Showing 891-900 from 1131
... Set up the Behavior Blocker for Maximum Security and Usability This page explains on configuring the Behavior Blocker to auto-sandbox applications that are unrecognized by CIS to prevent potential damages to your system from untrusted programs. To configure Behavior Blocker Open 'Tasks' interface by clicking the green curved arrow at top right of the 'Home' screen Open...
http://help.comodo.com/topic-72-1-522-6346-Set-up-the-Behavior-Blocker-for-Maximum-Security-and-Usability.html... Protected Files Click 'Settings' > 'HIPS' > 'Protected Objects' > 'Protected Files' The protected files screen shows file groups to which other processes have read-only access. Programs on your computer can read the items in here, but cannot modify them. This prevents malicious programs from modifying important personal or system data. A good example of a file that ought...
http://help.comodo.com/topic-72-1-766-9186-Protected-Files.html... Protected Objects The Protected Objects panel allows you to protect specific files and folders, system critical registry keys and COM interfaces against access or modification by unauthorized processes and services. You can also add files in Protected Data Folders, so that Sandboxed programs will be blocked from accessing them. The Protected Objects panel can be accessed by clicking Security...
http://help.comodo.com/topic-72-1-623-7734-Protected-Objects.html... Configure IPSec/L2TP Users Click 'VPN' > 'IPSec / L2TP Users' in the left-hand menu This area lets you add users for managed organizations that need to connect to the internal network via IPSec VPN tunnel Note 1 - You need to configure IPSec and L2TP servers before the users you add can connect. Note 2 - Existing users are imported when you...
http://help.comodo.com/topic-451-1-939-13694-Configure-IPSec-L2TP-Users.html... Create Rules to Auto-Contain Applications Click 'Settings' > 'Containment' > 'Auto-Containment' Auto-containment rules let you define which types of files should automatically run in the container. You can contain files based on various criteria, including location and file source. A contained application has much less opportunity to damage your computer because it runs isolated from your...
http://help.comodo.com/topic-399-1-904-11793-Create-Rules-to-Auto-Contain-Applications.html... Running Untrusted Programs Inside Sandbox Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. You can also create a desktop shortcut to run the application inside the sandbox...
http://help.comodo.com/topic-72-1-451-4806-Running-Untrusted-Programs-Inside-Sandbox.html... Blocked Files Click 'Settings' > 'HIPS' > 'Protected Objects' > 'Blocked Files' If you block a file or folder then you completely prevent access to it from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that...
http://help.comodo.com/topic-72-1-766-9187-Blocked-Files.html... Create Rules for Auto-Sandboxing Applications You can define rules for programs that should be run in the sandboxed environment. A sandboxed application has much less opportunity to damage your computer because it is run isolated from your operating system and your files. CAVS ships with a set of pre-defined auto-sandbox rules that are configured to provide maximum...
http://help.comodo.com/topic-213-1-517-8256-Create-Rules-for-Auto-Sandboxing-Applications.html... Create Rules to Auto-Contain Applications Click 'Settings' > 'Containment' > 'Auto-Containment' Auto-containment rules let you define which types of files should automatically run in the container. You can contain files based on various criteria, including location and file source. A contained application has much less opportunity to damage your computer because it runs isolated from your...
http://help.comodo.com/topic-467-1-1050-16707-Create-Rules-to-Auto-Contain-Applications.html... Protected Objects The Protected Objects panel allows you to protect specific files and folders, system critical registry keys and COM interfaces against access or modification by unauthorized processes and services. The Protected Objects panel can be accessed by clicking Security Settings > Defense+ > HIPS > Protected Objects from the Advanced Settings interface. The panel has five tabs...
http://help.comodo.com/topic-72-1-522-6306-Protected-Objects.html