Comodo Internet Security User Guide | © 2019 Comodo Security Solutions Inc
Total Page:16
File Type:pdf, Size:1020Kb
Comodo Internet Security Software Version 6.3 User Guide Guide Version 6.3.082819 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ, 07013 United States Comodo Internet Security 6.3 - User Guide Table of Contents 1. Introduction to Comodo Internet Security.............................................................................................................................. 6 1.1.Special Features............................................................................................................................................................... 10 1.2.System Requirements....................................................................................................................................................... 13 1.3.Installation......................................................................................................................................................................... 13 1.3.1.CIS Premium - Installation........................................................................................................................................ 14 1.3.2.CIS Pro - Installation and Activation.........................................................................................................................27 1.3.3.CIS Complete - Installation and Activation...............................................................................................................39 1.3.4.Activating CIS Pro/Complete Services after Installation...........................................................................................52 1.3.4.1.Activating Your License................................................................................................................................... 52 1.3.4.2.Activating Your Guarantee Coverage..............................................................................................................57 1.3.4.3.Renewal of Your License................................................................................................................................. 60 1.4.Starting Comodo Internet Security.................................................................................................................................... 61 1.5.The Main Interface ........................................................................................................................................................... 62 1.5.1.The Home Screen.................................................................................................................................................... 64 1.5.2.The Tasks Interface.................................................................................................................................................. 71 1.5.3.The Widget............................................................................................................................................................... 72 1.5.4.The System Tray Icon.............................................................................................................................................. 73 1.6.Understanding Security Alerts........................................................................................................................................... 75 2. General Tasks - Introduction.................................................................................................................................................. 89 2.1.Scan and Clean Your Computer........................................................................................................................................ 90 2.1.1.Run a Quick Scan ................................................................................................................................................... 91 2.1.2.Run a Full Computer Scan....................................................................................................................................... 96 2.1.3.Run a Rating Scan................................................................................................................................................. 101 2.1.4.Run a Custom Scan............................................................................................................................................... 104 2.1.4.1.Scan a Folder ............................................................................................................................................... 105 2.1.4.2.Scan a File ................................................................................................................................................... 108 2.1.4.3.Create, Schedule and Run a Custom Scan ..................................................................................................111 2.2.Instantly Scan Files and Folders..................................................................................................................................... 120 2.3.Processing Infected Files................................................................................................................................................ 125 2.4.Manage Virus Database and Program Updates..............................................................................................................132 2.5.Manage Quarantined Items............................................................................................................................................. 135 2.6.View CIS Logs................................................................................................................................................................. 139 2.6.1.Antivirus Logs......................................................................................................................................................... 141 2.6.1.1.Filtering Antivirus Logs.................................................................................................................................. 142 2.6.2.Firewall Logs.......................................................................................................................................................... 145 2.6.2.1.Filtering Firewall Logs................................................................................................................................... 147 2.6.3.Defense+ Logs....................................................................................................................................................... 152 2.6.3.1.Filtering Defense+ Logs ............................................................................................................................... 153 2.6.4.'Alerts' Logs............................................................................................................................................................ 156 2.6.4.1.Filtering 'Alerts Displayed' Logs....................................................................................................................158 2.6.5.Tasks...................................................................................................................................................................... 163 2.6.5.1.Filtering 'Tasks Launched' Logs....................................................................................................................164 2.6.6.Configuration Changes.......................................................................................................................................... 167 2.6.6.1.Filtering 'Configuration Changes' Logs..........................................................................................................169 Comodo Internet Security User Guide | © 2019 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Internet Security 6.3 - User Guide 2.7.Manage CIS Tasks.......................................................................................................................................................... 172 2.8.View Active Internet Connections.................................................................................................................................... 177 2.9.View Active Process List................................................................................................................................................. 182 3. Firewall Tasks - Introduction................................................................................................................................................ 184 3.1.Allow or Block Internet Access to Applications Selectively .............................................................................................185 3.2.Stealth your Computer Ports .......................................................................................................................................... 187 3.3.Manage Network Connections........................................................................................................................................ 188 3.4.Stop all Network Activities............................................................................................................................................... 189 3.5.Advanced Firewall Settings............................................................................................................................................. 189 4. Sandbox Tasks - Introduction ............................................................................................................................................