Comodo Internet Security User Guide | © 2014 Comodo Security Solutions Inc
Total Page:16
File Type:pdf, Size:1020Kb
Comodo Internet Security Software Version 7.0 User Guide Guide Version 7.0.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security - User Guide Table of Contents 1.Introduction to Comodo Internet Security...............................................................................................................................6 1.1.Special Features...............................................................................................................................................................10 1.2.System Requirements.......................................................................................................................................................14 1.3.Installation.........................................................................................................................................................................14 1.3.1.CIS Premium - Installation........................................................................................................................................14 1.3.2.CIS Pro - Installation and Activation.........................................................................................................................31 1.3.3.CIS Complete - Installation and Activation...............................................................................................................45 1.3.4.Activating CIS Pro/Complete Services after Installation...........................................................................................60 1.3.4.1.Activating Your License...................................................................................................................................60 1.3.4.2.Activating Your Guarantee Coverage..............................................................................................................67 1.3.4.3.Renewal of Your License.................................................................................................................................70 1.4.Starting Comodo Internet Security....................................................................................................................................71 1.5.The Main Interface ...........................................................................................................................................................73 1.5.1.The Home Screen....................................................................................................................................................75 1.5.2.The Tasks Interface..................................................................................................................................................85 1.5.3.The Widget...............................................................................................................................................................86 1.5.4.The System Tray Icon..............................................................................................................................................87 1.6.Understanding Security Alerts...........................................................................................................................................89 2.General Tasks - Introduction.................................................................................................................................................108 2.1.Scan and Clean Your Computer......................................................................................................................................108 2.1.1.Run a Quick Scan .................................................................................................................................................110 2.1.2.Run a Full Computer Scan.....................................................................................................................................114 2.1.3.Run a Rating Scan.................................................................................................................................................119 2.1.4.Run a Custom Scan...............................................................................................................................................124 2.1.4.1.Scan a Folder ...............................................................................................................................................124 2.1.4.2.Scan a File ...................................................................................................................................................128 2.1.4.3.Create, Schedule and Run a Custom Scan .................................................................................................131 2.2.Instantly Scan Files and Folders.....................................................................................................................................139 2.3.Processing Infected Files................................................................................................................................................144 2.4.Manage Virus Database and Program Updates..............................................................................................................149 2.5.Manage Quarantined Items.............................................................................................................................................152 2.6.View CIS Logs.................................................................................................................................................................156 2.6.1.Antivirus Logs.........................................................................................................................................................158 2.6.1.1.Filtering Antivirus Logs..................................................................................................................................159 2.6.2.Firewall Logs..........................................................................................................................................................163 2.6.2.1.Filtering Firewall Logs...................................................................................................................................165 2.6.3.Defense+ Logs.......................................................................................................................................................171 2.6.3.1.Filtering Defense+ Logs ...............................................................................................................................172 2.6.4.'Website Filtering' Logs..........................................................................................................................................176 2.6.4.1.Filtering 'Website Filtering' Logs ...................................................................................................................177 2.6.5.'Alerts' Logs............................................................................................................................................................180 2.6.5.1.Filtering 'Alerts Displayed' Logs....................................................................................................................181 2.6.6.Tasks......................................................................................................................................................................187 2.6.6.1.Filtering 'Tasks Launched' Logs....................................................................................................................187 Comodo Internet Security User Guide | © 2014 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Internet Security - User Guide 2.6.7.Configuration Changes..........................................................................................................................................191 2.6.7.1.Filtering 'Configuration Changes' Logs..........................................................................................................193 2.7.Get Live Support.............................................................................................................................................................197 2.8.View Active Internet Connections....................................................................................................................................197 2.9.View Active Process List.................................................................................................................................................201 3.Firewall Tasks - Introduction.................................................................................................................................................204 3.1.Allow or Block Internet Access to Applications Selectively .............................................................................................205 3.2.Stealth your Computer Ports ..........................................................................................................................................206 3.3.Manage Network Connections........................................................................................................................................208 3.4.Stop all Network Activities...............................................................................................................................................209 3.5.Advanced Firewall Settings.............................................................................................................................................209