- Introduction To Comodo Internet Security
- General Tasks – Introduction
- Scan And Clean Your Computer
- Instantly Scan Files And Folders
- Processing Infected Files
- Manage Virus Database And Program Updates
- Manage Quarantined Items
- View CIS Logs
- Get Live Support
- View Active Internet Connections
- View Sandboxed Processes List
- Firewall Tasks – Introduction
- Sandbox Tasks – Introduction
- Advanced Tasks – Introduction
- Advanced Settings
- Comodo GeekBuddy
- TrustConnect Overview
- Chromodo Browser
- Appendix 1 CIS How To... Tutorials
- Enable / Disable AV, Firewall Auto-Sandbox And Viruscope Easily
- Set Up The Firewall For Maximum Security And Usability
- Block Internet Access While Allowing Local Area Network (LAN) Access
- Block/ Allow Websites Selectively To Users Of Your Computer
- Set Up The HIPS For Maximum Security And Usability
- Create Rules For Auto-Sandboxing Applications
- Password Protect Your CIS Settings
- Reset Forgotten Password (Advanced)
- Run An Instant Antivirus Scan On Selected Items
- Create An Antivirus Scanning Schedule
- Run Untrusted Programs In The Sandbox
- Run Browsers Inside Sandbox
- Run Untrusted Programs Inside Virtual Desktop
- Run Browsers Inside The Virtual Desktop
- Restore Incorrectly Quarantined Item(s)
- Submit Quarantined Items To Comodo For Analysis
- Enable File Sharing Applications Like BitTorrent And Emule
- Block Any Downloads Of A Specific File Type
- Disable Auto-Sandboxing On A Per-application Basis
- Switch Between Complete CIS Suite And Individual Components (just AV Or FW)
- Switch Off Automatic Antivirus And Software Updates
- Suppress CIS Alerts Temporarily While Playing Games
- Renew Or Upgrading Your License
- How To Use CIS Protocol Handlers
- Appendix 2 - Glossary Of Terms
- Appendix 3 - CIS Versions
- About Comodo Security Solutions
Antivirus Settings
The Antivirus Settings category has sub-sections that allow you to configure Real Time Scans (a.k.a 'On-Access' scanning), Custom Scans, and Exclusions (a list of the files you consider safe).
Click the following links to jump to each section:
- Real Time Scan - To set the parameters for on-access scanning;
- Custom Scan - To create scan profiles and run custom scans, schedule custom scans and set the parameters for custom scans;
- Exclusions - To see the list of ignored threats and to set the parameters for Exclusions.