Showing 741-750 from 854
...run by adding it to the Trusted Files list, or Block the file by moving it to Blocked Files list. Refer to the section To perform an online lookup for unrecognized files for more details. Submitting file(s) for analysis at Comodo - You can also submit the files moved to Unrecognized File list or the files for which the Online File Look Up did not yield any results for analysis by experts at Comodo. Files submitted will be analyzed thoroughly by experienced technicians at Comodo and will be added to global safe list, if the file is found trustworthy...
http://help.comodo.com/topic-72-1-522-6324-Unrecognized-Files.html...button: The CCS configuration will be exported as a .xml file and saved in EM. You can view all configuration files exported from this device under the 'Exported Configurations' tab in 'Device Details': Click the name of the file that you want to import as a profile and save it in a safe location. Then move on to Step 2 - Import the .xml file as a profile for application to required endpoints or endpoint group(s) . Manually export the CCS configuration from a selected device If you haven't done so already, configure the security settings...
http://help.comodo.com/topic-399-1-786-10201-Import-Windows-Profiles.html...run. Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more convenient to classify entire directories of files as 'Trusted Files'. CIS allows you to define a personal safe list of files to complement the default Comodo safe list. By adding executables to this list (including sub folders containing many components) you can reduce the amount of alerts that Defense+ generates whilst maintaining a higher level of Defense+ security. This is particularly useful for developers that are creating new applications that, by their nature, are as yet unknown...
http://help.comodo.com/topic-72-1-522-6323-Trusted-Files.html...running from battery power. This is intended to extend battery lifetime on laptops. (Default = Disabled) Proxy and Host Settings – Allows you to select the host from which updates are downloaded. By default, CCS will directly download updates from Comodo servers. However, advanced users and network admins may wish to first download updates to a proxy/staging server and have individual CCS installations collect the updates from there. The 'Proxy and Host Settings' interface allows you to point CCS at this proxy/staging server. This helps conserve overall bandwidth consumption and accelerates the update process when large number of endpoints are involved...
http://help.comodo.com/topic-399-1-790-10353-Configure-Program-and-Virus-Database-Updates.html...run the CIS Complete installer and select ‘Install TrustConnect’ at the options menu. Alternatively, the TrustConnect client can be downloaded separately from http://www.comodo.com/trustconnect or from the ‘TrustConnect’ area of your Comodo account at http://accounts.comodo.com/login . Installation of TrustConnect is dealt with in Section Installing TrustConnect of this guide. Establish a connection to TrustConnect Once installation is complete, TrustConnect can be launched in one of the following ways: Via the Windows 'Start' menu. Click ' Start > Programs > Comodo > Trust Connect > Trust Connect' By double clicking the TrustConnect Tray Icon: By right clicking...
http://help.comodo.com/topic-72-1-284-2996-Microsoft-Windows---Configuration-and-Connection.html...run outside the container on devices and will be skipped in future scans. See File Ratings Explained for more details on trust ratings of files. Threats identified on Mac OS Devices: First, select the items on which you want to take the action. Then click one of the following: Delete Malware - Will remove the malware from the device. Quarantine Malware - The items will be moved to quarantine on the respective devices. You can delete the items from quarantine later or restore them to their original locations. See View and Manage Quarantined Items for more details. Threats identified on Linux Devices...
http://help.comodo.com/topic-399-1-786-10109-View-and-Manage-Blocked-Threats.html...run and so on. The 'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time when the task is launched. Type - Indicates the type of the task. Parameter - Indicates the parameter (like scan type) associated with the task. Completed - Contains precise details of the date and time of the completion of the task. Code - Indicates the code...
http://help.comodo.com/topic-399-1-790-10347--Tasks.html...run and so on. The 'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time when the task is launched. Type - Indicates the type of the task. Parameter - Indicates the parameter (like scan type) associated with the task. Completed - Contains precise details of the date and time of the completion of the task. Code - Indicates the code...
http://help.comodo.com/topic-72-1-522-6263--Tasks.html...button at the bottom. Backup service is not active message is shown in the backup and overview pages if you disable backup here. This message is also shown if you have a backup license but the file and database backup settings are not configured. Schedule your Backup This section lets you configure regular, automatic, backups of your site. Scheduled backups are full backups that replace the previous one, whereas on-demand backups are incremental backups. Select the target website from the menu at top-left Click the 'Backup' tab Click 'Settings' Locate the 'Schedule' pane: Backup Frequency - Four options...
http://help.comodo.com/topic-466-1-1040-1150033-Backup-Settings.html...button to continue the installation. Click 'Cancel' to abort the installation. Step 2 - Select Installation Folder The next screen lets you choose the Dragon installation folder. The default path is C:/Program Files/Comodo/Dragon. Click 'Browse...' if you want to install the application in a different location Click 'Next' to continue. See Portable version if you want more details about this version of the browser. Step 3 - Import Settings The next screen lets you choose which items to import from your current browser into Comodo Dragon: Select the items you want to import then...
http://help.comodo.com/topic-120-1-279-2526-Download-and-Install-Comodo-Dragon-Web-Browser.html