Comodo Help
Find the desired product help
Comodo Internet Security

Comodo Internet Security

Version 12.2

English

Print Help Download Help
Introduction To Comodo Internet Security
  • Introduction To Comodo Internet Security
    • Special Features
    • Download, Installation And Activation
    • Start Comodo Internet Security
    • The Main Interface
      • The Home Screen
      • The Tasks Interface
      • The Widget
      • The System Tray Icon
    • Understand Security Alerts
  • General Tasks – Introduction
    • Scan And Clean Your Computer
      • Run A Quick Scan
      • Run A Full Computer Scan
      • Run A Rating Scan
      • Run A Custom Scan
        • Scan A Folder
        • Scan A File
        • Create, Schedule And Run A Custom Scan
    • Secure Shopping Settings
    • Manage Virus Database And Program Updates
    • Get Live Support
    • Manage Blocked Items
    • Instantly Scan Files And Folders
    • Process Infected Files
  • Firewall Tasks - Introduction
    • Configure Internet Access Rights For Applications
    • Manage Network Connections
    • Stop All Network Activities
    • Stealth Your Computer Ports
    • View Active Internet Connections
  • Containment Tasks - Introduction
    • Run An Application In The Container
    • Reset The Container
    • Identify And Kill Unsafe Running Processes
    • View Active Process List
    • The Virtual Desktop
      • Start The Virtual Desktop
      • The Main Interface
      • Run Browsers Inside The Virtual Desktop
      • Open Files And Run Applications Inside The Virtual Desktop
      • Configure The Virtual Desktop
      • Close The Virtual Desktop
  • Advanced Tasks – Introduction
    • Create A Rescue Disk
      • Download And Burn Comodo Rescue Disk
    • Remove Deeply Hidden Malware
    • Manage CIS Tasks
    • Manage Quarantined Items
    • View CIS Logs
      • Antivirus Logs
      • VirusScope Logs
      • Firewall Logs
      • HIPS Logs
      • Containment Logs
      • Website Filtering Logs
      • Device Control Logs
      • Autorun Event Logs
      • Alerts Logs
      • CIS Tasks Logs
      • File List Changes Logs
      • Vendor List Changes Logs
      • Trusted Certificate Authority Change Logs
      • Configuration Change Logs
      • Secure Shopping Activity Logs
      • Search And Filter Logs
    • Submit Files For Analysis To Comodo
  • CIS Settings
    • General Settings
      • Customize User Interface
      • Configure Program And Virus Database Updates
      • Log Settings
      • Manage CIS Configurations
        • Comodo Preset Configurations
        • Personal Configurations
    • Antivirus Configurations
      • Real-time Scan Settings
      • Scan Profiles
    • Firewall Configuration
      • General Firewall Settings
      • Application Rules
      • Global Rules
      • Firewall Rule Sets
      • Network Zones
        • Network Zones
        • Blocked Zones
      • Port Sets
    • HIPS Configuration
      • HIPS Settings
      • Active HIPS Rules
      • HIPS Rule Sets
      • Protected Objects
        • Protected Files
        • Blocked Files
        • Protected Registry Keys
        • Protected COM Interfaces
