Comodo Help
Find the desired product help
Comodo Cloud Antivirus

Comodo Cloud Antivirus

Version 1.20

English

Print Help Download Help
Scan And Clean Your Computer > Manage Detected Threats
  • Introduction To Comodo Cloud Antivirus
    • System Requirements
    • Installation
    • Start Comodo Cloud Antivirus
      • The Main Interface
      • The Widget
      • The System Tray Icon
    • Lucky You Statistics
    • Understand CCAV Alerts
  • Scan And Clean Your Computer
    • Run A Quick Scan
    • Run A Full Computer Scan
    • Run A Certificate Scan
    • Run A Custom Scan
      • Scan A Folder
      • Scan A File
    • Process Infected Files
    • Manage Detected Threats
    • View Valkyrie Analysis Results
  • The Sandbox
    • Run An Application Or Browser In The Sandbox
    • Manage Sandboxed Items
      • Review Files
  • View CCAV Logs
    • Antivirus Logs
    • Executed Application Logs (Sandbox Logs)
    • Setting Changes Logs
    • Scan Actions Logs
  • View And Manage Quarantined Items
  • CCAV Settings
    • General Settings
      • Customize User Interface
      • Configure Program Updates
    • Antivirus Settings
      • Antivirus Settings
      • Exclusions
    • Sandbox Settings
      • Sandbox Settings
      • Sandbox Rules
      • Protected Files/Folders
      • Track Files Created In The Sandbox
    • File Rating Settings
      • File Rating Settings
      • Trusted Applications
      • Submitted Applications
      • Trusted Vendors
    • Advanced Protection Settings
      • Browser Settings Protection
      • Miscellaneous Protection Settings
  • Get Live Support
  • Viruscope - Feature Spotlight
  • Comodo Internet Security Essentials
    • Understand Alerts And Configure Exceptions
  • Comodo Support And About Information
  • Appendix 1 - How To Tutorials
    • Enable / Disable AV, Sandbox And Game Mode
    • Run An Antivirus Scan On Selected Items
    • Block Incoming / Outgoing Internet Connection To Sandboxed Applications
    • Add Exclusions By Allowing Internet Connection To Sandboxed Applications
    • Enable/ Disable Realtime Scan
    • Run A Virus Scan On Your Computer
    • Run An Application Or Browser In The Sandbox
    • Run A Certificate Scan On Your Computer
    • Configure Antivirus Exclusions
    • View Lucky You Statistics
    • Switch Off Automatic Antivirus And Software Updates
    • Enable/ Disable Browser Settings Protection
    • Evaluate The Behavior Of Unknown Files In The Sandbox
    • Detect Potentially Unwanted Applications (PUA)
    • Delete Quarantined Items
    • Restore A Quarantined Item
    • Submit As False Positive
    • Configure Proxy And Host Settings
    • Enable/ Disable Sandbox Indicator
    • Enable / Disable Viruscope
    • Track File Created In The Sandbox
    • Respond To Alerts
    • View CCAV Logs
    • Get Instant Support
    • Uninstall CCAV
    • Add Exclusions To Contained Folders And Files
    • Give Contained Applications Write Access To Local Folders
    • Quickly Create An Execution Rule For A Program
  • About Comodo Security Solutions

Manage Detected Threats 

 

  • The 'Detected Threats' interface shows items identified as malicious, but which have yet to be processed.
  • The interface also displays the current status of each item - whether it is quarantined, removed, trusted or submitted as a false positive to Comodo.
  • You can also apply actions like move the detected threats to 'Quarantine' or 'Trusted files', or 'Submit as False Positive' to Comodo.

      To open the 'Detected Threats' interface
      • Click the number under 'Detected Threats' in the CCAV home screen.
      • Alternatively, click the 'Detected Threats' icon on the widget. 




        Column Descriptions:

        • Date/Time – The date and time at which the threat was detected
        • Virus Name – The name of the malware contained in the application detected as threat
        • Path – The location of the application in the system
        • Severity – Indicates the risk level presented by the activity or request of the detected threat
        • Status – Indicates the status of the action taken. It can be either 'Quarantined', 'Removed' and 'Trusted'
        • Action - Displays a drop-down with options for handing the item: 

        The available actions are:

        • Quarantine – Item will be moved to Quarantine and saved in an encrypted manner. You can analyze the item at a later time and:
        • Restore it to the original location if it is trustworthy or
        • Delete the item from your computer if it is a malware

        from the Quarantine interface. See View and Manage Quarantined Items for more details.

        • Trust – The item will be added to the Trusted Applications and will be excluded from the future scans. Choose this option only if the item is trustworthy.
        • Submit as False Positive - The item will be added to the Trusted Applications and will be excluded from the future scans. Also it will be submitted to Comodo for analysis. If the file is found harmless by our experts, it will be added to the global safe-list.
        • To search for a specific application, click the search icon beside the Path column header and enter the name of the application in part of full.
        • To filter items by the action to be executed on them, click the funnel icon beside the 'Action' header and select an action:




          • To move an item to quarantine, choose 'Quarantine' from the 'Action' drop-down in the item row.
          • To exclude an item from future scans, choose 'Trust' from the 'Action' drop-down in the item row
          • To submit an harmless item identified as malware by Comodo Cloud Antivirus by mistake for analysis by Comodo, choose 'Submit as False Positive' from the 'Action' drop-down in the item row
          • Click 'Apply' for your actions to take effect.

          Our Products
          • Free Antivirus
          • Free Internet Security
          • Website Malware Removal
          • Free Anti-Malware
          • Anti-Spam (Free Trial)
          • Windows Antivirus
          • Antivirus for Windows 7
          • Antivirus for Windows 8
          • Antivirus for Windows 10
          • Antivirus for MAC
          • Antivirus for Linux
          • Free Endpoint Security
          • Free ModSecurity
          • Free RMM
          • Free Website Malware Scanner
          • Free Device Manager for Android
          • Free Demo
          • Network Security
          • Endpoint Protection
          • Antivirus for Android
          • Comodo Antivirus
          • Wordpress Security
          Cheap CDN
          • Bootstrap CDN
          • Semantic UI CDN
          • Jquery CDN
          • CDN Plans
          • CDN
          • Free CDN
          Enterprise
          • Patch Management Software
          • Patch Manager
          • Service Desk
          • Website Down
          • Endpoint Protection Solutions
          • Website Security Check
          • Remote Monitoring and Management
          • Website Security
          • Device Manager
          • ITSM
          • CRM
          • MSP
          • Android Device Manager
          • MDR Services
          • Managed IT Support Services
          • Free EDR
          Free SSL Certificate
          Support Partners Terms and Conditions Privacy Policy

          © Comodo Group, Inc. 2025. All rights reserved.