Showing 791-800 from 854
...Run the setup file and complete the AD connection details form: User Token – Copy and paste the AD sync authentication token that you saved earlier Host Name / IP – Enter the host name or IP of the AD server Base DN – Enter the user base DN details, for example, DC=testing,DC=net Click 'Check LDAP Connection You will see the following dialog after a successful connection: Click 'Save & Close' AD users and groups will be automatically added to Comodo SWG after the first synchronization. Click 'User Management' and 'Users' / 'Groups' to view the enrolled users and group...
http://help.comodo.com/topic-436-1-926-12608-Configure-User-Authentication-Settings.html...runs in a fully virtual container which is totally isolated from your real computer. Any threats, scripts or malware from the internet are kept inside the container and can’t break out to infect your computer. Notes: You must have Comodo Internet Security (CIS) 2013 or higher installed to use this feature. This is because CIS provides the underlying virtualization technology required by virtual mode. CIS is completely free of charge and includes an antivirus, firewall, threat containment, and many other security features. Read more about CIS and download from www.comodo.com/home/internet-security/free-internet- security.php Any files you want to download...
http://help.comodo.com/topic-120-1-279-5648-Use-Comodo-Dragon-in-Virtual-Mode.html...run scans at a certain time on a daily, weekly, monthly or custom interval basis. You can also choose which specific files, folders or drives are included in that scan. Perhaps you wish to check your entire system first thing in the morning; maybe you prefer the middle of the night!! Comodo Antivirus gives you the power to choose, allowing you to get on with more important matters with complete peace of mind. To view the Scheduled Scans interface, click on the 'Scheduled Scans' link in the Antivirus Tasks interface. Comodo Antivirus is shipped with a default schedule 'Weekly Virus...
http://help.comodo.com/topic-167-1-330-4257-Scheduled-Scans.html...run at all. Target File path of the Executable file or Application Behaviour The possible values are Scanned and found safe, Scanned online and found malicious, Terminate process, Direct memory access, Direct monitor access Instal Hook, DNS/RPC client access, Block file, Access memory Modify key, Direct disk access, Load driver, Access COM interface Change HIPS mode, Suspicious, Create process, Modify file Direct keyboard access, Send message, Send message, Shellcode injection, Hook, Alert suppressed # of Devices The quantity of endpoints...
http://help.comodo.com/topic-399-1-786-27-HIPS-Events.html...button from the title bar. The Advanced Filter interface for 'Alerts' logs will open. Select the filter from the 'Advanced Filter' drop-down and click 'Add' to apply the filter. You have 7 categories of filters that you can add. Each of these categories can be further refined by either selecting or deselecting specific filter parameters or by the user typing a filter string in the field provided. You can add and configure any number of filters in the 'Advanced Filter' dialog. Following are the options available in the 'Add' drop down menu: Advise : The 'Advise' option enables...
http://help.comodo.com/topic-213-1-517-5994-Filtering-Alerts-Displayed-Logs.html...run. Software publishers may be interested to know that they can have their signatures added, free of charge, to the 'master' Trusted Software Vendor List that ships to all users with CCE. Details about this can be found at the foot of this page. To access the 'Trusted Software Vendors' interface, click 'Tools' > 'Manage Trusted Vendors'. Column Descriptions Vendors - The company that published the software, and digitally signed their software. Defined By - Indicates whether the vendor was added to 'Trusted Software Vendor' list by Comodo (the vendor is globally whitelisted), or by the user Click here...
http://help.comodo.com/topic-119-1-328-3535-Manage-Trusted-Vendors.html...run for PDF file formats. Enable Phishing Signature checks If enabled, AV scanner checks for phishing email signature. Phishing Action You can reject or accept invalid recipients. Quarantine Phishing Mails If enabled, the AV scanner will place phishing emails in quarantine. Quarantined mails can be accessed by users through the webmail interface. Enable Phishing URL checks If enabled, AV scanner checks for emails that originated from phishing URLs Scan Archive Files If enabled, archived mails will also be scanned. The types of mail that should be archived and their related settings are configured in profile settings...
http://help.comodo.com/topic-443-1-898-11442-Advanced-Anti-Virus-Settings.html...run all unknown executables in the container and queue them for submission to Comodo for behavior analysis. Comodo recommends most users leave this setting intact to ensure the highest protection levels. Should you wish, you can create an 'Ignore' rule to exclude certain files or file types from containment. This is could be useful for developers testing new applications which, by their nature, are unknown to the Comodo safe list. Create an auto-containment exception 1. Click 'Settings' on the CCS home screen 2. Click 'Containment' > 'Auto-Containment' on the left 3. Ensure that 'Enable Auto-Containment' is selected...
http://help.comodo.com/topic-399-1-904-11973-Disable-Auto-Containment-on-a-Per-application-Basis.html...run. O pen the quarantine interface Click 'Security' > 'Endpoint Security' > 'Antivirus' Click the 'Quarantined Files' tab Select a group to view malware identified on its devices Or Select 'Show All' to view malware identified on all devices enrolled to Xcitium Column Heading Description OS The operating system of the device at which the item was quarantined. File Name The file that was moved to quarantine. Click the name of a file to view its details. See View details of a quarantined item for more details. Hash The SHA1 hash value of the quarantined file Click the icon...
http://help.comodo.com/topic-463-1-1029-15767-View-and-Manage-Quarantined-Items.html...Run a scan Open chc.exe Accept the end user license agreement: Send anonymous program usage statistics to Comodo - Comodo collects usage details so we can analyze how our users interact with CHC. This 'real-world' data allows us to create product improvements which reflect the needs of our users. Enable this option to send your usage data to Comodo servers through a secure, encrypted channel. Your privacy is not affected because the data is anonymized. Disable this option if you don't want to send usage details to Comodo. Read the license agreement and click 'I agree'. The main interface...
http://help.comodo.com/topic-447-1-928-12649-How-to-use-Comodo-Hijack-Cleaner.html