        • Protected Data Files And Folders
      • HIPS Groups
        • Registry Groups
        • COM Groups
    • Containment Configuration
      • Containment Settings
      • Auto-Containment Rules
      • Containment - An Overview
      • Unknown Files - The Scanning Processes
    • File Rating Configuration
      • File Rating Settings
      • File Groups
      • Submitted Files
    • Advanced Protection Configuration
      • VirusScope Settings
      • Scan Exclusions
      • Device Control Settings
      • Script Analysis Settings
      • Miscellaneous Settings
      • Comodo Secure Shopping
    • Website Filtering Configuration
      • Website Filtering Rules
      • Website Categories
  • Comodo GeekBuddy
    • Download And Install GeekBuddy
    • Overview Of Services
    • Activation Of Service
    • Launch The Client And Use The Service
    • Accept Remote Desktop Requests
    • Uninstall Comodo GeekBuddy
  • TrustConnect Overview
  • Dragon Browser
  • Comodo Backup
  • Comodo Internet Security Essentials
    • What Is Comodo Internet Security Essentials
    • What Is A Man-in-the-middle Attack
    • How Does Comodo Internet Security Essentials Protect Me From A Man-in-the-middle Attack
    • What Is The Install Location Of Comodo Internet Security Essentials
    • How Do I Update CISE
    • Understand Alerts And Configure Exceptions
    • How Do I View CISE Help
    • How Do I View The Version Number And Release Notes
    • How Do I Remove Comodo Internet Security Essentials
  • Appendix 1 CIS How To... Tutorials
    • Enable / Disable AV, Firewall, Auto-Containment, VirusScope And Website Filter Easily
    • Set Up The Firewall For Maximum Security And Usability
    • Block Internet Access While Allowing Local Area Network (LAN) Access
    • Block/Allow Specific Websites To Specific Users
    • Set Up HIPS For Maximum Security And Usability
    • Create Rules To Auto-Contain Applications
    • Password Protect Your CIS Settings
    • Reset Forgotten Password (Advanced)
    • Run An Instant Antivirus Scan On Selected Items
    • Create An Antivirus Scan Schedule
    • Run Untrusted Programs In The Container
    • Run Browsers In The Container
    • Run Untrusted Programs In The Virtual Desktop
    • Run Browsers In The Virtual Desktop
    • Restore Incorrectly Blocked Items
    • Restore Incorrectly Quarantined Items
    • Submit Quarantined Items To Comodo For Analysis
    • Enable File Sharing Applications Like BitTorrent And Emule
    • Block Any Downloads Of A Specific File Type
    • Switch Between Complete CIS Suite And Individual Components (just AV Or FW)
    • Switch Off Automatic Antivirus And Software Updates
    • Suppress CIS Alerts Temporarily While Playing Games
    • Renew Or Upgrade Your License
    • Use CIS Protocol Handlers
    • Configure Secure Shopping
    • Comodo Cloud Backup
    • Give Contained Applications Write Access To Local Folders
    • Use The Comodo Uninstaller Tool
  • Appendix 2 - Comodo Secure DNS Service
    • Router - Enable Comodo Secure DNS Service
    • Windows - Enable Comodo Secure DNS
  • Appendix 3 - Glossary Of Terms
  • Appendix 4 - CIS Versions
  • About Comodo Security Solutions

