Showing 81-90 from 236
...update options, external device control, and so on). Manage My Configurations - Manage, import and export CCS security settings as configuration profiles. Diagnostics - Identify any problems with your installation. Browse Support Forums - Links to Comodo User Forums. Help - The online help guide. About - Version and copy-right information about the product. View Antivirus Events - Manage logs of all antivirus events including files intercepted by real-time protection, manual scans, virus signature...
http://help.comodo.com/topic-399-1-925-12544-More-Options---Introduction.html...signature database updates and so on. The tasks that are currently run, can be sent to background from the progress interface, by clicking Send to Background as shown in the example below. These tasks can be managed through the Task manager interface that can be accessed at anytime by clicking Open Task Manager from the General Tasks interface. Tip: The Task...
http://help.comodo.com/topic-72-1-451-4729-Manage-CIS-Tasks.html...signature database updates, scans run and so on. The 'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time...
http://help.comodo.com/topic-72-1-522-6263--Tasks.html...signature database updates and so on. The tasks that are currently run, can be sent to background from the progress interface, by clicking Send to Background as shown in the example below. These tasks can be managed, through the Task manager interface that can be accessed at anytime by clicking Open Task Manager from the 'Advanced Tasks' interface. Tip: The Task...
http://help.comodo.com/topic-72-1-522-6249-Manage-CIS-Tasks.html...signature database updates, scans run and so on. The 'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time...
http://help.comodo.com/topic-72-1-623-7700--Tasks-Logs.html...space. Network Summary - Provides details about the mobile and WiFi networks to which the device is connected, including the MAC addresses of the device for connection through Bluetooth and WiFi. Security Summary - Provides details about important security settings of the device. For Android devices, details from Comodo Mobile Security (CMS) like Virus Signature Database version and update status are displayed. ...
http://help.comodo.com/topic-399-1-786-10186-View-Summary-Information.html...space. Network Summary - Provides details about the mobile and WiFi networks to which the device is connected, including the MAC addresses of the device for connection through Bluetooth and WiFi. Security Summary - Provides details about important security settings of the device. For Android devices, details from Xcitium Mobile Security (CMS) like Virus Signature Database version and update status are displayed. ...
http://help.comodo.com/topic-463-1-1029-15623-View-Summary-Information.html...signatures to their customer's local antivirus software via regular (often daily) updates. The customer’s antivirus software will then flag as a virus any program with a signature matching a signature on the blacklist. One drawback with the signature system is its reactive nature – it can only detect 'known' threats. The vendor has to first identify the file as a virus...
http://help.comodo.com/topic-72-1-451-5862-Appendix-3---Glossary-of-Terms.html...signatures to their customer's local antivirus software via regular (often daily) updates. The customer’s antivirus software will then flag as a virus any program with a signature matching a signature on the blacklist. One drawback with the signature system is its reactive nature – it can only detect 'known' threats. The vendor has to first identify the file as a virus...
http://help.comodo.com/topic-72-1-623-7599-Appendix-2---Glossary-of-Terms.html...signatures to their customer's local antivirus software via regular (often daily) updates. The customer’s antivirus software will then flag as a virus any program with a signature matching a signature on the blacklist. One drawback with the signature system is its reactive nature – it can only detect 'known' threats. The vendor has to first identify the file as a virus...
http://help.comodo.com/topic-72-1-522-6219-Appendix-3---Glossary-of-Terms.html