Comodo Internet Security User Guide
Total Page:16
File Type:pdf, Size:1020Kb
Comodo Internet Security 2012 Software Version 5.9/5.10 User Guide Guide Version 5.9/5.10.082919 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo Internet Security 2012 - User Guide Table of Contents 1.Introduction to Comodo Internet Security............................................................................................................................... 5 1.1.Special Features................................................................................................................................................................. 9 1.2.System Requirements....................................................................................................................................................... 11 1.3.Installation......................................................................................................................................................................... 12 1.3.1.CIS Premium - Installation........................................................................................................................................ 12 1.3.2.CIS Pro - Installation and Activation.........................................................................................................................22 1.3.3.CIS Complete - Installation and Activation ..............................................................................................................33 1.3.3.1.Installing Comodo Internet Security 2012 Complete.......................................................................................35 1.3.3.2.Activating Online Backup, TrustConnect and Guarantee................................................................................45 1.3.3.3.Installing Comodo Backup..............................................................................................................................48 1.3.3.4.Installing Comodo TrustConnect.....................................................................................................................53 1.3.4.Activating CIS Pro/Complete Services after Installation ..........................................................................................60 1.3.4.1.Activating Your License................................................................................................................................... 60 1.3.4.2.Activating Your Guarantee Coverage..............................................................................................................63 1.3.4.3.Renewal of Your License................................................................................................................................. 69 1.4.Starting Comodo Internet Security.................................................................................................................................... 70 1.5.Overview of Summary Screens......................................................................................................................................... 72 1.5.1.Comodo Internet Security - Summary......................................................................................................................72 1.5.2.Comodo Antivirus - Summary................................................................................................................................... 74 1.5.3.Comodo Firewall - Summary.................................................................................................................................... 76 1.6.Comodo Internet Security - Navigation ............................................................................................................................. 77 1.7.Understanding Alerts......................................................................................................................................................... 78 2.Antivirus Tasks - Introduction................................................................................................................................................. 90 2.1.Run a Scan....................................................................................................................................................................... 92 2.2.Update Virus Database................................................................................................................................................... 101 2.3.Quarantined Items........................................................................................................................................................... 102 2.4.View Antivirus Events...................................................................................................................................................... 103 2.5.Submit Files to Comodo for Analysis...............................................................................................................................114 2.6.Scheduled Scans............................................................................................................................................................. 117 2.7.Scan Profiles................................................................................................................................................................... 119 2.8.Scanner Settings............................................................................................................................................................. 122 2.8.1.Real Time Scanning .............................................................................................................................................. 123 2.8.2.Manual Scanning................................................................................................................................................... 125 2.8.3.Scheduled Scanning ............................................................................................................................................. 127 2.8.4.Exclusions.............................................................................................................................................................. 129 3.Firewall Tasks - Introduction................................................................................................................................................. 130 3.1.View Firewall Events....................................................................................................................................................... 131 3.2.Define a New Trusted Application.................................................................................................................................... 139 3.3.Define a New Blocked Application................................................................................................................................... 140 3.4.Network Security Policy................................................................................................................................................... 141 3.4.1.General Navigation................................................................................................................................................ 142 3.4.2.Application Rules................................................................................................................................................... 142 3.4.3.Global Rules........................................................................................................................................................... 153 3.4.4.Predefined Policies................................................................................................................................................ 154 Comodo Internet Security 2012 User Guide | © 2019 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Internet Security 2012 - User Guide 3.4.5.Network Zones....................................................................................................................................................... 156 3.4.6.Blocked Zones....................................................................................................................................................... 159 3.4.7.Port Sets................................................................................................................................................................ 162 3.5.View Active Connections................................................................................................................................................. 165 3.6.Stealth Ports Wizard........................................................................................................................................................ 167 3.7.Firewall Behavior Settings............................................................................................................................................... 170 3.7.1.General Settings.................................................................................................................................................... 170 3.7.2.Alert Settings.......................................................................................................................................................... 175 3.7.3.Advanced Settings................................................................................................................................................. 176 4.Defense+ Tasks - Introduction.............................................................................................................................................