Search Results

Showing 61-70 from 91

Introduction To Xcitium Client Security (in Xcitium Enterprise)

...Shared Space The Virtual Desktop Containment Statistics Analyzer DLP Tasks - Introduction Advanced Tasks – Introduction Create A Rescue Disk Remove Deeply Hidden Malware Manage XCS Tasks View XCS Logs Submit Files for Analysis to Xcitium View Active Process List XCS Advanced Settings General Settings Customize User Interface Configure Virus Database Updates Log Settings Manage XCS Configurations Antivirus Configuration Real-time Scanner...

http://help.comodo.com/topic-463-1-1033-15822-Introduction-to-Xcitium-Client-Security.html
Search And Filter Logs (in Advanced Endpoint Protection)

...Shared Spaces, Windows Management and so on. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your selected choice. Enter the object name as filter criteria in the text box. For example, if you choose 'Contains' then enter the phrase 'surfer.exe' in the text field, then you will only see logs with surfer.exe...

http://help.comodo.com/topic-467-1-1050-16734-Search-and-Filter-Logs.html
Search And Filter Logs (in Xcitium Enterprise)

...Shared Spaces, Windows Management and so on. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your selected choice. Enter the object name as filter criteria in the text box. For example, if you choose 'Contains' then enter the phrase 'surfer.exe' in the text field, then you will only see logs with surfer.exe...

http://help.comodo.com/topic-463-1-1033-15917-Search-and-Filter-Logs.html
Search And Filter Logs (in Endpoint Manager)

...Shared Spaces, Windows Management and so on. Select 'Contains' or 'Does Not Contain' option from the drop down menu. 'Does Not Contain' inverts your selected choice. Enter the object name as filter criteria in the text box. For example, if you choose 'Contains' then enter the phrase 'surfer.exe' in the text field, then you will only see logs with surfer.exe...

http://help.comodo.com/topic-399-1-904-15352-Search-and-Filter-Logs.html
Configuring Rules For Auto-Containment (in Endpoint Manager)

...Shared Spaces Off Unrecognized Any Any Any On Off Off N/A Clicking the handle at the bottom of the interface opens a rule configuration panel: Add - Allows you to add a new containment rule. See the section ' Adding a Auto-Containment Rule ' for guidance on creating a new rule. Edit - Allows you to modify the selected containment rule. See the section...

http://help.comodo.com/topic-399-1-790-10386-Configuring-Rules-for-Auto-Containment.html
Comodo Containment (in Endpoint Manager)

...shared space settings and other general containment settings. You can define rules which control how much access a contained application should have. For more information, refer to  Configuring Rules for Auto-Containment . For more background information about Comodo Containment, see The Container – An Overview . For more information about how the Advanced Protection engine determines the reputation of a file...

http://help.comodo.com/topic-399-1-790-10384-Comodo-Containment.html
System Usage Summaries (in Comodo Dome Firewall)

...shared by concurrently running processes Pink - Buffered memory space used for temporarily storing data received from or sent to external devices Yellow - Cached memory, used for storing recent data used by running processes   Green - Free, unallocated memory The table below the graph shows statistics of maximum, average and current usage of system memory for the past day. Clicking the graph...

http://help.comodo.com/topic-451-1-936-12780-System-Usage-Summaries.html
System Usage Summaries (in Comodo Dome Firewall)

...shared by concurrently running processes Pink - Buffered memory space used for temporarily storing data received from or sent to external devices Yellow - Cached memory, used for storing recent data used by running processes Green - Free, unallocated memory The table below the graph shows statistics of maximum, average and current usage of system memory for the past day. Clicking the graph...

http://help.comodo.com/topic-451-1-940-12908-System-Usage-Summaries.html
Running Browsers Inside The Virtual Desktop (in Comodo Internet Security)

... Running Browsers Inside the Virtual Desktop The Virtual Desktop provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net from inside the virtual...

http://help.comodo.com/topic-72-1-522-6280-Running-Browsers-Inside-the-Virtual-Desktop.html
Running Browsers Inside The Virtual Kiosk (in Comodo Internet Security)

... Running Browsers Inside the Virtual Kiosk The Virtual Kiosk provides an extremely secure environment for Internet related activities because it isolates your browser from the rest of your computer. Just by visiting them, malicious websites can install viruses malware, rootkits and spyware onto your computer that can allow hackers to steal confidential information. Surfing the 'net inside the Kiosk removes...

http://help.comodo.com/topic-72-1-451-4894-Running-Browsers-Inside-the-Virtual-Kiosk.html
Pages 7 of 10 « Prev     Next »   Jump to page