Comodo Internet Security User Guide
Total Page:16
File Type:pdf, Size:1020Kb
Comodo Internet Security 2012 Software Version 5.9/5.10 User Guide Guide Version 5.9/5.10.110812 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Comodo Internet Security 2012 - User Guide Table of Contents 1.Introduction to Comodo Internet Security............................................................................................................................... 5 1.1.Special Features................................................................................................................................................................. 9 1.2.System Requirements....................................................................................................................................................... 11 1.3.Installation......................................................................................................................................................................... 12 1.3.1.CIS Premium - Installation........................................................................................................................................ 12 1.3.2.CIS Pro - Installation and Activation.........................................................................................................................22 1.3.3.CIS Complete - Installation and Activation ..............................................................................................................33 1.3.3.1.Installing Comodo Internet Security 2012 Complete.......................................................................................35 1.3.3.2.Activating Online Backup, TrustConnect and Guarantee................................................................................45 1.3.3.3.Installing Comodo Backup..............................................................................................................................48 1.3.3.4.Installing Comodo TrustConnect.....................................................................................................................53 1.3.4.Activating CIS Pro/Complete Services after Installation ..........................................................................................60 1.3.4.1.Activating Your License................................................................................................................................... 60 1.3.4.2.Activating Your Guarantee Coverage..............................................................................................................63 1.3.4.3.Renewal of Your License................................................................................................................................. 69 1.4.Starting Comodo Internet Security.................................................................................................................................... 70 1.5.Overview of Summary Screens......................................................................................................................................... 72 1.5.1.Comodo Internet Security - Summary......................................................................................................................72 1.5.2.Comodo Antivirus - Summary................................................................................................................................... 74 1.5.3.Comodo Firewall - Summary.................................................................................................................................... 76 1.6.Comodo Internet Security - Navigation ............................................................................................................................. 77 1.7.Understanding Alerts......................................................................................................................................................... 78 2.Antivirus Tasks - Introduction................................................................................................................................................. 90 2.1.Run a Scan....................................................................................................................................................................... 91 2.2.Update Virus Database................................................................................................................................................... 100 2.3.Quarantined Items........................................................................................................................................................... 101 2.4.View Antivirus Events...................................................................................................................................................... 102 2.5.Submit Files to Comodo for Analysis...............................................................................................................................113 2.6.Scheduled Scans............................................................................................................................................................. 115 2.7.Scan Profiles................................................................................................................................................................... 117 2.8.Scanner Settings............................................................................................................................................................. 120 2.8.1.Real Time Scanning .............................................................................................................................................. 121 2.8.2.Manual Scanning................................................................................................................................................... 123 2.8.3.Scheduled Scanning ............................................................................................................................................. 125 2.8.4.Exclusions.............................................................................................................................................................. 127 3.Firewall Tasks - Introduction................................................................................................................................................. 128 3.1.View Firewall Events....................................................................................................................................................... 129 3.2.Define a New Trusted Application.................................................................................................................................... 137 3.3.Define a New Blocked Application................................................................................................................................... 138 3.4.Network Security Policy................................................................................................................................................... 139 3.4.1.General Navigation................................................................................................................................................ 140 3.4.2.Application Rules................................................................................................................................................... 140 Comodo Internet Security 2012 User Guide | © 2012 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Internet Security 2012 - User Guide 3.4.3.Global Rules........................................................................................................................................................... 150 3.4.4.Predefined Policies................................................................................................................................................ 152 3.4.5.Network Zones....................................................................................................................................................... 153 3.4.6.Blocked Zones....................................................................................................................................................... 156 3.4.7.Port Sets................................................................................................................................................................ 159 3.5.View Active Connections................................................................................................................................................. 162 3.6.Stealth Ports Wizard........................................................................................................................................................ 164 3.7.Firewall Behavior Settings............................................................................................................................................... 167 3.7.1.General Settings.................................................................................................................................................... 167 3.7.2.Alert Settings.......................................................................................................................................................... 172 3.7.3.Advanced Settings................................................................................................................................................. 173 4.Defense+ Tasks - Introduction.............................................................................................................................................