced Tasks – Introduction Create A Rescue Disk Remove Deeply Hidden Malware Manage XCS Tasks View XCS Logs Submit Files for Analysis to Xcitium View Active Process List XCS Advanced Settings General Settings Customize User Interface Configure Virus Database Updates Log Settings Manage XCS Configurations Antivirus Configuration Real-time Scanner...
http://help.comodo.com/topic-463-1-1033-15822-Introduction-to-Xcitium-Client-Security.html...Shared Spaces, Windows Management and so on. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your selected choice. Enter the object name as filter criteria in the text box. For example, if you choose 'Contains' then enter the phrase 'surfer.exe' in the text field, then you will only see logs with surfer.exe...
http://help.comodo.com/topic-467-1-1050-16734-Search-and-Filter-Logs.html...Shared Spaces, Windows Management and so on. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your selected choice. Enter the object name as filter criteria in the text box. For example, if you choose 'Contains' then enter the phrase 'surfer.exe' in the text field, then you will only see logs with surfer.exe...
http://help.comodo.com/topic-463-1-1033-15917-Search-and-Filter-Logs.html...Shared Spaces, Windows Management and so on. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your selected choice. Enter the object name as filter criteria in the text box. For example, if you choose 'Contains' then enter the phrase 'surfer.exe' in the text field, then you will only see logs with surfer.exe...
http://help.comodo.com/topic-399-1-904-15352-Search-and-Filter-Logs.html...Shared Spaces Off Unrecognized Any Any Any On Off Off N/A Clicking the handle at the bottom of the interface opens a rule configuration panel: Add - Allows you to add a new containment rule. See the section ' Adding a Auto-Containment Rule ' for guidance on creating a new rule. Edit - Allows you to modify the selected containment rule. See the section...
http://help.comodo.com/topic-399-1-790-10386-Configuring-Rules-for-Auto-Containment.html...shared space settings and other general containment settings. You can define rules which control how much access a contained application should have. For more information, refer to Configuring Rules for Auto-Containment . For more background information about Comodo Containment, see The Container – An Overview . For more information about how the Advanced Protection engine determines the reputation of a file...
http://help.comodo.com/topic-399-1-790-10384-Comodo-Containment.html...shared by concurrently running processes Pink - Buffered memory space used for temporarily storing data received from or sent to external devices Yellow - Cached memory, used for storing recent data used by running processes Green - Free, unallocated memory The table below the graph shows statistics of maximum, average and current usage of system memory for the past day. Clicking the graph...
http://help.comodo.com/topic-451-1-936-12780-System-Usage-Summaries.html...shared by concurrently running processes Pink - Buffered memory space used for temporarily storing data received from or sent to external devices Yellow - Cached memory, used for storing recent data used by running processes Green - Free, unallocated memory The table below the graph shows statistics of maximum, average and current usage of system memory for the past day. Clicking the graph...
http://help.comodo.com/topic-451-1-940-12908-System-Usage-Summaries.html... Running Browsers Inside the Virtual Desktop The Virtual Desktop provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net from inside the virtual...
http://help.comodo.com/topic-72-1-522-6280-Running-Browsers-Inside-the-Virtual-Desktop.html... Running Browsers Inside the Virtual Kiosk The Virtual Kiosk provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net inside the Kiosk removes...
http://help.comodo.com/topic-72-1-451-4894-Running-Browsers-Inside-the-Virtual-Kiosk.html