Introduction to Comodo Internet Security

 

Overview

 

Comodo Internet Security offers 360° protection against internal and external threats by combining a powerful antivirus, an enterprise class packet filtering firewall, and a threat containment system which automatically runs unrecognized files in a secure, virtual environment.


The 'Secure Shopping' feature allows you to perform online banking and shopping without fear that sensitive information like credit card numbers and passwords will be tracked or stolen. The 'Virtual Desktop' allows you to open applications and websites that you are unsure of in a secure environment isolated from the rest of your computer. Built in URL filtering blocks malware websites to keep you safe online.


When used individually, each of these components delivers superior protection against their specific threat challenge. When used together as a full suite they provide a complete 'prevention, detection and cure' security system for your computer.




CIS is available in Premium, Pro and Complete editions. While the core CIS software is identical for all three versions, the Pro and Complete packages each offer a range of additional services. The software is designed to be secure 'out of the box' - so even the most inexperienced users need not have to deal with complex configuration issues after installation.


Comodo Internet Security - Key Features:

      • Antivirus - Proactive antivirus engine that automatically detects and eliminates viruses, worms and other malware. Apart from the powerful on-demand, on-access and scheduled scan types, CIS users can now drag-and-drop items onto the home screen to run an instant scan.The engine also scans any removable storage plugged-in to your computer.
          • Firewall - Highly configurable packet filtering firewall that constantly defends your system from inbound and outbound Internet attacks.
          • Containment - Authenticates every executable and process running on your computer and prevents them from taking actions that could harm your computer. Unrecognized processes and applications will be auto-contained and run under a set of restrictions so they cannot harm your computer. This gives untrusted (but harmless) applications the freedom to operate whilst untrusted (and potentially malicious) applications are prevented from damaging your PC or data.
          • Host Intrusion Protection (HIPS) - A rules-based intrusion prevention system that monitors the activities of all applications and processes on your computer. HIPS blocks the activities of malicious programs by halting any action that could cause damage to your operating system, system-memory, registry keys or personal data.
          • VirusScope - Monitors the activities of processes running on your computer and alerts you if they take actions that could potentially threaten your privacy and/or security. Using a system of behavior 'recognizers', VirusScope not only detects unauthorized actions but also allows you to completely undo them. Apart from representing another hi-tech layer of protection against malware, this also provides you with the granular power to reverse unwanted actions taken by legitimate software without blocking the software entirely.
          • Virtual Desktop - The Virtual Desktop is a sandbox operating environment inside of which you can run programs and browse the Internet without fear that those activities will damage your real computer. Featuring a virtual keyboard to thwart key-loggers, home users will find the virtual desktop is ideally suited to sensitive tasks like online banking. Advanced users will appreciate the ability to run beta-software in an environment that will not upset the stability or file structure of their production systems
          • Comodo Internet Security Essentials - Protects you from man-in-the-middle attacks during online banking and shopping sessions by verifying that sites you connect to are using a trusted SSL certificate. Click here to learn more. 
          • Secure Shopping - A security hardened virtual environment which offers complete protection for online banking and shopping. Features include process isolation, remote takeover protection, screenshot blocking, memory-scraping prevention and independent SSL certificate verification. 
          • Website Filtering - Protects you from phishing sites while surfing the 'net and allows you to create rules to prevent specific users from accessing certain websites. CIS ships with several preset lists of malicious websites which form an effective website screening and protection feature for all Internet users. Furthermore, you can easily add or import your own lists of banned URLs and can set up custom access rules for each user on your computer. 
          • Rescue Disk - Built-in wizard that allows you to burn a boot-disk which will run antivirus scans in a pre-Windows / pre-boot environment.
          • Additional Utilities - Allows you to install other, free, Comodo security products - including 'Comodo Cleaning Essentials' and 'KillSwitch'.
          • Dragon Browser - Fast and versatile internet browser based on Chromium, infused with Comodo's unparalleled level of Security.
          • GeekBuddy - 24x7 online support service in which Comodo technicians are ready to deal with any computer issues you may have over an instant messenger style interface.
          • Secure Wireless Internet Connectivity (Complete version only) - TrustConnect makes surfing the web safe from any public Wi-Fi location
          • Comodo Guarantee (Pro and Complete versions only) - If your computer becomes damaged as a result of malware and Comodo support services cannot return it to a working condition then well pay the costs of getting it repaired. Please see the End User License Agreement for full details. 
          • Cloud Backup (Complete version only) - Back-up your important data to Comodo's highly secure servers. Data is encrypted and can accessed only by the user from any Internet connected computer in the world.
           

          Guide Structure


          This introduction is intended to provide an overview of the basics of Comodo Internet Security and should be of interest to all users. 

