TM Creating Trust Online Comodo Internet Security Pro User Guide Comodo Internet Security Pro – User Guide 1 Table of Contents 1 Comodo Internet Security Pro - Introduction................................................................................................... 6 1.1 Special Features..................................................................................................................................... 10 1.2 Installation .............................................................................................................................................. 12 1.3 System Requirements............................................................................................................................ 30 1.4 Starting Comodo Internet Security Pro................................................................................................... 30 1.5 Overview of Summary Screens ............................................................................................................. 31 1.5.1 Comodo Internet Security Pro - Summary...................................................................................... 31 1.5.2 Comodo Antivirus - Summary ........................................................................................................ 34 1.5.3 Comodo Firewall - Summary ......................................................................................................... 36 1.6 Comodo Internet Security Pro - Navigation ............................................................................................ 38 1.7 Understanding Alerts.............................................................................................................................. 39 1.7.1 Answering an Antivirus Alert........................................................................................................... 40 1.7.2 Answering Firewall Alert ................................................................................................................ 42 1.7.3 Answering Defense+ Alerts ........................................................................................................... 43 2 Antivirus Tasks Overview................................................................................................................................ 47 2.1 Run a Scan............................................................................................................................................. 48 2.2 Update Virus Database .......................................................................................................................... 57 2.3 Quarantined Items ................................................................................................................................. 58 2.4 View Antivirus Events............................................................................................................................. 60 2.5 Scheduled Scans ................................................................................................................................... 66 2.6 Scan Profiles .......................................................................................................................................... 69 2.7 Scanner Settings - Overview.................................................................................................................. 73 2.7.1 Real Time Scanning....................................................................................................................... 74 2.7.2 Manual Scanning ........................................................................................................................... 76 2.7.3 Scheduled Scanning....................................................................................................................... 77 Comodo Internet Security Pro – User Guide 2 2.7.4 Exclusions ...................................................................................................................................... 79 3 Firewall Task Center....................................................................................................................................... 81 3.1 Network Security Policy.......................................................................................................................... 82 3.2 Pre-defined Firewall Policies................................................................................................................... 96 3.3 Attack Detection Settings........................................................................................................................ 98 3.4 Firewall Behavior Settings...................................................................................................................... 102 3.5 View Firewall Events............................................................................................................................... 106 3.6 Define a New Trusted Application........................................................................................................... 112 3.7 Define a New Blocked Application.......................................................................................................... 114 3.8 Stealth Ports Wizard............................................................................................................................... 115 3.9 View Active Connections........................................................................................................................ 119 3.10 My Port Sets......................................................................................................................................... 120 3.11 My Network Zones................................................................................................................................ 123 3.12 My Blocked Network Zones.................................................................................................................. 126 4 Defense+ Tasks Overview.............................................................................................................................. 129 4.1 View Defense+ Events............................................................................................................................ 131 4.2 My Protected Files.................................................................................................................................. 138 4.3 My Blocked Files .................................................................................................................................... 141 4.4 My Pending Files.................................................................................................................................... 143 4.5 My Own Safe Files.................................................................................................................................. 145 4.6 View Active Process List......................................................................................................................... 147 4.7 My Trusted Software Vendors................................................................................................................ 148 4.8 My Protected Registry Keys.................................................................................................................... 153 4.9 My Protected COM Interfaces................................................................................................................. 155 4.10 Computer Security Policy...................................................................................................................... 157 4.11 Image Execution Control Settings......................................................................................................... 164 Comodo Internet Security Pro – User Guide 3 4.12 Predefined Security Policies................................................................................................................. 166 4.13 Defense+ Settings................................................................................................................................ 167 5 Miscellaneous Overview................................................................................................................................. 173 5.1 Settings .................................................................................................................................................. 174 5.2 Manage My Configurations .................................................................................................................... 179 5.3 Diagnostics............................................................................................................................................. 184 5.4 Check for Updates.................................................................................................................................. 184 5.5 Submit Suspicious Files ......................................................................................................................... 186 5.6 Browse Support Forums ........................................................................................................................ 189 5.7 Help ....................................................................................................................................................... 190 5.8 About ....................................................................................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages213 Page
-
File Size-