Search Results

Showing 751-760 from 854

Protected Data Files And Folders (in Comodo Internet Security)

...running in the container This fortifies files containing sensitive data from unrecognized and potentially malicious programs   Protected Files and Protected Data Items in ' Protected Files ' can be read by any program, but not modified by them. This contrasts to items in 'Protected Data', which are totally hidden to contained programs. If you want a file/folder to be read by other programs, but protected from modification, then add it to 'Protected Files' list. If you want to totally conceal an item from contained programs, but allow read/write access to trusted programs, then add it to 'Protected Data...

http://help.comodo.com/topic-72-1-766-9190-Protected-Data-Files-and-Folders.html
Executive Report (in Comodo Web Inspector)

...button beside the device name from the 'Device List' area to view the report. An example of an executive report is shown below. The Executive report contains the following information: 1. Scan Information - Provides information on the Company name of the subscriber, scanning vendor (Comodo CA Ltd.,), date of scan and the scan expiry date. 2. Component Compliance Summary - Provides an at-a-glance indication of PCI Compliance status of your systems. 3a. Vulnerabilities noted for each IP address - Provides details on types of vulnerabilities identified for each IP address, with their severity level, CVSS base score and compliance status...

http://help.comodo.com/topic-208-1-490-5183-Executive-Report.html
Smart Scan (in Comodo Rescue Disk)

...running silently in the computer and enable hackers to steal your identity and confidential information like your credit card details. On completion of scanning, you can: Clean the detected threats or move them to Quarantine and later remove them; Exclude an application you consider as safe from the threat list; Report the threat as a False Positive to Comodo. To start a Smart scan 1. Click the 'Smart Scan' from the CCE main interface. The application will check whether any updates are available for the virus database before commencing the scan. If available, it will first update the local virus...

http://help.comodo.com/topic-170-1-493-5218-Smart-Scan.html
Create A Rescue Disk (in Comodo Antivirus for Servers)

...runs Comodo Cleaning Essentials on a lightweight distribution of the Linux operating system. It is a powerful virus, spyware, rootkit scanner and cleaner which works in both GUI and text mode. The tool can provide a more comprehensive and thorough scan than regular malware cleaning applications because it cleans your server before server software is loaded. CRD is intended to be used when malware embeds itself so deeply into your server that regular AV software cannot remove it. The rescue disk is also very effective at removing infections that are preventing Windows Server from booting in the first place. Apart...

http://help.comodo.com/topic-213-1-517-6002-Create-a-Rescue-Disk.html
Unrecognized Files (in Endpoint Manager)

...button. Similarly, files that are suspicious can be moved to the ' Blocked Files ' area. You can also add files upon which you are suspicious into 'Unrecognized Files' list to check whether the master Comodo safe list contains more information on them or to submit the files to Comodo for analysis. Experts at Comodo will analyze the files and add them to global white-list or black-list accordingly. The Unrecognized Files panel can be accessed by clicking Security Settings > File Rating > Unrecognized Files tab from the Advanced Tasks interface You can use the search option to find...

http://help.comodo.com/topic-399-1-790-10399-Unrecognized-Files.html
Unrecognized Files (in Comodo Internet Security)

...button. Similarly, files that are suspicious can be moved to the 'Blocked Files ' area. You can also add files upon which you are suspicious into 'Unrecognized Files' list to check whether the master Comodo safe list contains more information on them or to submit the files to Comodo for analysis. Experts at Comodo will analyze the files and add them to global white-list or black-list accordingly. The Unrecognized Files panel can be accessed by clicking Security Settings > File Rating > Unrecognized Files tab from the Advanced Tasks interface You can use the search option to find...

http://help.comodo.com/topic-72-1-451-4780-Unrecognized-Files.html
Manage OS Patches On Windows Endpoints (in Endpoint Manager)

...button and install these patches onto endpoints Hide unwanted patch(es) Click 'Applications' > 'Patch Management' Select the 'Operating System' tab Select a company or a group to view the list of patches and Windows updates available for its devices Or Select 'Show all' to view a list of all available patches and Windows updates Select the patch(es) you want to hide and click 'Hide Patch(es)' To view the hidden patches again, you have to unhide them. Restore Hidden Patches Restored patches will also be available for installation in the Device Management interface and can be added...

http://help.comodo.com/topic-399-1-786-10105-Manage-OS-Patches-on-Windows-Endpoints.html
Understand Alerts (in Comodo Antivirus for MAC)

...run on your system. Alerts appear at the bottom right hand side of your computer screen. The alert contains the name of the virus detected and the location of the virus on your disk and, if available, more information about the virus. Each alert has two main options - 'Clean' and 'Ignore'. Selecting either of these will present further options. Clicking 'Clean' will allow you to: Clean the file Quarantine the file. This will move the file to Quarantined Items OR Disinfect the file . If CAV has a disinfection routine available it will disinfect the file...

http://help.comodo.com/topic-155-1-282-2632-Understand-Alerts.html
Full Scan (in Comodo Rescue Disk)

...run a full scan of your system periodically to detect any malware or viruses. During a full scan, CCE scans all areas including all partitions of hard disk drive, system memory of your computer to identify threats from viruses, malware, spyware and so on. A rootkit is a type of malware that is designed to conceal the fact that the user's system has been compromised. Once installed, they camouflage themselves as, for example, standard operating system files, security tools and APIs used for diagnosis, scanning, and monitoring. Rootkits are usually not detectable by normal virus scanners because of this...

http://help.comodo.com/topic-170-1-493-5219-Full-Scan.html
Create A Rescue Disk (in Comodo Internet Security)

...runs Comodo Cleaning Essentials on a lightweight distribution of the Linux operating system. It is a powerful virus, spyware, rootkit scanner and cleaner which works in both GUI and text mode. The tool can provide a more comprehensive and thorough scan than regular malware cleaning applications because it cleans your system before Windows is loaded. CRD is intended to be used when malware embeds itself so deeply into your system that regular AV software cannot remove it. The rescue disk is also very effective at removing infections that are preventing Windows from booting in the first place. Apart from...

http://help.comodo.com/topic-72-1-522-6284-Create-a-Rescue-Disk.html
Pages 76 of 86 « Prev     Next »   Jump to page