          • Introduction
          • Special Features
          • System Requirements 
          • Download, Installation and Activation
          • Start Comodo Internet Security
          • The Main Interface
          • Understand Security Alerts 
          The remaining sections of the guide cover every aspect of the configuration of Comodo Internet Security.
          • General Tasks – Introduction
          • Scan And Clean Your Computer
          • Run A Quick Scan
          • Run A Full Computer Scan
          • Run A Rating Scan
          • Run A Custom Scan
            • Secure Shopping
            • Manage Virus Database and Program Updates
            • Get Live Support
            • Manage Blocked Items
            • Instantly Scan Files and Folders
              • Process Infected Files
                • Firewall Tasks – Introduction
                • Configure internet access rights for applications 
                  • Manage Network Connections
                  • Stop All Network Activities
                  • Stealth Your Computer Ports 
                      • View Active Internet Connections
                        • Containment Tasks – An Introduction
                        • Run An Application In the Container
                          • Reset the Container
                          • Identify and Kill Unsafe Run Processes
                            • View Active Process List
                            • The Virtual Desktop
                            • Start the Virtual Desktop
                            • The Main Interface
                            • Run Browser Inside the Virtual Desktop
                            • Open Files and Run Applications inside Virtual Desktop
                            • Configure the Virtual Desktop
                            • Close the Virtual Desktop
                              • Advanced Tasks – Introduction
                              • Create A Rescue Disk
                              • Download And Burn Comodo Rescue Disk
                              • Remove Deeply Hidden Malware
                              • Manage CIS Tasks
                              • Manage Quarantined Items
                                • View CIS Logs 
                                • Submit Files for Analysis to Comodo
                                  • CIS Settings
                                  • General Settings
                                  • Customize User Interface
                                  • Configure Program And Virus Database Updates
                                  • Log Settings
                                  • Manage CIS Configurations
                                  • Antivirus Configuration
                                  • Real-time Scanner Settings
                                  • Scan Profiles
                                  • Firewall Configuration
                                  • General Firewall Settings
                                  • Application Rules
                                  • Global Rules
                                  • Firewall Rule Sets
                                  • Network Zones
                                  • Port Sets
                                  • HIPS Configuration 
                                  • HIPS Settings
                                  • Active HIPS Rules
                                  • HIPS Rule Sets
                                  • Protected Objects
                                  • HIPS Groups
                                  • Containment Configuration
                                  • Containment Settings
                                  • Auto-Containment Rules
                                  • Containment - An Overview
                                  • Unknown Files: The Scanning Processes
                                  • File Rating Configuration
                                  • File Rating Settings
                                  • File Groups
                                  • File List
                                  • Submitted Files
                                  • Vendor List
                                  • Advanced Protection Configuration
                                  • VirusScope Settings
                                  • Script Analysis Settings
                                    • Scan Exclusions 
                                    • Miscellaneous
                                    • Secure Shopping
                                    • Website Filtering Configuration
                                    • Website Filtering Rules
                                    • Website Categories
                                    • Comodo GeekBuddy
                                    • Download And Install GeekBuddy
                                      • Overview of Services
                                      • Activation of Service
                                      • Launch the Client and Use the Service
                                      • Accept Remote Desktop Requests 
                                      • Uninstall Comodo GeekBuddy
                                      • TrustConnect Overview
                                      • Dragon Browser
                                      • Comodo Backup
                                      • Comodo Internet Security Essentials
                                      • Appendix 1 CIS How To... Tutorials
                                      • Enable / Disable AV, Firewall, Auto-Contained, VirusScope and Website Filter Easily
                                      • Set up the Firewall For Maximum Security and Usability
                                      • Block Internet Access while Allowing Local Area Network (LAN) Access
                                      • Block / Allow Specific Websites to Specific Users
                                      • Set up the HIPS for maximum security and usability
                                      • Create Rules for Auto-Contain Applications
                                      • Password Protect Your CIS Settings
                                      • Reset Forgotten Password (Advanced)
                                      • Run an Instant Antivirus Scan on Selected Items
                                      • Create an Antivirus Scan Schedule
                                      • Run Untrusted Programs In the Container
                                      • Run Browsers in the Container
                                      • Run Untrusted Programs In the Virtual Desktop
                                      • Restore Incorrectly Blocked Items 
                                      • Restore Incorrectly Quarantined Items
                                      • Submit Quarantined Items to Comodo for Analysis
                                      • Run Browsers In the Virtual Desktop
                                      • Enable File Sharing Applications like BitTorrent and Emule
                                      • Block any Downloads of a Specific File Type
                                      • Switch Between Complete CIS Suite and Individual Components (just AV or FW)
                                      • Switch Off Automatic Antivirus and Software Updates
                                        • Suppress CIS Alerts Temporarily while Playing Games
                                        • Renew or Upgrade your License
                                        • Use CIS Protocol Handlers
                                        • Configure Secure Shopping
                                        • Manage Cloud Backup
                                        • Give Contained Applications Write Access To Local Folders
                                        • Use The Comodo Uninstaller Tool
                                            • Appendix 2 - Comodo Secure DNS Service
                                            • Appendix 3 - Glossary of Terms
                                            • Appendix 4 - CIS Versions

                                            Our Products
                                            • Free Antivirus
                                            • Free Internet Security
                                            • Website Malware Removal
                                            • Free Anti-Malware
                                            • Anti-Spam (Free Trial)
                                            • Windows Antivirus
                                            • Antivirus for Windows 7
                                            • Antivirus for Windows 8
                                            • Antivirus for Windows 10
                                            • Antivirus for MAC
                                            • Antivirus for Linux
                                            • Free Endpoint Security
                                            • Free ModSecurity
                                            • Free RMM
                                            • Free Website Malware Scanner
                                            • Free Device Manager for Android
                                            • Free Demo
                                            • Network Security
                                            • Endpoint Protection
                                            • Antivirus for Android
                                            • Comodo Antivirus
                                            • Wordpress Security
                                            Cheap CDN
                                            • Bootstrap CDN
                                            • Semantic UI CDN
                                            • Jquery CDN
                                            • CDN Plans
                                            • CDN
                                            • Free CDN
                                            Enterprise
                                            • Patch Management Software
                                            • Patch Manager
                                            • Service Desk
                                            • Website Down
                                            • Endpoint Protection Solutions
                                            • Website Security Check
                                            • