- Introduction To Comodo Internet Security
- General Tasks – Introduction
- Firewall Tasks – Introduction
- Sandbox Tasks – Introduction
- Advanced Tasks – Introduction
- Advanced Settings
- Comodo GeekBuddy
- TrustConnect Overview
- Microsoft Windows - Configuration And Connection
- Mac OS X - Configuration And Connection
- Linux / Open VPN - Configuration And Connection
- Apple IPhone / IPod Touch - Configuration And Connection
- Android Devices - Configuration And Connection
- Windows Mobile Devices - Configuration And Connection
- TrustConnect FAQ
- Comodo Dragon
- Comodo BackUp
- Appendix 1 CIS How To... Tutorials
- Enable / Disable Security Components Easily
- Set Up The Firewall For Maximum Security And Usability
- Block Internet Access While Allowing Local Area Network (LAN) Access
- Block/allow Websites Selectively To Users Of Your Computer
- Set Up The HIPS For Maximum Security And Usability
- Set Up The Behavior Blocker For Maximum Security And Usability
- Password Protect Your CIS Settings
- Reset Forgotten Password (Advanced)
- Run An Instant Antivirus Scan On Selected Items
- Create An Antivirus Scanning Schedule
- Run Untrusted Programs Inside Sandbox
- Run Browsers Inside Sandbox
- Run Untrusted Programs Inside Virtual Desktop
- Run Browsers Inside The Virtual Desktop
- Restore Incorrectly Quarantined Item(s)
- Submit Quarantined Items To Comodo For Analysis
- Enable File Sharing Applications Like BitTorrent And Emule
- Block Any Downloads Of A Specific File Type
- Disable Behavior Blocker And Auto-Sandboxing On A Per-application Basis
- Enabling Full Virtualization For Auto-Sandboxed Applications
- Switch Between Complete CIS Suite And Individual Components (just AV Or FW)
- Switch Off Automatic Antivirus And Software Updates
- Suppress CIS Alerts Temporarily While Playing Games
- Renewal Or Upgrading Your License
- How To Use CIS Protocol Handlers
- Appendix 2 - Comodo Secure DNS Service
- Appendix 3 - Glossary Of Terms
- Appendix 4 - CIS Versions
- About Comodo Security Solutions
Antivirus Settings
The Antivirus Settings category has sub-sections that allow you to configure Real Time Scans (a.k.a 'On-Access' scanning), Custom Scans, and Exclusions (a list of the files you consider safe).
Click the following links to jump to each section:
- Real Time Scan - To set the parameters for on-access scanning;
- Custom Scan - To create scan profiles and run custom scans, schedule custom scans and set the parameters for custom scans;
- Exclusions - To see the list of ignored threats and to set the parameters for Exclusions.