Comodo Help
Find the desired product help
Comodo Cloud Antivirus

Comodo Cloud Antivirus

Version 1.20

English

Print Help Download Help
Introduction To Comodo Cloud Antivirus > Installation
  • Introduction To Comodo Cloud Antivirus
    • System Requirements
    • Installation
    • Start Comodo Cloud Antivirus
      • The Main Interface
      • The Widget
      • The System Tray Icon
    • Lucky You Statistics
    • Understand CCAV Alerts
  • Scan And Clean Your Computer
    • Run A Quick Scan
    • Run A Full Computer Scan
    • Run A Certificate Scan
    • Run A Custom Scan
      • Scan A Folder
      • Scan A File
    • Process Infected Files
    • Manage Detected Threats
    • View Valkyrie Analysis Results
  • The Sandbox
    • Run An Application Or Browser In The Sandbox
    • Manage Sandboxed Items
      • Review Files
  • View CCAV Logs
    • Antivirus Logs
    • Executed Application Logs (Sandbox Logs)
    • Setting Changes Logs
    • Scan Actions Logs
  • View And Manage Quarantined Items
  • CCAV Settings
    • General Settings
      • Customize User Interface
      • Configure Program Updates
    • Antivirus Settings
      • Antivirus Settings
      • Exclusions
    • Sandbox Settings
      • Sandbox Settings
      • Sandbox Rules
      • Protected Files/Folders
      • Track Files Created In The Sandbox
    • File Rating Settings
      • File Rating Settings
      • Trusted Applications
      • Submitted Applications
      • Trusted Vendors
    • Advanced Protection Settings
      • Browser Settings Protection
      • Miscellaneous Protection Settings
  • Get Live Support
  • Viruscope - Feature Spotlight
  • Comodo Internet Security Essentials
    • Understand Alerts And Configure Exceptions
  • Comodo Support And About Information
  • Appendix 1 - How To Tutorials
    • Enable / Disable AV, Sandbox And Game Mode
    • Run An Antivirus Scan On Selected Items
    • Block Incoming / Outgoing Internet Connection To Sandboxed Applications
    • Add Exclusions By Allowing Internet Connection To Sandboxed Applications
    • Enable/ Disable Realtime Scan
    • Run A Virus Scan On Your Computer
    • Run An Application Or Browser In The Sandbox
    • Run A Certificate Scan On Your Computer
    • Configure Antivirus Exclusions
    • View Lucky You Statistics
    • Switch Off Automatic Antivirus And Software Updates
    • Enable/ Disable Browser Settings Protection
    • Evaluate The Behavior Of Unknown Files In The Sandbox
    • Detect Potentially Unwanted Applications (PUA)
    • Delete Quarantined Items
    • Restore A Quarantined Item
    • Submit As False Positive
    • Configure Proxy And Host Settings
    • Enable/ Disable Sandbox Indicator
    • Enable / Disable Viruscope
    • Track File Created In The Sandbox
    • Respond To Alerts
    • View CCAV Logs
    • Get Instant Support
    • Uninstall CCAV
    • Add Exclusions To Contained Folders And Files
    • Give Contained Applications Write Access To Local Folders
    • Quickly Create An Execution Rule For A Program
  • About Comodo Security Solutions

Installation

 

Note - Before beginning installation, please ensure you have uninstalled any other antivirus products, including Comodo CIS/CES. Failure to remove other AV products could lead to conflicts which cause CCAV to function incorrectly. We advise users consult their vendor documentation for help to remove specific programs. However, the following steps should help most Windows users:

  • Click the Windows 'Start' button
  • Select 'Control Panel' > 'Programs and Features' (Win 10, Win 8, Win 7, Vista), or 'Control Panel' > 'Add or Remove Programs' (XP)
  • Select your current antivirus program(s) from the list
  • Click 'Remove/Uninstall'
  • Repeat the process until all required programs have been removed

Installation

  • Download and install Comodo Cloud Antivirus from https://antivirus.comodo.com/cloud-antivirus.php)
  • The first step is language selection:


 

  • Use the drop-down menu to select the language that you want to see in the CCAV interface
  • Click 'I agree' to begin the installation wizard. This will start the installation of CCAV and, if you do not have it installed already, Comodo Internet Security Essentials (CISE). See Comodo Internet Security Essentials to find out more about CISE.



      • The default install location is C:/Program Files(x86)/COMODO/COMODO Cloud Antivirus. Click the 'Browse...' button if you want to install to a different folder.
        • Enter your email address in the second field if you would like to subscribe for Comodo news and get offers and discounts from Comodo.

