Comodo Internet Security User Guide
Total Page:16
File Type:pdf, Size:1020Kb
www.comodo.com www.comodo.com Comodo Internet Security 2011 Version 5.0 Comodo Security Solutions Inc. 525 Washington Bvld, User Guide Jersey City, NJ 07310 United States 1 Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved. www.comodo.com Table of Contents 1 Introduction to Comodo Internet Security.........................6 1.1 Special Features........................................................................................................................................... 11 1.2 System Requirements.................................................................................................................................. 14 1.3 Installation.................................................................................................................................................... 14 1.3.1 CIS Premium - Installation....................................................................................................................... 15 1.3.2 CIS Pro- Installation and Activation.........................................................................................................24 1.3.2.1 Installing Comodo Internet Security 2011 Pro and Live PC Support.................................................27 1.3.2.2 Activating Your TrustConnect Service and Guarantee......................................................................33 1.3.3 CIS Complete – Installation and Activation .............................................................................................36 1.3.3.1 Installing Comodo Internet Security 2011 Complete and Live PC Support.......................................38 1.3.3.2 Activating Your Online Backup and TrustConnect Services and Guarantee.....................................44 1.3.3.3 Installing Comodo Backup................................................................................................................48 1.3.3.4 Installing Comodo TrustConnect.......................................................................................................57 1.3.3.5 Installing Comodo Dragon Browser..................................................................................................66 1.3.4 Activating Your CIS Pro and CIS Complete Services after Installation ...................................................72 1.3.4.1 Activating Your Subscription.............................................................................................................72 1.3.4.2 Activating Your Guarantee Coverage................................................................................................75 1.3.4.3 Renewal of Your Subscription...........................................................................................................81 1.4 Starting Comodo Internet Security................................................................................................................82 1.5 Overview of Summary Screens....................................................................................................................84 1.5.1 Comodo Internet Security – Summary.....................................................................................................84 1.5.2 Comodo Antivirus – Summary.................................................................................................................87 1.5.3 Comodo Firewall – Summary..................................................................................................................89 1.6 Comodo Internet Security – Navigation .......................................................................................................91 1.7 Understanding Alerts.................................................................................................................................... 92 2 Antivirus Tasks - Introduction.........................................108 2.1 Run a Scan................................................................................................................................................. 109 2 Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved. www.comodo.com 2.2 Update Virus Database............................................................................................................................... 120 2.3 Quarantined Items...................................................................................................................................... 121 2.4 View Antivirus Events................................................................................................................................. 123 2.5 Submit Files to Comodo for Analysis..........................................................................................................137 2.6 Scheduled Scans........................................................................................................................................ 140 2.7 Scan Profiles............................................................................................................................................... 142 2.8 Scanner Settings........................................................................................................................................ 146 2.8.1 Real Time Scanning .............................................................................................................................. 147 2.8.2 Manual Scanning................................................................................................................................... 149 2.8.3 Scheduled Scanning .............................................................................................................................151 2.8.4 Exclusions............................................................................................................................................. 153 3 Firewall Tasks- Introduction............................................155 3.1 View Firewall Events................................................................................................................................... 156 3.2 Define a New Trusted Application...............................................................................................................165 3.3 Define a New Blocked Application..............................................................................................................167 3.4 Network Security Policy..............................................................................................................................168 3.4.1 General Navigation................................................................................................................................ 169 3.4.2 Application Rules................................................................................................................................... 170 3.4.3 Global Rules.......................................................................................................................................... 182 3.4.4 Predefined Policies................................................................................................................................ 184 3.4.5 Network Zones...................................................................................................................................... 186 3.4.6 Blocked Zones....................................................................................................................................... 190 3.4.7 Port Sets................................................................................................................................................ 193 3.5 View Active Connections.............................................................................................................................197 3.6 Stealth Ports Wizard................................................................................................................................... 199 3.7 Firewall Behavior Settings..........................................................................................................................203 3.7.1 General Settings.................................................................................................................................... 203 3.7.2 Alert Settings......................................................................................................................................... 206 3.7.3 Advanced Settings................................................................................................................................. 207 4 Defense+ Tasks- Introduction.........................................209 3 Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved. www.comodo.com 4.1 The Sandbox - An Introduction....................................................................................................................211 4.1.1 Unknown Files: The Sand-boxing and Scanning Processes.................................................................212 4.2 View Defense+ Events................................................................................................................................ 214 4.3 Trusted Files............................................................................................................................................... 222 4.4 Unrecognized Files....................................................................................................................................