Search Results

Showing 901-910 from 1132

Blocked Files (in Comodo Internet Security)

... Blocked Files Click 'Settings' > 'HIPS' > 'Protected Objects' > 'Blocked Files' If you block a file or folder then you completely prevent access to it from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that...

http://help.comodo.com/topic-72-1-766-9187-Blocked-Files.html
HIPS Rule Sets (in Comodo Internet Security)

... HIPS Rule Sets   A Pre-defined ruleset is a set of access rights and protection settings that has been saved and can be re-used and deployed on multiple applications or groups. Each ruleset is comprised of a number of 'Rules' and each of these 'Rules' is defined by a set of conditions/settings/parameters. 'Predefined rulesets' is a set of...

http://help.comodo.com/topic-72-1-623-7733-HIPS-Rule-Sets.html
Create Rules For Auto-Sandboxing Applications (in Comodo Internet Security)

... Create Rules for Auto-Sandboxing Applications You can define rules for programs that should be run in the sandboxed environment. A sandboxed application has much less opportunity to damage your computer because it is run isolated from your operating system and your files. CIS ships with a set of pre-defined auto-sandbox rules that are configured to provide maximum...

http://help.comodo.com/topic-72-1-623-7653-Create-Rules-for-Auto-Sandboxing-Applications.html
Protected Files (in Comodo Internet Security)

... Protected Files The Protected Files tab displays a list of files and file groups that are protected from access by other programs, especially malicious programs such as virus, Trojans and spyware. It is also useful for safeguarding very valuable files (spreadsheets, databases, documents) by denying anyone and any program the ability to modify the file - avoiding the possibility of accidental...

http://help.comodo.com/topic-72-1-623-7749-Protected-Files.html
Protected Objects (in Advanced Endpoint Protection)

... Protected Objects The protected objects area lets you protect files, folders, registry keys and COM interfaces against access or modification by unauthorized processes. There are two basic options you can choose: Read access only  - Processes can access but not modify the protected item Click 'Advanced Settings' > 'HIPS' > 'Protected...

http://help.comodo.com/topic-467-1-1050-16665-Protected-Objects.html
Set Up The Behavior Blocker For Maximum Security And Usability (in Comodo Internet Security)

... Set up the Behavior Blocker for Maximum Security and Usability   This page explains on configuring the Behavior Blocker to auto-sandbox applications that are unrecognized by CIS to prevent potential damages to your system from untrusted programs.   To configure Behavior Blocker Open 'Tasks' interface by clicking the green curved arrow at top right of the 'Home' screen Open...

http://help.comodo.com/topic-72-1-522-6346-Set-up-the-Behavior-Blocker-for-Maximum-Security-and-Usability.html
Run Untrusted Programs Inside Sandbox (in Comodo Internet Security)

... Run Untrusted Programs Inside Sandbox Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. You can also create a desktop shortcut to run the application inside the sandbox...

http://help.comodo.com/topic-72-1-522-6351-Run-Untrusted-Programs-Inside-Sandbox.html
Protected Files (in Endpoint Manager)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-399-1-904-11880-Protected-Files.html
Run Browsers Inside Sandbox (in Comodo Internet Security)

... Run Browsers Inside Sandbox   This page explains how to run your Internet browser inside the sandbox. Surfing the Internet with a sandboxed browser is the same as normal, with the benefit that any malicious files you inadvertently download cannot do damage your real computer. You can also create a desktop shortcut to run the browser inside the sandbox on...

http://help.comodo.com/topic-72-1-522-6352-Run-Browsers-Inside-Sandbox.html
Create Rules To Auto-Contain Applications (in Comodo Internet Security)

... Create Rules to Auto-Contain Applications   Click 'Settings' > 'Containment' > 'Auto-Containment' Auto-containment rules determine whether a program is allowed to run as normal, run with restrictions, or run in the virtual environment. A contained application has much less opportunity to damage your computer because it is isolated from your operating system, important system files and personal...

http://help.comodo.com/topic-72-1-766-9084-Create-Rules-to-Auto-Contain-Applications.html
Pages 91 of 114 « Prev     Next »   Jump to page