Comodo Cloud Antivirus User Guide | © 2019 Comodo Security Solutions Inc

Comodo Cloud Antivirus User Guide | © 2019 Comodo Security Solutions Inc

Comodo Cloud Antivirus Software Version 1.20 User Guide Guide Version 1.20.082919 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Cloud Antivirus - User Guide Table of Contents 1. Introduction to Comodo Cloud Antivirus................................................................................................................5 1.1.System Requirements..........................................................................................................................................6 1.2.Installation ...........................................................................................................................................................7 1.3.Start Comodo Cloud Antivirus............................................................................................................................16 1.3.1.The Main Interface....................................................................................................................................18 1.3.2.The Widget................................................................................................................................................22 1.3.3.The System Tray Icon...............................................................................................................................24 1.4.'Lucky You' Statistics..........................................................................................................................................25 1.5.Understand CCAV Alerts....................................................................................................................................29 2. Scan and Clean your Computer ............................................................................................................................40 2.1.Run a Quick Scan..............................................................................................................................................41 2.2.Run a Full Computer Scan.................................................................................................................................43 2.3.Run a Certificate Scan.......................................................................................................................................45 2.4.Run a Custom Scan...........................................................................................................................................48 2.4.1.Scan a Folder............................................................................................................................................49 2.4.2.Scan a File.................................................................................................................................................53 2.5.Process Infected Files........................................................................................................................................56 2.6.Manage Detected Threats..................................................................................................................................58 2.7.View Valkyrie Analysis Results...........................................................................................................................60 3. The Sandbox............................................................................................................................................................66 3.1.Run an Application or Browser in the Sandbox..................................................................................................67 3.2.Manage Sandboxed Items.................................................................................................................................70 3.2.1.Review Files..............................................................................................................................................73 4. View CCAV Logs......................................................................................................................................................75 4.1.Antivirus Logs.....................................................................................................................................................77 4.2.Executed Application Logs (Sandbox Logs)......................................................................................................78 4.3.Setting Changes Logs........................................................................................................................................79 4.4.Scan Actions Logs..............................................................................................................................................80 5. View and Manage Quarantined Items....................................................................................................................81 6. CCAV Settings..........................................................................................................................................................85 6.1.General Settings................................................................................................................................................87 6.1.1.Customize User Interface..........................................................................................................................88 6.1.2.Configure Program Updates......................................................................................................................95 6.2. Antivirus Settings...............................................................................................................................................97 6.2.1.Antivirus Settings.......................................................................................................................................97 6.2.2.Exclusions...............................................................................................................................................100 Comodo Cloud Antivirus User Guide | © 2019 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Cloud Antivirus - User Guide 6.3.Sandbox Settings.............................................................................................................................................114 6.3.1.Sandbox Settings.....................................................................................................................................115 6.3.2.Sandbox Rules........................................................................................................................................117 6.3.3.Protected Files/Folders...........................................................................................................................120 6.3.4.Track Files Created in the Sandbox........................................................................................................122 6.4.File Rating Settings..........................................................................................................................................124 6.4.1.File Rating Settings.................................................................................................................................125 6.4.2.Trusted Applications................................................................................................................................126 6.4.3.Submitted Applications............................................................................................................................131 6.4.4.Trusted Vendors......................................................................................................................................133 6.5.Advanced Protection Settings..........................................................................................................................141 6.5.1.Browser Settings Protection ...................................................................................................................141 6.5.2.Miscellaneous Protection Settings..........................................................................................................144 7. Get Live Support....................................................................................................................................................149 8. Viruscope - Feature Spotlight...............................................................................................................................150 9. Comodo Internet Security Essentials..................................................................................................................152 9.1.Understand Alerts and Configure Exceptions..................................................................................................166 10.Comodo Support and About Information...........................................................................................................170 Appendix 1 - How to Tutorials..................................................................................................................................173 Enable / Disable AV, Sandbox and Game Mode....................................................................................................174 Run an Antivirus Scan on Selected Items..............................................................................................................176 Block Incoming / Outgoing Internet Connection to Sandboxed Applications.........................................................178

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    227 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us