Search Results

Showing 871-880 from 1132

HIPS Rule Sets (in Comodo Internet Security)

... HIPS Rule Sets   A Pre-defined ruleset is a set of access rights and protection settings that has been saved and can be re-used and deployed on multiple applications or groups. Each ruleset is comprised of a number of 'Rules' and each of these 'Rules' is defined by a set of conditions/settings/parameters. 'Predefined rulesets' is a set of...

http://help.comodo.com/topic-72-1-522-6305-HIPS-Rule-Sets.html
Protected Objects (in Endpoint Manager)

... Protected Objects The protected objects area lets you protect files, folders, registry keys and COM interfaces against access or modification by unauthorized processes. There are two basic options you can choose: Read access only - Processes can access but not modify the protected item Click 'Advanced Settings' > 'HIPS' > 'Protected Objects...

http://help.comodo.com/topic-399-1-904-13784-Protected-Objects.html
Protected Objects - HIPS (in Xcitium Enterprise)

... Protected Objects - HIPS   This area lets you protect specific files, folders, registry keys and COM interfaces against modification by unauthorized processes. Click 'Settings' on the XCS home screen to open the 'Advanced Settings' interface. Click 'HIPS' > 'Protected Objects' on the left: The interface has the following sub-sections: Protected Files - Applications and files which are protected from modification...

http://help.comodo.com/topic-463-1-1033-15962-Protected-Objects---HIPS.html
Protected Files (in Comodo Internet Security)

... Protected Files The Protected Files tab displays a list of files and file groups that are protected from access by other programs, especially malicious programs such as virus, Trojans and spyware. It is also useful for safeguarding very valuable files (spreadsheets, databases, documents) by denying anyone and any program the ability to modify the file - avoiding the possibility of accidental...

http://help.comodo.com/topic-72-1-451-4847-Protected-Files-.html
Protected Objects - HIPS (in Advanced Endpoint Protection)

... Protected Objects - HIPS   This area lets you protect specific files, folders, registry keys and COM interfaces against modification by unauthorized processes. Click 'Settings' on the CCS home screen to open the 'Advanced Settings' interface. Click 'HIPS' > 'Protected Objects' on the left: The interface has the following sub-sections: Protected Files  - Applications and files which are protected from...

http://help.comodo.com/topic-467-1-1050-16666-Protected-Objects---HIPS.html
HIPS Rule Sets (in Comodo Internet Security)

... HIPS Rule Sets   A Pre-defined ruleset is a set of access rights and protection settings that has been saved and can be re-used and deployed on multiple applications or groups. Each ruleset is comprised of a number of 'Rules' and each of these 'Rules' is defined by a set of conditions/settings/parameters. 'Predefined rulesets' is a set of...

http://help.comodo.com/topic-72-1-451-4763-HIPS-Rule-Sets.html
Protected Objects (in Comodo Internet Security)

... Protected Objects   The Protected Objects panel allows you to protect specific files and folders, system critical registry keys and COM interfaces against access or modification by unauthorized processes and services. The Protected Objects panel can be accessed by clicking Security Settings > Defense+ > HIPS > Protected Objects from the  Advanced Settings interface. The panel has four...

http://help.comodo.com/topic-72-1-451-4764-Protected-Objects.html
Running An Untrusted Program Inside Sandbox (in Comodo Internet Security)

...   Running An Untrusted Program Inside Sandbox   Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust.   To run a program inside the sandbox Browse to the...

http://help.comodo.com/topic-72-1-284-3066-Running-An-Untrusted-Program-Inside-Sandbox.html
Running Untrusted Programs Inside Sandbox (in Comodo Internet Security)

... Running Untrusted Programs Inside Sandbox Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. You can also create a desktop shortcut to run the application inside the sandbox...

http://help.comodo.com/topic-72-1-451-4806-Running-Untrusted-Programs-Inside-Sandbox.html
View Logs (in Comodo Dome Firewall)

... View Logs   The 'Logs' module shows events that are currently taking place across all modules, allowing you to troubleshoot problems and monitor activities in real time. Logs can be filtered according to date, keyword or module. You can also export logs from selected modules to generate reports in .csv format. Click 'Logs' on the left-menu See the following...

http://help.comodo.com/topic-451-1-936-12765-View-Logs.html
Pages 88 of 114 « Prev     Next »   Jump to page