Showing 861-870 from 1131
... Running Untrusted Programs in the Sandbox Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded and/or you are not sure that you trust. There are a couple of ways of doing this: Run a program inside the sandbox by...
http://help.comodo.com/topic-72-1-721-8687-Running-Untrusted-Programs-in-the-Sandbox.html... Containment Settings Click 'Settings' > 'Containment' to open this interface. If CCS encounters a file that has a trust status of 'Unknown' then you have the option to automatically run that file in the container. The container is a secure, virtual environment where unknown files can run, but cannot affect the rest of your computer. Files in the container are...
http://help.comodo.com/topic-467-1-1050-16681-Containment-Settings.html... Protected Objects The Protected Objects panel allows you to protect specific files and folders, system critical registry keys and COM interfaces against access or modification by unauthorized processes and services. The Protected Objects panel can be accessed by clicking Security Settings > Defense+ > HIPS > Protected Objects from the Advanced Settings interface. The panel has four...
http://help.comodo.com/topic-72-1-451-4764-Protected-Objects.html... HIPS Rule Sets Click 'Settings' > 'HIPS' > 'Rulesets' A ruleset is a collection of access rights and protection settings that can be applied to applications on your computer. Each ruleset consists of a number of rules, and each of these rules is defined by a set of conditions and parameters. Rulesets govern an application's rights to access...
http://help.comodo.com/topic-399-1-904-11866-HIPS-Rule-Sets.html... Disable Auto-Sandboxing on a Per-application Basis The default auto-sandbox rules will run unknown executables in sandboxed environment and queue them for submission to Comodo Cloud scanners for behavior analysis. Users do, however, have the option to exclude specific files or file types from this auto-sandboxing process by creating a rule. This is particularly useful for developers...
http://help.comodo.com/topic-213-1-517-8259-Disable-Auto-Sandboxing-on-a-Per-application-Basis.html... Blocked Files Defense+ allows you to lock-down files and folders by completely denying all access rights to them from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files that are placed...
http://help.comodo.com/topic-72-1-451-4848-Blocked-Files.html... Protected Objects Click 'Settings' > 'HIPS' > 'Protected Objects' The protected objects area lets you specify varying levels of access restriction to files/folders/registry keys on your computer. Protected Files / Registry Keys / COM interfaces - Items you add to these areas can be read by other processes, but not modified by them. Blocked Files – Items you place in here...
http://help.comodo.com/topic-72-1-766-9166-Protected-Objects.html... Network Status The 'Network Status' screen shows real-time logs about connected network interfaces, network interface controllers (NICs), routing table entries and address resolution protocol (ARP). Please use the following links to find out more about each area: Interfaces NIC Status Routing Table Entries ARP Entries Administrator can navigate to the required pane by clicking the shortcut...
http://help.comodo.com/topic-451-1-936-12779-Network-Status.html... Run Untrusted Programs in the Container Click 'Tasks' > 'Containment Tasks' > 'Run Virtual' Choose the program you want to run Click 'Open' CIS lets you run programs inside the container on a 'one-off' basis. This is helpful to test new/beta programs you have downloaded but are not yet sure you trust. You can also create a...
http://help.comodo.com/topic-72-1-838-10607-Run-Untrusted-Programs-in-the-Container.html... Blocked Files Defense+ allows you to lock-down files and folders by completely denying all access rights to them from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files that are placed...
http://help.comodo.com/topic-72-1-623-7750-Blocked-Files.html