Full Scan
- It is essential to regularly run a full scan of your computer to detect the latest malware or viruses.
- A full scan covers all areas of your computer, including all hard drive partitions, the registry and system memory.
- Before the scan begins, the application will restart your system in order to identify any hidden services or drivers. Save all your work before starting a full scan.
When the scan is complete, you can:
- Clean the detected threats or move them to quarantine.
- Exclude an application you consider as safe from the threat list
- Report the threat as a 'False positive' to Comodo
To start a Full scan
-
Click the 'Full Scan' from the CCE main interface.
The application will ask your permission to restart the computer to perform rootkit scanning.
- A rootkit is a type of malware that is designed to conceal the fact that the user's system has been compromised.
- Once installed, they camouflage themselves as (for example) standard operating system files, security tools and APIs.
- Rootkits are usually not detectable by normal virus scanners because of this camouflage. However, CCE features a dedicated scanner that is capable of identifying rootkits, hidden files and malicious registry keys.
-
Click 'Restart' to restart the system to perform the rootkit scanning
-
If you click 'Exit', the full scan function will not be performed
Note: The full scan will be performed only if you select Yes to restart the system to perform rootkit scanning. |
After the system restart, the application will check whether any updates are available for the virus database before commencing the scan. If available, it will first update the local virus database.
It is advised that you always let the application to update the database as scanning with your virus database up-to-date detects even the zero-hour threats. However, if you do not want the database update at this moment, you can skip this step by clicking 'Skip'.
The application will start scanning your system and the progress will be displayed.
During the course of scanning, if you want to see details on the threats detected so far, click 'Threat(s) Found' link. A results window with the threats identified thus far will be displayed.
Overview results
On completion of scanning, the 'Scan Finished' dialog will be displayed.
-
Click 'Next' to view the results.
- If malicious executables are discovered on your system, the 'Results' window displays the list of those items (Viruses, Malware and so on).
Tip: You can sort the scan results by alphabetical order by clicking the 'Threat Name' column header. Similarly you can sort the scan results based on the risk level by clicking the 'Risk' column header. |
The 'Results' window allows you to quarantine and later remove, ignore the threat if it is a safe file or to submit it as a false positive to Comodo if you are sure about the authenticity of the file. The default operation is 'Clean', that means CCE will clean the threat if a disinfection routine is available for it, else, will move it to quarantine.
- To clean a threat, click the status entry under the 'Operations' column and select 'Clean'. The file will be disinfected or moved to quarantine upon applying the operation. You can later remove the file from your system from the 'Quarantined Items' interface. See Managing Quarantined Items for more details.
- To ignore a threat if you consider the file is safe, click on the entry under the 'Operations' column and select 'Ignore'.
- To report threat as a false-positive result, click on the entry under the 'Operations' column and select 'Report'. The file will be sent to Comodo. Experts in Comodo will analyze the file and add it to whitelist, if found safe.
- To apply a common operation to all the entries in the list, click on the 'Operations' column header and select the required action.
-
Click 'Apply' to apply the selected operations to the threats. The selected operations will be applied.
... and your system will restart to check whether the operations are applied correctly and start scanning your system for hidden services and drivers.
The restart dialog window will start a count down from 30 and if you do not choose either 'Yes' or 'No' option, the system will automatically restart when the count down reaches 0.
-
Click 'Yes' to restart your computer.
-
If you plan to apply the operations at a later time, click 'No'. The clean operations will be checked and scan for hidden services will be resumed on the next restart of the computer.