Internet Security 6.3 Software Version 6.3
Total Page:16
File Type:pdf, Size:1020Kb
Comodo Internet Security 6.3 Software Version 6.3 User Guide Guide Version 6.3.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security 6.3 - User Guide Table of Contents 1.Introduction to Comodo Internet Security...............................................................................................................................6 1.1.Special Features...............................................................................................................................................................10 1.2.System Requirements.......................................................................................................................................................13 1.3.Installation.........................................................................................................................................................................13 1.3.1.CIS Premium - Installation........................................................................................................................................14 1.3.2.CIS Pro - Installation and Activation.........................................................................................................................27 1.3.3.CIS Complete - Installation and Activation...............................................................................................................39 1.3.4.Activating CIS Pro/Complete Services after Installation...........................................................................................52 1.3.4.1.Activating Your License...................................................................................................................................52 1.3.4.2.Activating Your Guarantee Coverage..............................................................................................................57 1.3.4.3.Renewal of Your License.................................................................................................................................60 1.4.Starting Comodo Internet Security....................................................................................................................................61 1.5.The Main Interface ...........................................................................................................................................................62 1.5.1.The Home Screen....................................................................................................................................................64 1.5.2.The Tasks Interface..................................................................................................................................................71 1.5.3.The Widget...............................................................................................................................................................72 1.5.4.The System Tray Icon..............................................................................................................................................73 1.6.Understanding Security Alerts...........................................................................................................................................76 2.General Tasks - Introduction...................................................................................................................................................89 2.1.Scan and Clean Your Computer........................................................................................................................................90 2.1.1.Run a Quick Scan ...................................................................................................................................................91 2.1.2.Run a Full Computer Scan.......................................................................................................................................96 2.1.3.Run a Rating Scan.................................................................................................................................................101 2.1.4.Run a Custom Scan...............................................................................................................................................104 2.1.4.1.Scan a Folder ...............................................................................................................................................105 2.1.4.2.Scan a File ...................................................................................................................................................108 2.1.4.3.Create, Schedule and Run a Custom Scan ..................................................................................................111 2.2.Instantly Scan Files and Folders.....................................................................................................................................120 2.3.Processing Infected Files................................................................................................................................................125 2.4.Manage Virus Database and Program Updates..............................................................................................................132 2.5.Manage Quarantined Items.............................................................................................................................................135 2.6.View CIS Logs.................................................................................................................................................................139 2.6.1.Antivirus Logs.........................................................................................................................................................141 2.6.1.1.Filtering Antivirus Logs..................................................................................................................................142 2.6.2.Firewall Logs..........................................................................................................................................................145 2.6.2.1.Filtering Firewall Logs...................................................................................................................................147 2.6.3.Defense+ Logs.......................................................................................................................................................152 2.6.3.1.Filtering Defense+ Logs ...............................................................................................................................153 2.6.4.'Alerts' Logs............................................................................................................................................................156 2.6.4.1.Filtering 'Alerts Displayed' Logs....................................................................................................................158 2.6.5.Tasks......................................................................................................................................................................163 2.6.5.1.Filtering 'Tasks Launched' Logs....................................................................................................................164 2.6.6.Configuration Changes..........................................................................................................................................167 2.6.6.1.Filtering 'Configuration Changes' Logs..........................................................................................................169 Comodo Internet Security 2013 User Guide | © 2013 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Internet Security 6.3 - User Guide 2.7.Manage CIS Tasks..........................................................................................................................................................172 2.8.View Active Internet Connections....................................................................................................................................176 2.9.View Active Process List.................................................................................................................................................182 3.Firewall Tasks - Introduction.................................................................................................................................................184 3.1.Allow or Block Internet Access to Applications Selectively .............................................................................................185 3.2.Stealth your Computer Ports ..........................................................................................................................................187 3.3.Manage Network Connections........................................................................................................................................188 3.4.Stop all Network Activities...............................................................................................................................................189 3.5.Advanced Firewall Settings.............................................................................................................................................189 4.Sandbox Tasks - Introduction ..............................................................................................................................................191