Search Results

Showing 901-910 from 1131

Protected Files (in Xcitium Enterprise)

... Protected Files The protected files screen shows file groups that are protected from access by other programs. Files in this area are 'read only'. They can be accessed and read by other programs, but not modified. This prevents malicious programs from hijacking important files. It is also useful for safeguarding valuable files (spreadsheets, databases, documents) against accidental or deliberate sabotage...

http://help.comodo.com/topic-463-1-1033-15978-Protected-Files.html
Protected Objects - HIPS (in Endpoint Manager)

... Protected Objects - HIPS   This area lets you protect specific files, folders, registry keys and COM interfaces against modification by unauthorized processes. Click 'Settings' on the CCS home screen to open the 'Advanced Settings' interface. Click 'HIPS' > 'Protected Objects' on the left: The interface has the following sub-sections: Protected Files - Applications and files which are protected from modification...

http://help.comodo.com/topic-399-1-904-11867-Protected-Objects---HIPS.html
Run Untrusted Programs Inside Sandbox (in Comodo Internet Security)

... Run Untrusted Programs Inside Sandbox Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. You can also create a desktop shortcut to run the application inside the sandbox...

http://help.comodo.com/topic-72-1-522-6351-Run-Untrusted-Programs-Inside-Sandbox.html
Appendix - Minimum Requirements For Software Installations (in Comodo Dome Firewall)

... Appendix: Minimum Requirements for Software Installations Korugan is also available as software which can be installed on a PC: Korugan Lite ( https://www.korugan.com/koruganlite.php ) - Free, feature limited version of Korugan which can be installed on any PC Korugan VM ( https://www.korugan.com/koruganvm.php ) - Fully featured version of Korugan in VM format To run one of the software versions, please ensure your...

http://help.comodo.com/topic-451-1-936-12766-Appendix---Minimum-Requirements-for-Software-Installations.html
Protected Files (in Comodo Internet Security)

... Protected Files The Protected Files tab displays a list of files and file groups that are protected from access by other programs, especially malicious programs such as virus, Trojans and spyware. It is also useful for safeguarding very valuable files (spreadsheets, databases, documents) by denying anyone and any program the ability to modify the file - avoiding the possibility of accidental...

http://help.comodo.com/topic-72-1-522-6309-Protected-Files-.html
Protected Objects (in Xcitium Enterprise)

... Protected Objects The protected objects area lets you protect files, folders, registry keys and COM interfaces against access or modification by unauthorized processes. There are two basic options you can choose: Read access only - Processes can access but not modify the protected item Click 'Advanced Settings' > 'HIPS' > 'Protected Objects...

http://help.comodo.com/topic-463-1-1033-15866-Protected-Objects.html
Blocked Files (in Comodo Internet Security)

... Blocked Files   Defense+ allows you to lock-down files and folders by completely denying all access rights to them from other processes or users - effectively cutting it off from the rest of your system. If the file you block is an executable, then neither you nor anything else is able to run that program. Unlike files that are placed...

http://help.comodo.com/topic-72-1-522-6310-Blocked-Files.html
HIPS Rule Sets (in Comodo Internet Security)

... HIPS Rule Sets   A Pre-defined ruleset is a set of access rights and protection settings that has been saved and can be re-used and deployed on multiple applications or groups. Each ruleset is comprised of a number of 'Rules' and each of these 'Rules' is defined by a set of conditions/settings/parameters. 'Predefined rulesets' is a set of...

http://help.comodo.com/topic-72-1-522-6305-HIPS-Rule-Sets.html
Sandbox (in Comodo Internet Security)

... Sandbox   The Sandbox is an integral part of the Defense+ engine and is used to run potentially unsafe applications in an isolated environment to prevent damage to your system. The Defense+ engine through various analyses, determines whether an application is trusted, unrecognized or malware. You can define rules how these identified applications can be run in the Sandbox, that...

http://help.comodo.com/topic-72-1-623-7735-Sandbox.html
Disable Auto-Sandboxing On A Per-application Basis (in Comodo Internet Security)

... Disable Auto-Sandboxing on a Per-application Basis   The default auto-sandbox rules will run unknown executables in sandboxed environment and queue them for submission to Comodo Cloud scanners for behavior analysis. Users do, however, have the option to exclude specific files or file types from this auto-sandboxing process by creating a rule. This is particularly useful for...

http://help.comodo.com/topic-72-1-623-7666-Disable-Auto-Sandboxing-on-a-Per-application-Basis.html
Pages 91 of 114 « Prev     Next »   Jump to page