Search Results

Showing 851-860 from 1131

Protected Objects - HIPS (in Advanced Endpoint Protection)

... Protected Objects - HIPS   This area lets you protect specific files, folders, registry keys and COM interfaces against modification by unauthorized processes. Click 'Settings' on the CCS home screen to open the 'Advanced Settings' interface. Click 'HIPS' > 'Protected Objects' on the left: The interface has the following sub-sections: Protected Files  - Applications and files which are protected from...

http://help.comodo.com/topic-467-1-1050-16666-Protected-Objects---HIPS.html
Protected Files (in Comodo Internet Security)

... Protected Files The Protected Files tab displays a list of files and file groups that are protected from access by other programs, especially malicious programs such as virus, Trojans and spyware. It is also useful for safeguarding very valuable files (spreadsheets, databases, documents) by denying anyone and any program the ability to modify the file - avoiding the possibility of accidental...

http://help.comodo.com/topic-72-1-451-4847-Protected-Files-.html
Protected Objects (in Advanced Endpoint Protection)

... Protected Objects The protected objects area lets you protect files, folders, registry keys and COM interfaces against access or modification by unauthorized processes. There are two basic options you can choose: Read access only  - Processes can access but not modify the protected item Click 'Advanced Settings' > 'HIPS' > 'Protected...

http://help.comodo.com/topic-467-1-1050-16665-Protected-Objects.html
Run Untrusted Programs In The Sandbox (in Comodo Antivirus for Servers)

... Run Untrusted Programs i n t he Sandbox   Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. You can also create a desktop shortcut to run the...

http://help.comodo.com/topic-213-1-517-8257-Run-Untrusted-Programs-in-the-Sandbox.html
Disable Behavior Blocker And Auto-Sandboxing On A Per-application Basis (in Comodo Internet Security)

... Disable Behavior Blocker and Auto-Sandboxing on a Per-application Basis   Behavior Blocker will auto-sandbox run unknown executables and queue them for submission to Comodo Cloud scanners for behavior analysis. Users do, however, have the option to exclude specific files or file types from this auto-sandboxing process. This is particularly useful for developers that are creating new...

http://help.comodo.com/topic-72-1-522-6359-Disable-Behavior-Blocker-and-Auto-Sandboxing-on-a-Per-application-Basis.html
HIPS Rule Sets (in Comodo Internet Security)

... HIPS Rule Sets    Click 'Settings' > 'HIPS' > 'Rulesets' A ruleset is a collection of access rights and protection settings that can be deployed to applications on your computer. Each ruleset consists of a number of rules, and each of these rules is defined by a set of conditions and parameters. Rulesets govern an application's rights to...

http://help.comodo.com/topic-72-1-766-9165-HIPS-Rule-Sets.html
Create Rules To Auto-Contain Applications (in Xcitium Enterprise)

... Create Rules to Auto-Contain Applications Click 'Settings' > 'Containment' > 'Auto-Containment' Auto-containment rules let you define which types of files should automatically run in the container. You can contain files based on various criteria, including location and file source. A contained application has much less opportunity to damage your computer because it runs isolated from your operating...

http://help.comodo.com/topic-463-1-1033-15877-Create-Rules-to-Auto-Contain-Applications.html
Blocked Files (in Advanced Endpoint Protection)

... Blocked Files   CCS allows you to lock-down files and folders by denying all access rights to them from other processes or users - effectively cutting them off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files in 'Protected Files', users...

http://help.comodo.com/topic-467-1-1050-16668-Blocked-Files.html
Containment Settings (in Endpoint Manager)

... Containment Settings Click 'Settings' > 'Containment' to open this interface. If CCS encounters a file that has a trust status of 'Unknown' then you have the option to automatically run that file in the container. The container is a secure, virtual environment where unknown files can run, but cannot affect the rest of your computer. Files in the container are...

http://help.comodo.com/topic-399-1-904-11775-Containment-Settings.html
Create Rules To Auto-Contain Applications (in Comodo Internet Security)

... Create Rules to Auto-Contain Applications   Click 'Settings' > 'Containment' > 'Auto-Containment' Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal...

http://help.comodo.com/topic-72-1-766-9084-Create-Rules-to-Auto-Contain-Applications.html
Pages 86 of 114 « Prev     Next »   Jump to page