Search Results

Showing 881-890 from 1131

Disabling Behavior Blocker And Auto-Sandboxing On A Per-application Basis (in Comodo Internet Security)

... Disabling Behavior Blocker and Auto-Sandboxing on a Per-application Basis   Behavior Blocker will auto-sandbox run unknown executables and queue them for submission to Comodo Cloud scanners for behavior analysis. Users do, however, have the option to exclude specific files or file types from this auto-sandboxing process. This is particularly useful for developers that are creating new...

http://help.comodo.com/topic-72-1-451-5143-Disabling-Behavior-Blocker-and-Auto-Sandboxing-on-a-Per-application-Basis.html
Blocked Files (in Endpoint Manager)

... Blocked Files   CCS allows you to lock-down files and folders by denying all access rights to them from other processes or users - effectively cutting them off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files in 'Protected Files', users...

http://help.comodo.com/topic-399-1-904-11881-Blocked-Files.html
Network Status (in Comodo Dome Firewall)

... Network Status   The Network Status screen displays real-time logs containing status information about components like connected Network Interfaces, Network Interface Controllers (NICs), routing table entries and address Resolution Protocol (ARP). To open the 'Network Status' interface, click 'Status' on the left then 'Network Status': The screen displays the following information panes one below the other: Interfaces NIC Status...

http://help.comodo.com/topic-451-1-940-12907-Network-Status.html
Run Browsers Inside Sandbox (in Comodo Internet Security)

... Run Browsers Inside Sandbox   This page explains how to run your Internet browser inside the sandbox. Surfing the Internet with a sandboxed browser is the same as normal, with the benefit that any malicious files you inadvertently download cannot do damage your real computer. You can also create a desktop shortcut to run the browser inside the sandbox on...

http://help.comodo.com/topic-72-1-623-7659-Run-Browsers-Inside-Sandbox.html
Protected Files (in Endpoint Manager)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-399-1-904-11880-Protected-Files.html
Protected Objects - HIPS (in Xcitium Enterprise)

... Protected Objects - HIPS   This area lets you protect specific files, folders, registry keys and COM interfaces against modification by unauthorized processes. Click 'Settings' on the XCS home screen to open the 'Advanced Settings' interface. Click 'HIPS' > 'Protected Objects' on the left: The interface has the following sub-sections: Protected Files - Applications and files which are protected from modification...

http://help.comodo.com/topic-463-1-1033-15962-Protected-Objects---HIPS.html
HIPS Rule Sets (in Comodo Internet Security)

... HIPS Rule Sets   A Pre-defined ruleset is a set of access rights and protection settings that has been saved and can be re-used and deployed on multiple applications or groups. Each ruleset is comprised of a number of 'Rules' and each of these 'Rules' is defined by a set of conditions/settings/parameters. 'Predefined rulesets' is a set of...

http://help.comodo.com/topic-72-1-623-7733-HIPS-Rule-Sets.html
Computer Security Policy (in Comodo Internet Security)

... Computer Security Policy   The Computer Security Policy area allows the user to view manage and edit the Defense+ security policies that apply to applications, Predefined Security Policies, define protected Files and Folders, Registry Keys, COM interfaces, files to be always sandboxed or blocked, define a list of Trusted Software Vendors and so forth.   The default security policy in...

http://help.comodo.com/topic-72-1-284-2978-Computer-Security-Policy.html
HIPS Rule Sets (in Advanced Endpoint Protection)

... HIPS Rule Sets   Click 'Settings' > 'HIPS' > 'Rulesets' A ruleset is a collection of  access rights and protection settings  that can be applied to applications on your computer. Each ruleset consists of a number of rules, and each of these rules is defined by a set of conditions and parameters. Rulesets govern an application's rights...

http://help.comodo.com/topic-467-1-1050-16661-HIPS-Rule-Sets.html
Containment Settings (in Xcitium Enterprise)

... Containment Settings Click 'Settings' > 'Containment' to open this interface. If XCS encounters a file that has a trust status of 'Unknown' then you have the option to automatically run that file in the container. The container is a secure, virtual environment where unknown files can run, but cannot affect the rest of your computer. Files in the container are...

http://help.comodo.com/topic-463-1-1033-15868-Containment-Settings.html
Pages 89 of 114 « Prev     Next »   Jump to page