Comodo Help
Find the desired product help
Comodo Cloud Antivirus

Comodo Cloud Antivirus

Version 1.20

English

Print Help Download Help
CCAV Settings > File Rating Settings > Trusted Applications
  • Introduction To Comodo Cloud Antivirus
    • System Requirements
    • Installation
    • Start Comodo Cloud Antivirus
      • The Main Interface
      • The Widget
      • The System Tray Icon
    • Lucky You Statistics
    • Understand CCAV Alerts
  • Scan And Clean Your Computer
    • Run A Quick Scan
    • Run A Full Computer Scan
    • Run A Certificate Scan
    • Run A Custom Scan
      • Scan A Folder
      • Scan A File
    • Process Infected Files
    • Manage Detected Threats
    • View Valkyrie Analysis Results
  • The Sandbox
    • Run An Application Or Browser In The Sandbox
    • Manage Sandboxed Items
      • Review Files
  • View CCAV Logs
    • Antivirus Logs
    • Executed Application Logs (Sandbox Logs)
    • Setting Changes Logs
    • Scan Actions Logs
  • View And Manage Quarantined Items
  • CCAV Settings
    • General Settings
      • Customize User Interface
      • Configure Program Updates
    • Antivirus Settings
      • Antivirus Settings
      • Exclusions
    • Sandbox Settings
      • Sandbox Settings
      • Sandbox Rules
      • Protected Files/Folders
      • Track Files Created In The Sandbox
    • File Rating Settings
      • File Rating Settings
      • Trusted Applications
      • Submitted Applications
      • Trusted Vendors
    • Advanced Protection Settings
      • Browser Settings Protection
      • Miscellaneous Protection Settings
  • Get Live Support
  • Viruscope - Feature Spotlight
  • Comodo Internet Security Essentials
    • Understand Alerts And Configure Exceptions
  • Comodo Support And About Information
  • Appendix 1 - How To Tutorials
    • Enable / Disable AV, Sandbox And Game Mode
    • Run An Antivirus Scan On Selected Items
    • Block Incoming / Outgoing Internet Connection To Sandboxed Applications
    • Add Exclusions By Allowing Internet Connection To Sandboxed Applications
    • Enable/ Disable Realtime Scan
    • Run A Virus Scan On Your Computer
    • Run An Application Or Browser In The Sandbox
    • Run A Certificate Scan On Your Computer
    • Configure Antivirus Exclusions
    • View Lucky You Statistics
    • Switch Off Automatic Antivirus And Software Updates
    • Enable/ Disable Browser Settings Protection
    • Evaluate The Behavior Of Unknown Files In The Sandbox
    • Detect Potentially Unwanted Applications (PUA)
    • Delete Quarantined Items
    • Restore A Quarantined Item
    • Submit As False Positive
    • Configure Proxy And Host Settings
    • Enable/ Disable Sandbox Indicator
    • Enable / Disable Viruscope
    • Track File Created In The Sandbox
    • Respond To Alerts
    • View CCAV Logs
    • Get Instant Support
    • Uninstall CCAV
    • Add Exclusions To Contained Folders And Files
    • Give Contained Applications Write Access To Local Folders
    • Quickly Create An Execution Rule For A Program
  • About Comodo Security Solutions

Trusted Applications


Files with a 'Trusted' rating are automatically allowed to run outside the sandbox. Files are given 'trusted' status if:

  • The application is from a vendor included in the Trusted Software Vendors list;
  • The application is included in the extensive and constantly updated Comodo safelist.
  • User Rating – You can provide 'Trusted' status to your executables by adding it to the Trusted Applications list.
For files assigned 'Trusted' status by the user, CCAV generates a hash or a digest of the file using a pre-defined algorithm and saves in its database. When you open a file, a new digest is instantly created for it and compared with the database of hashes belonging to trusted files. So, even if the file name is changed later, it will retain its 'Trusted' status as the hash remains same.


By granting 'Trusted' status to executables you can reduce the amount of alerts that the sandbox generates while maintaining a high level of security. This is particularly useful for developers that are creating new applications that are unknown to the Comodo safe list.


Creating your own list of 'Trusted Files' allows you to define a personal safe list of files to complement the default Comodo safe list.


The 'Trusted Applications' interface allows you to add and manage files to 'Trusted Applications' list.


To open the 'Trusted Applications' interface

  • Click the 'Settings' icon at the top left of the CCAV home screen to open the 'Settings' interface
    • Choose 'Trusted Applications' under 'File Rating' on the left




    The interface displays a list of files added as 'Trusted Applications' with the following details:

    • Path - The installation path of the application/executable file
    • Application Name – The name of the application/executable file
    • Trusted by - Indicates who the changes were done by (User, Installer). 

    You can search for specific application(s) from the list by clicking the search icon  in the table header and entering the name of the application in part or full.


      To add an item to the Trusted Applications list

      • Click the 'Add' button at the top of the 'Trusted Applications' interface



      You can add an application by :
      • Browsing your computer - Enables you to select files on your hard drive(s) that you want to add to your list of trusted applications.
      • Selecting from running processes - Enables you to choose files from processes which are currently running on your system.

      To add an application from your computer

      • Choose 'Applications' from 'Add' drop-down
      • Navigate to the file you want to add to 'Trusted Applications' in the 'Open' dialog and click 'Open'.



      This file will now be added to the trusted applications list.
      • Repeat the process to add more items
      • Click 'Apply' to save your settings

      To add applications from Running processes

      • Choose 'Running Processes' from the 'Add' drop-down



      • Select the application from the running process you wish to add to trusted applications and click 'OK'.

      The selected applications will be added to the 'Trusted Applications' list.




      • Repeat the process to add more items
      • Click 'Apply' to save your settings

      To remove item(s) from the Trusted Applications list

      • Select items to be removed from the Trusted Applications list and click the 'Remove' button at the top
      • Click 'Apply' for your changes to take effect

      To Purge item(s) from the Trusted Applications list

      • Click 'Purge'

      CCAV will verify that all files in the list are actually installed on your computer at the paths specified. If not, the file will be removed ('purged') from the list.


      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • Managed IT Support Services
      • Free EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2025. All rights reserved.