Comodo Help
Find the desired product help
Comodo Cloud Antivirus

Comodo Cloud Antivirus

Version 1.20

English

Print Help Download Help
CCAV Settings > Advanced Protection Settings > Browser Settings Protection
  • Introduction To Comodo Cloud Antivirus
    • System Requirements
    • Installation
    • Start Comodo Cloud Antivirus
      • The Main Interface
      • The Widget
      • The System Tray Icon
    • Lucky You Statistics
    • Understand CCAV Alerts
  • Scan And Clean Your Computer
    • Run A Quick Scan
    • Run A Full Computer Scan
    • Run A Certificate Scan
    • Run A Custom Scan
      • Scan A Folder
      • Scan A File
    • Process Infected Files
    • Manage Detected Threats
    • View Valkyrie Analysis Results
  • The Sandbox
    • Run An Application Or Browser In The Sandbox
    • Manage Sandboxed Items
      • Review Files
  • View CCAV Logs
    • Antivirus Logs
    • Executed Application Logs (Sandbox Logs)
    • Setting Changes Logs
    • Scan Actions Logs
  • View And Manage Quarantined Items
  • CCAV Settings
    • General Settings
      • Customize User Interface
      • Configure Program Updates
    • Antivirus Settings
      • Antivirus Settings
      • Exclusions
    • Sandbox Settings
      • Sandbox Settings
      • Sandbox Rules
      • Protected Files/Folders
      • Track Files Created In The Sandbox
    • File Rating Settings
      • File Rating Settings
      • Trusted Applications
      • Submitted Applications
      • Trusted Vendors
    • Advanced Protection Settings
      • Browser Settings Protection
      • Miscellaneous Protection Settings
  • Get Live Support
  • Viruscope - Feature Spotlight
  • Comodo Internet Security Essentials
    • Understand Alerts And Configure Exceptions
  • Comodo Support And About Information
  • Appendix 1 - How To Tutorials
    • Enable / Disable AV, Sandbox And Game Mode
    • Run An Antivirus Scan On Selected Items
    • Block Incoming / Outgoing Internet Connection To Sandboxed Applications
    • Add Exclusions By Allowing Internet Connection To Sandboxed Applications
    • Enable/ Disable Realtime Scan
    • Run A Virus Scan On Your Computer
    • Run An Application Or Browser In The Sandbox
    • Run A Certificate Scan On Your Computer
    • Configure Antivirus Exclusions
    • View Lucky You Statistics
    • Switch Off Automatic Antivirus And Software Updates
    • Enable/ Disable Browser Settings Protection
    • Evaluate The Behavior Of Unknown Files In The Sandbox
    • Detect Potentially Unwanted Applications (PUA)
    • Delete Quarantined Items
    • Restore A Quarantined Item
    • Submit As False Positive
    • Configure Proxy And Host Settings
    • Enable/ Disable Sandbox Indicator
    • Enable / Disable Viruscope
    • Track File Created In The Sandbox
    • Respond To Alerts
    • View CCAV Logs
    • Get Instant Support
    • Uninstall CCAV
    • Add Exclusions To Contained Folders And Files
    • Give Contained Applications Write Access To Local Folders
    • Quickly Create An Execution Rule For A Program
  • About Comodo Security Solutions

Browser Settings Protection


Browsers that are protected include IE, Comodo Dragon, Ice Dragon, Firefox and Chrome. If protection is switched on, the blocked apps will be automatically added to the list. You can also manually add individual apps and configure their browser access settings.


To open the 'Browser Settings Protection' interface

  • Click 'Settings' at the top left of the CCAV home screen to open the 'Settings' interface
  • Choose 'Browser Settings Protection' under 'Advanced Protection' on the left




    • Enable browser settings protection - Switch browser protection on or off.
    • If disabled, any protection that you have created will be disregarded
    • If the protection is switched on, the blocked apps will be automatically added to the list 

    The interface displays a list of applications added with the following details:

    • Path - The installation path of the application.
    • Permission – Indicates whether 3rd party applications are allowed to alter the browser settings or not.

    You can search for specific applications(s) from the list by clicking the search icon  in the table header and entering the name of the browser in part or full.


    Adding an application


    You can add new a application and the protection status that should be applied to it.


    To add applications to the protection list

    • Click 'Add' at the top of the 'Settings' interface to open the 'Browser Settings' dialog.




    • Choose the action to be applied from the drop-down at the top.
    The available choices are: 
    • Allowed – Browsers in the system will allow 3rd party applications to modify the settings, for example, to gather information by accessing cookies to analyze your browsing habits and so on.
    • Not Allowed – CCAV will block 3rd party applications from altering browsers' settings and provide an alert.
    • Next, specify the application for which the settings should apply. You have the following options:
    • Enter the path of the application – Type or paste the full path of the application in the field provided.
    • Browse your computer for the browser - Click the 'Browse' button and select 'Application', navigate to the application and click 'Open'
    • Select an application from running processes - Click the 'Browse' button and choose 'Running Processes' to select an application's processes which are currently running on your PC.
    • After choosing your application, click 'Apply' for your settings to take effect.
    • Repeat the process to add more applications.
    • Click 'Apply' from the 'Settings' dialog for your protection settings to take effect.

    If you feel that a safe application is blocked from modifying the browsers' settings, you can edit the settings to allow it.


    Editing browser settings

    • Select and click the 'Edit' button at the top or simply double-click on it.



    The edit dialog is same as 'Browser Settings' dialog. Refer to the explanation above for more details.

    • To remove an application from the list, select the check-box next to the application's name and click 'Remove'.

    An example of the alert for a protected browser is shown below:




    Our Products
    • Free Antivirus
    • Free Internet Security
    • Website Malware Removal
    • Free Anti-Malware
    • Anti-Spam (Free Trial)
    • Windows Antivirus
    • Antivirus for Windows 7
    • Antivirus for Windows 8
    • Antivirus for Windows 10
    • Antivirus for MAC
    • Antivirus for Linux
    • Free Endpoint Security
    • Free ModSecurity
    • Free RMM
    • Free Website Malware Scanner
    • Free Device Manager for Android
    • Free Demo
    • Network Security
    • Endpoint Protection
    • Antivirus for Android
    • Comodo Antivirus
    • Wordpress Security
    Cheap CDN
    • Bootstrap CDN
    • Semantic UI CDN
    • Jquery CDN
    • CDN Plans
    • CDN
    • Free CDN
    Enterprise
    • Patch Management Software
    • Patch Manager
    • Service Desk
    • Website Down
    • Endpoint Protection Solutions
    • Website Security Check
    • Remote Monitoring and Management
    • Website Security
    • Device Manager
    • ITSM
    • CRM
    • MSP
    • Android Device Manager
    • MDR Services
    • Managed IT Support Services
    • Free EDR
    Free SSL Certificate
    Support Partners Terms and Conditions Privacy Policy

    © Comodo Group, Inc. 2025. All rights reserved.