Showing 711-720 from 854
...button. The device management screen lets you install/update Comodo applications and third-party packages on Windows endpoints. You have the following options: Additional Comodo Packages - Install Comodo Client Security (CCS) and Comodo Client Endpoint Detection and Response (EDR). Custom MSI/Packages - Install a package of your choice by specifying the URL of the package. Update Additional Comodo Packages - Install the latest versions of CCS, EDR and/or the communication client. Uninstall Additional Packages - Remove Comodo Client Security (CCS) from endpoints You can choose the following reboot options: Force reboot after 5, 10, 15 or 30 minutes Suppress the reboot entirely Warn...
http://help.comodo.com/topic-399-1-786-10139-Remotely-Install-and-Manage-Packages-on-Windows-Devices.html...button: You can add a: File Group Drive partition/Folder or an individual file Add a File Group Choose 'File Groups' to exclude a pre-set category of files or folders. This provides a convenient way to apply a generic ruleset to important files and folders. For example, selecting 'Executables' allows you to exclude all files with the extensions .exe .dll .sys .ocx .bat .pif .scr .cpl */cmd.exe, *.bat, *.cmd. Other categories include 'Windows System Applications', 'Windows Updater Applications' and 'Start Up Folders'. XCS ships with a set of predefined file groups which can be viewed in 'Advanced Settings...
http://help.comodo.com/topic-463-1-1033-15945-Scan-Exclusions.html...run normally next time. Click 'Learn More' for an explanation of containment. Configure protection settings for a device To configure protection settings for a device: Select the device from the left pane to open its 'Device Overview' page Click the gear icon at top-right of the protection status tile The 'Device Web Browsing Settings' for the device will open. It contains the settings as per the default protection settings shipped with cWatch Office. From this page, you can: Select the website categories to be blocked Configure allow/block policies for miscellaneous website categories Create website blacklist/whitelist...
http://help.comodo.com/topic-285-1-919-12344-Configure-Protection-Settings-for-Devices-and-Networks.html...run unknown executables in sandboxed environment and queue them for submission to Comodo Cloud scanners for behavior analysis. Users do, however, have the option to exclude specific files or file types from this auto-sandboxing process by creating a rule. This is particularly useful for developers that are creating new applications which, by their nature, are as yet unknown to the Comodo safe list. To disable the auto-sandboxing selectively 1. Open 'Tasks' interface by clicking the green curved arrow at top right of the 'Home' screen 2. Open 'Sandbox Tasks' and click 'Open Advanced Settings'. 3. Click 'Security Settings...
http://help.comodo.com/topic-213-1-517-8259-Disable-Auto-Sandboxing-on-a-Per-application-Basis.html...button in the 'Actions' column This opens the domain settings screen for the site: The settings screen contains three tabs: Malware Scanner - Activate virus scan on the website. CDN - Configure CDN cache management settings for the site. SSL Certificate - Upload the SSL certificate used to secure the site if it is using HTTPS Activate Malware Scanner for a Website You need to upload the cWatch agent to the site to activate malware scans. You need to provide access details to the site if you want cWatch to automatically upload the file. Alternatively, you can simply download the agent...
http://help.comodo.com/topic-285-1-927-12636-Domain-Overview.html...running from battery power. This is intended to extend battery lifetime on laptops. ( Default = Disabled ) Proxy and Host Settings – Allows you to select the host from which updates are downloaded. By default, CIS will directly download updates from Comodo servers. However, advanced users and network admins may wish to first download updates to a proxy/staging server and have individual CIS installations collect the updates from there. The 'Proxy and Host Settings' interface allows you to point CIS at this proxy/staging server. This helps conserve overall bandwidth consumption and accelerates the update process when large number of endpoints are involved...
http://help.comodo.com/topic-72-1-623-7719-Configure-Program-and-Virus-Database-Updates.html...running in the container. This fortifies files containing sensitive data from unrecognized and potentially malicious programs. Protected Files and Protected Data Items in ' Protected Files ' ('Settings' > 'HIPS' > 'Protected Objects' > 'Protected Files') can be read by any program, but not modified by them. This contrasts to items in 'Protected Data', which are totally hidden to contained programs. If you want a file/folder to be read by other programs, but protected from modification, then add it to 'Protected Files' list. If you want to totally conceal an item from contained programs, but allow read/write access to trusted programs...
http://help.comodo.com/topic-463-1-1033-15964-Protected-Files-and-Folders.html...Run' dialog: Click 'File' > 'Add/Remove snap-in' in the console interface Select 'Certificates' in the list on the left. Click 'Add' to move it to the list of selected snap-ins. You will be asked to select the computer and account to which the snap-in should be added: Select 'Computer account' and click 'Next' Select 'Local computer' and click 'Finish': The snap-in will be added to the list on the right Click 'OK' to add the snap-in to the console. Leave the console open. You will need it for step 2. Step 2 - Import...
http://help.comodo.com/topic-434-1-840-11971-Manage-Block-Pages.html...run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more convenient to classify entire directories of files as 'Trusted Files'. CIS allows you to define a personal safe list of files to complement the default Comodo safe list. By adding executables to this list (including sub folders containing many components) you can reduce the amount of alerts that Defense+ generates whilst maintaining a higher level of Defense+ security. This is particularly useful for developers that are creating new applications that, by their nature, are as yet unknown...
http://help.comodo.com/topic-72-1-451-4779-Trusted-Files.html...run and so on. The 'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time when the task is launched. Type - Indicates the type of the task. Parameter - Indicates the parameter (like scan type) associated with the task. Completed - Contains precise details of the date and time of the completion of the task. Code - Indicates the code...
http://help.comodo.com/topic-72-1-451-4821--Tasks.html