Comodo Internet Security User Guide | © 2017 Comodo Security Solutions Inc
Total Page:16
File Type:pdf, Size:1020Kb
Comodo Internet Security Software Version 8.4 User Guide Guide Version 8.4.112017 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security - User Guide Table of Contents 1. Introduction to Comodo Internet Security.............................................................................................................6 1.1.Special Features...............................................................................................................................................10 1.2.System Requirements.......................................................................................................................................14 1.3.Installation.........................................................................................................................................................15 1.3.1.CIS Premium - Installation........................................................................................................................15 1.3.2.CIS Pro - Installation and Activation.........................................................................................................30 1.3.3.CIS Complete - Installation and Activation...............................................................................................43 1.3.4.Activating CIS Pro/Complete Services after Installation...........................................................................55 1.3.4.1.Activating Your License....................................................................................................................55 1.3.4.2.Activating Your Guarantee Coverage..............................................................................................66 1.3.4.3.Renewal of Your License.................................................................................................................74 1.4.Starting Comodo Internet Security....................................................................................................................74 1.5.The Main Interface ...........................................................................................................................................76 1.5.1.The Home Screen....................................................................................................................................78 1.5.2.The Tasks Interface..................................................................................................................................89 1.5.3.The Widget...............................................................................................................................................90 1.5.4.The System Tray Icon..............................................................................................................................92 1.6.Understanding Security Alerts...........................................................................................................................94 2. General Tasks - Introduction...............................................................................................................................114 2.1.Scan and Clean Your Computer......................................................................................................................115 2.1.1.Run a Quick Scan ..................................................................................................................................116 2.1.2.Run a Full Computer Scan.....................................................................................................................122 2.1.3.Run a Rating Scan.................................................................................................................................127 2.1.4.Run a Custom Scan...............................................................................................................................130 2.1.4.1.Scan a Folder ...............................................................................................................................131 2.1.4.2.Scan a File ....................................................................................................................................135 2.1.4.3.Create, Schedule and Run a Custom Scan ..................................................................................138 2.2.Instantly Scan Files and Folders.....................................................................................................................146 2.3.Processing Infected Files................................................................................................................................151 2.4.Manage Virus Database and Program Updates.............................................................................................156 2.5.Manage Quarantined Items.............................................................................................................................159 2.6.View CIS Logs.................................................................................................................................................164 2.6.1.Antivirus Logs.........................................................................................................................................166 2.6.1.1.Filtering Antivirus Logs...................................................................................................................167 2.6.2.Viruscope Logs.......................................................................................................................................171 2.6.2.1.Filtering Viruscope Logs................................................................................................................173 2.6.3.Firewall Logs..........................................................................................................................................177 2.6.3.1.Filtering Firewall Logs....................................................................................................................179 2.6.4.Defense+ Logs.......................................................................................................................................187 2.6.4.1.Filtering Defense+ Logs ................................................................................................................188 2.6.5.'Website Filtering' Logs...........................................................................................................................193 Comodo Internet Security User Guide | © 2017 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Internet Security - User Guide 2.6.5.1.Filtering 'Website Filtering' Logs ...................................................................................................194 2.6.6.'Alerts' Logs............................................................................................................................................199 2.6.6.1.Filtering 'Alerts Displayed' Logs.....................................................................................................200 2.6.7.Tasks Logs..............................................................................................................................................207 2.6.7.1.Filtering 'Tasks' Logs......................................................................................................................208 2.6.8.Configuration Changes Logs..................................................................................................................213 2.6.8.1.Filtering 'Configuration Changes' Logs..........................................................................................215 2.7.Get Live Support.............................................................................................................................................220 2.8.View Active Internet Connections....................................................................................................................220 2.9.View Sandboxed Processes List.....................................................................................................................225 3. Firewall Tasks - Introduction...............................................................................................................................227 3.1.Allow or Block Internet Access to Applications Selectively ............................................................................228 3.2.Stealth your Computer Ports ..........................................................................................................................230 3.3.Manage Network Connections........................................................................................................................232 3.4.Stop all Network Activities...............................................................................................................................233 3.5.Advanced Firewall Settings.............................................................................................................................233 4. Sandbox Tasks - Introduction ............................................................................................................................235 4.1.The Virtual Desktop.........................................................................................................................................236 4.1.1.Starting the Virtual Desktop....................................................................................................................237