Comodo Help
Find the desired product help
Comodo Cloud Antivirus

Comodo Cloud Antivirus

Version 1.20

English

Print Help Download Help
Scan And Clean Your Computer > Process Infected Files
  • Introduction To Comodo Cloud Antivirus
    • System Requirements
    • Installation
    • Start Comodo Cloud Antivirus
      • The Main Interface
      • The Widget
      • The System Tray Icon
    • Lucky You Statistics
    • Understand CCAV Alerts
  • Scan And Clean Your Computer
    • Run A Quick Scan
    • Run A Full Computer Scan
    • Run A Certificate Scan
    • Run A Custom Scan
      • Scan A Folder
      • Scan A File
    • Process Infected Files
    • Manage Detected Threats
    • View Valkyrie Analysis Results
  • The Sandbox
    • Run An Application Or Browser In The Sandbox
    • Manage Sandboxed Items
      • Review Files
  • View CCAV Logs
    • Antivirus Logs
    • Executed Application Logs (Sandbox Logs)
    • Setting Changes Logs
    • Scan Actions Logs
  • View And Manage Quarantined Items
  • CCAV Settings
    • General Settings
      • Customize User Interface
      • Configure Program Updates
    • Antivirus Settings
      • Antivirus Settings
      • Exclusions
    • Sandbox Settings
      • Sandbox Settings
      • Sandbox Rules
      • Protected Files/Folders
      • Track Files Created In The Sandbox
    • File Rating Settings
      • File Rating Settings
      • Trusted Applications
      • Submitted Applications
      • Trusted Vendors
    • Advanced Protection Settings
      • Browser Settings Protection
      • Miscellaneous Protection Settings
  • Get Live Support
  • Viruscope - Feature Spotlight
  • Comodo Internet Security Essentials
    • Understand Alerts And Configure Exceptions
  • Comodo Support And About Information
  • Appendix 1 - How To Tutorials
    • Enable / Disable AV, Sandbox And Game Mode
    • Run An Antivirus Scan On Selected Items
    • Block Incoming / Outgoing Internet Connection To Sandboxed Applications
    • Add Exclusions By Allowing Internet Connection To Sandboxed Applications
    • Enable/ Disable Realtime Scan
    • Run A Virus Scan On Your Computer
    • Run An Application Or Browser In The Sandbox
    • Run A Certificate Scan On Your Computer
    • Configure Antivirus Exclusions
    • View Lucky You Statistics
    • Switch Off Automatic Antivirus And Software Updates
    • Enable/ Disable Browser Settings Protection
    • Evaluate The Behavior Of Unknown Files In The Sandbox
    • Detect Potentially Unwanted Applications (PUA)
    • Delete Quarantined Items
    • Restore A Quarantined Item
    • Submit As False Positive
    • Configure Proxy And Host Settings
    • Enable/ Disable Sandbox Indicator
    • Enable / Disable Viruscope
    • Track File Created In The Sandbox
    • Respond To Alerts
    • View CCAV Logs
    • Get Instant Support
    • Uninstall CCAV
    • Add Exclusions To Contained Folders And Files
    • Give Contained Applications Write Access To Local Folders
    • Quickly Create An Execution Rule For A Program
  • About Comodo Security Solutions

Process Infected Files

 

The scan results screen lists all detected threats and allows you to take appropriate actions. You can quarantine the file, ignore the alert, trust the file or report it as a false positive.

  • You can choose an action to be taken on all threats from the 'Action' drop-down at top right:



… or choose an action to be applied to individual items from the drop-down beside each item:




The available actions are:

  • Quarantine – The files will be moved to quarantine. See 'View and Manage Quarantined Items' for more details on the quarantine feature.
  • Ignore – If you want to ignore the threat the threat this time only, select 'Ignore'. The file will be ignored only at that time and if the same application invokes again, the AV scanner will report it as a threat.
  • Add to trusted applications - If you trust the file, select 'Add to trusted applications'. The file will be assigned 'Trusted' status in the 'Trusted Applications'. The alert will not generated if the same application invokes again.
  • Submit as False Positive - If you are sure that the file is safe, select 'Submit False Positive'. The file will be sent to Comodo for analysis. If the file is trustworthy it will be added to the Comodo safe list.
  • Add to Exclusions - The file will be moved to an 'Exclusions' list maintained by CCAV and will not be scanned in future. The alert will not generated if the same application invokes again. 
    • After selecting the action(s) to be applied, click 'Apply'. The files will be treated as per the action selected and the progress will be displayed.

    On completion the action taken against each threat will be displayed.




    If you choose to close the results window without taking any action, the threats will be added to the 'Detected Threats' list.




    The 'Detected Threats' interface allows you to take action such as 'Quarantine', 'Trust' or 'Trust and Report False Positive' later on. See 'Manage Detected Threats' for more details.

    Our Products
    • Free Antivirus
    • Free Internet Security
    • Website Malware Removal
    • Free Anti-Malware
    • Anti-Spam (Free Trial)
    • Windows Antivirus
    • Antivirus for Windows 7
    • Antivirus for Windows 8
    • Antivirus for Windows 10
    • Antivirus for MAC
    • Antivirus for Linux
    • Free Endpoint Security
    • Free ModSecurity
    • Free RMM
    • Free Website Malware Scanner
    • Free Device Manager for Android
    • Free Demo
    • Network Security
    • Endpoint Protection
    • Antivirus for Android
    • Comodo Antivirus
    • Wordpress Security
    Cheap CDN
    • Bootstrap CDN
    • Semantic UI CDN
    • Jquery CDN
    • CDN Plans
    • CDN
    • Free CDN
    Enterprise
    • Patch Management Software
    • Patch Manager
    • Service Desk
    • Website Down
    • Endpoint Protection Solutions
    • Website Security Check
    • Remote Monitoring and Management
    • Website Security
    • Device Manager
    • ITSM
    • CRM
    • MSP
    • Android Device Manager
    • MDR Services
    • Managed IT Support Services
    • Free EDR
    Free SSL Certificate
    Support Partners Terms and Conditions Privacy Policy

    © Comodo Group, Inc. 2025. All rights reserved.