4.1.5 My Own Safe Files................................................................................................................................ 210
4.1.6 View Active Process List........................................................................................................................ 211
4.1.7 My Trusted Software Vendors................................................................................................................ 212
4.1.8 My Protected Registry Keys.................................................................................................................. 218
4.1.9 My Protected COM Interfaces...............................................................................................................221
4.2 The Sandbox.............................................................................................................................................. 223
4.2.1 The Sandboxing Process....................................................................................................................... 224
4.2.2 Add a Program to the Sandbox.............................................................................................................. 226
4.2.3 Sandbox Settings.................................................................................................................................. 230
4.2.3.1 General Settings............................................................................................................................. 230
4.2.3.2 Alert Settings.................................................................................................................................. 233
4.2.4 Run Programs in the Sandbox............................................................................................................... 234
4.3 Advanced Tasks.......................................................................................................................................... 236
4.3.1 Computer Security Policy ..................................................................................................................... 237
4.3.2 Predefined Security Policies.................................................................................................................. 243
4.3.3 Image Execution Control Settings.........................................................................................................245
4.3.3.1 General Settings ............................................................................................................................ 245
4.3.3.2 Files to Check Settings................................................................................................................... 246
4.3.4 Defense+ Settings................................................................................................................................. 247
4.3.4.1 General Settings............................................................................................................................. 248
4.3.4.2 Monitor Settings.............................................................................................................................. 251
5 More... Options.................................................................254
5.1 Settings....................................................................................................................................................... 255
5.1.1 General Settings.................................................................................................................................... 256
5.1.2 Language Settings................................................................................................................................. 257
5.1.3 Parental Control Settings....................................................................................................................... 257
5.1.4 Themes.................................................................................................................................................. 259
5.1.5 Logging Settings.................................................................................................................................... 259
5.1.6 Connection Settings.............................................................................................................................. 260
5.1.7 Update Settings..................................................................................................................................... 261
4
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.