          Send anonymous program usage data


          If enabled, CCAV will send anonymous crash and usage data to Comodo. This helps us troubleshoot issues faster and better understand how our users interact with CIS, so helping us to improve the product. Your privacy is protected because all data is anonymized and sent over a secure and encrypted channel. Disable this option if you do not want to send usage details.


          Cloud Based Behavior Analysis


          If enabled, any file that is identified as unknown is submitted to Comodo Valkyrie for behavior analysis. Unknown files are subjected to a range of static and dynamic tests to determine whether they behave in a malicious manner. The results will be sent back to your computer in around 15 minutes. Comodo recommends users leave this setting enabled.


          Protection against Man-in-the-Middle attacks (MITM)


          Will also install Comodo Internet Security Essentials (CISE). CISE protects you online by verifying that the websites you visit are using SSL certificates signed by a trusted CA. This option is not shown if you already have CISE installed.

        • Click the 'Install' button to begin installation:



        • Click 'Finish'



          CCAV will automatically launch a quick scan of important areas. Areas scanned include system memory, auto-run entries, start-up items, hidden services, boot sectors and other critical areas.


           

          • Click 'Pause' to postpone the scan.
          • Click 'Continue' to restart the scan.

          The scan results show the number of files scanned and any threats found:




          See 'Process Infected Files' if you want to learn more about the actions you can take on detected malware.

          • Click 'Close' after the scan is completed.

          You will be prompted to restart the system after the scan. Please note that the application will work to its full potential only after the restart.



          • Click 'Restart Now' if you want to restart the computer immediately. Save all your work first.
          • 'Remind me in:' - Choose a more convenient time to restart your system
          • Click 'Postpone' to confirm the later restart time.



          • The welcome screen will appear after you restart. The welcome screen contains useful product information and is updated frequently.
          • Select 'Do not show this window again' if you would rather not see this screen.



              You will be offered the opportunity to set your search engine provider to Yahoo:



              Currently supported browsers are Mozilla Firefox, Google Chrome, Internet Explorer, Comodo Dragon, Comodo IceDragon and Opera.
              • Making Yahoo! your default search engine means:
              • When you enter a search item into the address bar of a supported browser, the search will be carried out by Yahoo
              • A ‘Search with Yahoo’ menu entry will be added to the right-click menu of supported browsers
              • Yahoo will be set as the default search engine in the ‘Search’ box of supported browsers
              • The instant ‘search suggestions’ that you see when you start typing a search item will be provided by Yahoo!
              • Click 'Decline' to continue using your current search engine and home page.

              The CCAV widget is displayed every time you start your computer. It contains five rows with shortcuts for different CCAV tasks:


               


              • The top row shows the current security status of your computer. Click the row to open CCAV.
              • The second row shows how many threats were detected by the antivirus, and how many apps are running in the sandbox.
              • The third row contains shortcuts for common CCAV tasks:
              • Start a scan
              • Select an application and run it in the Sandbox
              • View logs
              • View quarantine
              • The fourth row has shortcuts which launch your browsers inside the secure container. Browsers inside the container are isolated from the rest of your computer and your private data, protecting you from online threats.
              • The fifth row contains shortcuts to social networking sites like Twitter and Facebook.
              See The Widget if you need more help on this item.
              Our Products
              • Free Antivirus
              • Free Internet Security
              • Website Malware Removal
              • Free Anti-Malware
              • Anti-Spam (Free Trial)
              • Windows Antivirus
              • Antivirus for Windows 7
              • Antivirus for Windows 8
              • Antivirus for Windows 10
              • Antivirus for MAC
              • Antivirus for Linux
              • Free Endpoint Security
              • Free ModSecurity
              • Free RMM
              • Free Website Malware Scanner
              • Free Device Manager for Android
              • Free Demo
              • Network Security
              • Endpoint Protection
              • Antivirus for Android
              • Comodo Antivirus
              • Wordpress Security
              Cheap CDN
              • Bootstrap CDN
              • Semantic UI CDN
              • Jquery CDN
              • CDN Plans
              • CDN
              • Free CDN
              Enterprise
              • Patch Management Software
              • Patch Manager
              • Service Desk
              • Website Down
              • Endpoint Protection Solutions
              • Website Security Check
              • Remote Monitoring and Management
              • Website Security
              • Device Manager
              • ITSM
              • CRM
              • MSP
              • Android Device Manager
              • MDR Services
              • Managed IT Support Services
              • Free EDR
              Free SSL Certificate
              Support Partners Terms and Conditions Privacy Policy

              © Comodo Group, Inc. 2025. All rights reserved.