Comodo Internet Security
                        
                        Version 12.2                        
                        English
                        
                     
                    
                 
                
             
            
                
                
            Containment - An Overview
 
 
  - Comodo
	Internet Security's container is an isolated operating environment
	for unknown and untrusted applications. Comodo
	has built automatic containment of unknown files into the
	security architecture of Comodo Internet Security, complementing and
	strengthening the Firewall, HIPS and Antivirus modules.
 
  - Applications
	in the container cannot make permanent changes to other processes,
	programs or data on your 'real' system. They are executed under a
	carefully selected set of privileges and write to a virtual file
	system and registry instead of the real system.
 
  - After
	an unknown application has been placed in the container,
	CIS also automatically queues it for submission to Comodo Cloud
	Scanners for automatic behavior analysis. 
 
  - Firstly,
	the files undergo another antivirus scan using the very latest cloud
	blacklist.
 
   
    - If
	the scan discovers the file to be malicious then it is designated as
	malware and the result is sent back to your installation of CIS. The
	local black-list will also be updated. 
 
    - If
	the scan does not detect that the file is malicious then its
	run-time behavior will be tested by Comodo's Instant Malware
	Analysis (CIMA) servers. If CIMA finds it to
	be malicious then the file is manually analyzed by Comodo
	technicians to confirm it as malware. 
 
    - If
	confirmed as malware, the executable is added to the global
	antivirus black list. The 'malware' verdict is sent back to your
	installation of CIS and the file will be quarantined.
 
 
  - This
	process delivers the perfect balance between usability and security
	for unknown files. Unknown applications can run 'normally' in the
	container but are denied any opportunity to damage your computer or
	access your data.