Comodo Cloud Antivirus User Guide | © 2019 Comodo Security Solutions Inc
Total Page:16
File Type:pdf, Size:1020Kb
Comodo Cloud Antivirus Software Version 1.20 User Guide Guide Version 1.20.082919 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Cloud Antivirus - User Guide Table of Contents 1. Introduction to Comodo Cloud Antivirus................................................................................................................5 1.1.System Requirements..........................................................................................................................................6 1.2.Installation ...........................................................................................................................................................7 1.3.Start Comodo Cloud Antivirus............................................................................................................................16 1.3.1.The Main Interface....................................................................................................................................18 1.3.2.The Widget................................................................................................................................................22 1.3.3.The System Tray Icon...............................................................................................................................24 1.4.'Lucky You' Statistics..........................................................................................................................................25 1.5.Understand CCAV Alerts....................................................................................................................................29 2. Scan and Clean your Computer ............................................................................................................................40 2.1.Run a Quick Scan..............................................................................................................................................41 2.2.Run a Full Computer Scan.................................................................................................................................43 2.3.Run a Certificate Scan.......................................................................................................................................45 2.4.Run a Custom Scan...........................................................................................................................................48 2.4.1.Scan a Folder............................................................................................................................................49 2.4.2.Scan a File.................................................................................................................................................53 2.5.Process Infected Files........................................................................................................................................56 2.6.Manage Detected Threats..................................................................................................................................58 2.7.View Valkyrie Analysis Results...........................................................................................................................60 3. The Sandbox............................................................................................................................................................66 3.1.Run an Application or Browser in the Sandbox..................................................................................................67 3.2.Manage Sandboxed Items.................................................................................................................................70 3.2.1.Review Files..............................................................................................................................................73 4. View CCAV Logs......................................................................................................................................................75 4.1.Antivirus Logs.....................................................................................................................................................77 4.2.Executed Application Logs (Sandbox Logs)......................................................................................................78 4.3.Setting Changes Logs........................................................................................................................................79 4.4.Scan Actions Logs..............................................................................................................................................80 5. View and Manage Quarantined Items....................................................................................................................81 6. CCAV Settings..........................................................................................................................................................85 6.1.General Settings................................................................................................................................................87 6.1.1.Customize User Interface..........................................................................................................................88 6.1.2.Configure Program Updates......................................................................................................................95 6.2. Antivirus Settings...............................................................................................................................................97 6.2.1.Antivirus Settings.......................................................................................................................................97 6.2.2.Exclusions...............................................................................................................................................100 Comodo Cloud Antivirus User Guide | © 2019 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Cloud Antivirus - User Guide 6.3.Sandbox Settings.............................................................................................................................................114 6.3.1.Sandbox Settings.....................................................................................................................................115 6.3.2.Sandbox Rules........................................................................................................................................117 6.3.3.Protected Files/Folders...........................................................................................................................120 6.3.4.Track Files Created in the Sandbox........................................................................................................122 6.4.File Rating Settings..........................................................................................................................................124 6.4.1.File Rating Settings.................................................................................................................................125 6.4.2.Trusted Applications................................................................................................................................126 6.4.3.Submitted Applications............................................................................................................................131 6.4.4.Trusted Vendors......................................................................................................................................133 6.5.Advanced Protection Settings..........................................................................................................................141 6.5.1.Browser Settings Protection ...................................................................................................................141 6.5.2.Miscellaneous Protection Settings..........................................................................................................144 7. Get Live Support....................................................................................................................................................149 8. Viruscope - Feature Spotlight...............................................................................................................................150 9. Comodo Internet Security Essentials..................................................................................................................152 9.1.Understand Alerts and Configure Exceptions..................................................................................................166 10.Comodo Support and About Information...........................................................................................................170 Appendix 1 - How to Tutorials..................................................................................................................................173 Enable / Disable AV, Sandbox and Game Mode....................................................................................................174 Run an Antivirus Scan on Selected Items..............................................................................................................176 Block Incoming / Outgoing Internet Connection to Sandboxed Applications.........................................................178