Smart Scan in Comodo Cleaning Essentials allows you to run a quick scan on the critical areas in your system which are highly prone to infection from viruses, rootkits and other malware. Smart scan scans and cleans the system memory, autorun entries, hidden services, boot sectors and other critical areas like crucial registry keys in Windows registry, system files and system configuration. These areas are responsible for the stability of your computer and keeping them clean and sanitized is essential to keep you healthy and running.
Scanning the critical areas of your system can be executed instantly, but scanning for hidden services and drivers can be executed only after a system restart.
Hidden services are executed by malicious attempts like a spyware through key logger, rootkits, buffer overflow or Denial of Service (DoS) attacks. These attacks will be running silently in the computer and enable hackers to steal your identity and confidential information like your credit card details.
Hence, on completion of a Smart scan, CCE will require a system restart to scan for hidden services.
On completion of scanning, you can:
Clean the detected threats or move them to Quarantine and later remove them;
Exclude an application you consider as safe from the threat list;
Report the threat as a False Positive to Comodo.;
To start a Smart scan
Click the 'Smart Scan' from the CCE main interface.
The application will check whether any updates are available for the virus database before commencing the scan. If available, it will first update the local virus database.
It is advised that you always let the application to update the database as scanning with your virus database up-to-date detects even the zero-hour threats. However, if you do not want the database update at this moment, you can skip this step by clicking 'Skip'.
The application will start scanning the critical areas of your system and the progress will be displayed.
During the course of scanning, if you want to see details on the threats detected so far, click Threats Found link. A results window with the threats identified thus far will be displayed.
On completion of scanning, The 'Scan Finished' dialog will be displayed.
Click 'Next' to view the results.
If malicious executables are discovered on your system, the 'Results' window displays the list of those items (Viruses, Rootkits, Malware and so on).
Tip: You can sort the scan results by alphabetical order by clicking the 'Threat Name' column header. Similarly you can sort the scan results based on the risk level by clicking the 'Risk' column header.
The 'Results' window allows you to quarantine and later remove, ignore the threat if it is a safe file or to submit it as a false positive to Comodo if you are sure about the authenticity of the file. The default operation is 'Clean', that means CCE will clean the threat if a disinfection routine is available for it, else, will move it to quarantine.
To clean a threat, click on the entry under the Operations column and select 'Clean'. The file will be disinfected or moved to quarantine upon applying the operation. You can later remove the file from your system from the 'Quarantined Items' interface. Refer to Managing Quarantined Items for more details.
To ignore a threat if you consider the file is safe, click on the entry under the Operations column and select 'Ignore'.
To report threat as a false-positive result, click on the entry under the Operations column and select 'Report'. The file will be sent to Comodo. Experts in Comodo will analyze the file and add it to whitelist, if found safe.
To apply a common operation to all the entries in the list, click on the Operations column header and select the required action.
Click 'Apply' to apply the selected operations to the threats. The selected operations will be applied...
... and your system will restart to check whether the operations are applied correctly and start scanning your system for hidden services and drivers.
Save all your work in the other windows and click Yes to restart your computer. If you plan to apply the operations at a later time, click No. The clean operations will be executed on the next restart of the computer.
Upon the restart, the application will scan for hidden processes and if it detects any, will clean them and display the results.