Search Results

Showing 81-90 from 236

More Options - Introduction (in Endpoint Manager)

...update options, external device control, and so on). Manage My Configurations - Manage, import and export CCS security settings as configuration profiles. Diagnostics - Identify any problems with your installation. Browse Support Forums - Links to Comodo User Forums. Help - The online help guide. About - Version and copy-right information about the product. View Antivirus Events - Manage logs of all antivirus events including files intercepted by real-time protection, manual scans, virus signature...

http://help.comodo.com/topic-399-1-925-12544-More-Options---Introduction.html
Manage CIS Tasks (in Comodo Internet Security)

...signature database updates and so on. The tasks that are currently run, can be sent to background from the progress interface, by clicking Send to Background as shown in the example below. These tasks can be managed through the Task manager interface that can be accessed at anytime by clicking Open Task Manager from the General Tasks interface.    Tip: The Task...

http://help.comodo.com/topic-72-1-451-4729-Manage-CIS-Tasks.html
Tasks (in Comodo Internet Security)

...signature database updates, scans run and so on. The  'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time...

http://help.comodo.com/topic-72-1-522-6263--Tasks.html
Manage CIS Tasks (in Comodo Internet Security)

...signature database updates and so on. The tasks that are currently run, can be sent to background from the progress interface, by clicking Send to Background as shown in the example below. These tasks can be managed, through the Task manager interface that can be accessed at anytime by clicking Open Task Manager from the 'Advanced Tasks' interface.   Tip: The Task...

http://help.comodo.com/topic-72-1-522-6249-Manage-CIS-Tasks.html
Tasks Logs (in Comodo Internet Security)

...signature database updates, scans run and so on. The  'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time...

http://help.comodo.com/topic-72-1-623-7700--Tasks-Logs.html
View Summary Information (in Endpoint Manager)

...space. Network Summary - Provides details about the mobile and WiFi networks to which the device is connected, including the MAC addresses of the device for connection through Bluetooth and WiFi. Security Summary - Provides details about important security settings of the device. For Android devices, details from Comodo Mobile Security (CMS) like Virus Signature Database version and update status are displayed. ...

http://help.comodo.com/topic-399-1-786-10186-View-Summary-Information.html
View Summary Information (in Xcitium Enterprise)

...space. Network Summary - Provides details about the mobile and WiFi networks to which the device is connected, including the MAC addresses of the device for connection through Bluetooth and WiFi. Security Summary - Provides details about important security settings of the device. For Android devices, details from Xcitium Mobile Security (CMS) like Virus Signature Database version and update status are displayed. ...

http://help.comodo.com/topic-463-1-1029-15623-View-Summary-Information.html
Appendix 3 - Glossary Of Terms (in Comodo Internet Security)

...signatures to their customer's local antivirus software via regular (often daily) updates. The customer’s antivirus software will then flag as a virus any program with a signature matching a signature on the blacklist. One drawback with the signature system is its reactive nature – it can only detect 'known' threats. The vendor has to first identify the file as a virus...

http://help.comodo.com/topic-72-1-451-5862-Appendix-3---Glossary-of-Terms.html
Appendix 2 - Glossary Of Terms (in Comodo Internet Security)

...signatures to their customer's local antivirus software via regular (often daily) updates. The customer’s antivirus software will then flag as a virus any program with a signature matching a signature on the blacklist. One drawback with the signature system is its reactive nature – it can only detect 'known' threats. The vendor has to first identify the file as a virus...

http://help.comodo.com/topic-72-1-623-7599-Appendix-2---Glossary-of-Terms.html
Appendix 3 - Glossary Of Terms (in Comodo Internet Security)

...signatures to their customer's local antivirus software via regular (often daily) updates. The customer’s antivirus software will then flag as a virus any program with a signature matching a signature on the blacklist. One drawback with the signature system is its reactive nature – it can only detect 'known' threats. The vendor has to first identify the file as a virus...

http://help.comodo.com/topic-72-1-522-6219-Appendix-3---Glossary-of-Terms.html
Pages 9 of 24 « Prev     Next »   Jump to page