Comodo Help
Find the desired product help
Comodo Cleaning Essentials

Comodo Cleaning Essentials

Version 10.0

English

Print Help
Scanning Your System > Smart Scan
  • Introduction To Comodo Cleaning Essentials
    • System Requirements
    • Downloading Comodo Cleaning Essentials
    • Starting Comodo Cleaning Essentials
    • The Main Interface
  • Scanning Your System
    • Smart Scan
    • Full Scan
    • Custom Scan
    • Comparison Of Scan Types
  • Configuring Comodo Cleaning Essentials
  • The Tools Menu
    • Managing Quarantined Items
    • Managing Trusted Vendors
    • Importing Antivirus Database
    • Checking For Software Updates
  • Introduction To KillSwitch
    • Starting KillSwitch
      • From The Comodo Cleaning Essentials Interface
      • From The Folder Containing Comodo Cleaning Essentials Files
      • Replacing Windows Task Manager With KillSwitch
    • The Main Interface
      • The System Tray Icon
    • Viewing And Handling Processes, Applications And Services
      • Processes
        • Stopping, Starting And Handling The Processes
        • Viewing Properties Of A Process
      • Applications
        • Handling The Applications
      • Services
        • Stopping, Starting And Deleting The Services
        • Viewing The Properties Of A Service
    • Viewing And Handling Network Connections And Usage
      • Network Connections
        • Inspecting And Closing Network Connections
      • Network Utilization
    • Configure KillSwitch
    • KillSwitch Tools
      • Viewing System Information
      • Repairing Windows Settings And Features
      • Analyzing Program Usage
      • Searching For Handles Or DLLs
      • Verifying Authenticity Of Applications
      • Boot Logging And Handling Loaded Modules
      • Running Programs From Command Line Interface
      • Viewing KillSwitch Logs
      • Finding Process Of The Active Window
    • Managing Currently Logged-in Users
    • Help And About Details
  • Introduction To Autorun Analyzer
    • Starting Autorun Analyzer
      • From The Comodo Cleaning Essentials Interface
      • From The KillSwitch Interface
      • From The Folder Containing Comodo Cleaning Essentials Files
    • The Main Interface
    • Viewing And Handling Autorun Items
      • Handling Autorun Items
      • Filtering Entries Based On Categories
      • Viewing Autorun Items For Other User Accounts
    • Help And About Details
  • Help And About Details
  • Using The Command Line Interface
    • Running A Smart Scan From The Command Line Interface
    • Run A Custom Scan From The Command Line Interface
    • Running A Virus Database Update Task From The Command Line Interface
    • Viewing Help
  • About Comodo Security Solutions

Smart Scan

 

 

  • A smart scan is a targeted scan of critical areas in your system which are highly prone to infection from viruses, rootkits and other malware.
  • These include system memory, auto-run entries, hidden services, boot sectors, critical registry keys and important operating system files/folders.
  • These areas are responsible for the stability of your computer and keeping them clean is essential.
  • Your computer will be restarted during a smart scan so that Comodo Cleaning Essential can search for hidden services and drivers.
  • Hidden services/drivers are threats which are designed to be resilient to most antivirus scans. These include rootkits and advanced persistent threats.
  • These attacks run silently in the background and can enable hackers to steal your identity and confidential information like credit card details.
After a smart scan is complete, you can:
  • Clean the detected threats or move them to Quarantine and later remove them
  • Exclude an application you consider as safe from the threat list
  • Report the threat as a False Positive to Comodo
To start a Smart scan
  1. Click the 'Smart Scan' from the CCE main interface.




The application will check whether any updates are available for the virus database before commencing the scan. If available, it will first update the local virus database.

 



It is advised that you always let the application to update the database as scanning with your virus database up-to-date detects even the zero-hour threats. However, if you do not want the database update at this moment, you can skip this step by clicking 'Skip'.

 

The application will start scanning the critical areas of your system and the progress will be displayed.

 



During the course of scanning, if you want to see details on the threats detected so far, click the 'Threat(s) Found' link. A results window with the threats identified thus far will be displayed.


Overview results


On completion of scanning, the 'Scan Finished' dialog will be displayed.

 



  1. Click 'Next' to view the results.




    • If malicious executables are discovered on your system, the 'Results' window displays the list of those items (Viruses, Rootkits, Malware and so on).
       

      Tip: You can sort the scan results by alphabetical order by clicking the 'Threat Name' column header. Similarly you can sort the scan results based on the risk level by clicking the 'Risk' column header.


      The 'Results' window allows you to quarantine and later remove, ignore the threat if it is a safe file or to submit it as a false positive to Comodo if you are sure about the authenticity of the file. The default operation is 'Clean', that means CCE will clean the threat if a disinfection routine is available for it, else, will move it to quarantine.




      • To clean a  threat, click on the entry under the 'Operations' column and select 'Clean'. The file will be disinfected or moved to quarantine upon applying the operation. You can later remove the file from your system from the 'Quarantined Items' interface. See Managing Quarantined Items for more details
      • To ignore a threat if you consider the file is safe, click on the entry under the 'Operations' column and select 'Ignore'.
      • To report threat as a false-positive result, click on the entry under the 'Operations' column and select 'Report'. The file will be sent to Comodo. Experts in Comodo will analyze the file and add it to whitelist, if found safe.
      • To apply a common operation to all the entries in the list, click on the 'Operations' column header and select the required action.

      3. Click 'Apply' to apply the selected operations to the threats. The selected operations will be applied.



       

      ... and your system will restart to check whether the operations are applied correctly and start scanning your system for  hidden services and drivers.

       



      1. Save all your work in the other windows and click 'Yes' to restart your computer. If you plan to apply the operations at a later time, click 'No'. The clean operations will be executed on the next restart of the computer.

      Upon the restart, the application will scan for hidden processes and if it detects any, will clean them and display the results.

       



      Our Free Products
      • Free Antivirus
      • Free Internet Security
      • Free Website Scan
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Free Quote
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scan
      • Free Device Manager for Android
      • Free Demo
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Mobile Device Management
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • cWatch Web Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy Lead Generation by LDGLLC

      © Comodo Group, Inc. 2019. All rights reserved.