
Comodo Internet Security Software Version 10.0 User Guide Guide Version 10.0.122117 Comodo Security Solutions 1255 Broad Street Clifton, NJ, 07013 United States Comodo Internet Security - User Guide Table of Contents 1.Introduction to Comodo Internet Security..............................................................................................................7 1.1.Special Features...............................................................................................................................................11 1.2.Downloading, Installation and Activation...........................................................................................................15 1.3.Starting Comodo Internet Security ...................................................................................................................16 1.4.The Main Interface............................................................................................................................................18 1.4.1.The Home Screen....................................................................................................................................23 1.4.2.The Tasks Interface..................................................................................................................................34 1.4.3.The Widget...............................................................................................................................................34 1.4.4.The System Tray Icon...............................................................................................................................36 1.5.Understanding Security Alerts...........................................................................................................................38 2. General Tasks - Introduction.................................................................................................................................61 2.1.Scan and Clean Your Computer........................................................................................................................62 2.1.1.Run a Quick Scan ....................................................................................................................................64 2.1.2.Run a Full Computer Scan.......................................................................................................................68 2.1.3.Run a Rating Scan...................................................................................................................................72 2.1.4.Run a Custom Scan.................................................................................................................................75 2.1.4.1.Scan a Folder ..................................................................................................................................76 2.1.4.2.Scan a File ......................................................................................................................................80 2.1.4.3.Create, Schedule and Run a Custom Scan ....................................................................................83 2.2.Secure Shopping Settings.................................................................................................................................92 2.3.Manage Virus Database and Program Updates...............................................................................................94 2.4.Get Live Support...............................................................................................................................................98 2.5.Manage Blocked Items......................................................................................................................................98 2.6.Instantly Scan Files and Folders.....................................................................................................................104 2.7.Processing Infected Files................................................................................................................................108 3.Firewall Tasks - Introduction.................................................................................................................................111 3.1.Allow or Block Internet Access to Applications Selectively .............................................................................112 3.2.Manage Network Connections........................................................................................................................114 3.3.Stop All Network Activities...............................................................................................................................115 3.4.Stealth your Computer Ports ..........................................................................................................................115 3.5.View Active Internet Connections....................................................................................................................117 4. Containment Tasks - Introduction ......................................................................................................................121 4.1.Run an Application in the Container................................................................................................................122 4.2.Reset the Container........................................................................................................................................126 4.3.Identify and Kill Unsafe Running Processes...................................................................................................128 4.4.View Active Process List.................................................................................................................................131 4.5.The Virtual Desktop.........................................................................................................................................132 4.5.1.Starting the Virtual Desktop....................................................................................................................134 4.5.2.The Main Interface..................................................................................................................................136 4.5.3.Running Browsers Inside the Virtual Desktop........................................................................................141 4.5.4.Opening Files and Running Applications inside the Virtual Desktop......................................................143 Comodo Internet Security User Guide | © 2017 Comodo Security Solutions Inc. | All rights reserved 2 Comodo Internet Security - User Guide 4.5.5.Configuring the Virtual Desktop..............................................................................................................144 4.5.6.Closing the Virtual Desktop....................................................................................................................145 5.Advanced Tasks - Introduction.............................................................................................................................146 5.1.Create a Rescue Disk ....................................................................................................................................146 5.1.1.Download and Burn Comodo Rescue Disk............................................................................................147 5.2.Remove Deeply Hidden Malware ...................................................................................................................152 5.3.Manage CIS Tasks..........................................................................................................................................155 5.4.Manage Quarantined Items.............................................................................................................................158 5.5.View CIS Logs.................................................................................................................................................163 5.5.1.Antivirus Logs.........................................................................................................................................165 5.5.1.1.Filtering Antivirus Logs...................................................................................................................167 5.5.2.VirusScope Logs....................................................................................................................................172 5.5.2.1.Filtering VirusScope Logs..............................................................................................................174 5.5.3.Firewall Logs..........................................................................................................................................179 5.5.3.1.Filtering Firewall Logs....................................................................................................................181 5.5.4.HIPS Logs..............................................................................................................................................189 5.5.4.1.Filtering HIPS Logs........................................................................................................................190 5.5.5.Containment Logs..................................................................................................................................194 5.5.5.1.Filtering Containment Logs............................................................................................................196
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages663 Page
-
File Size-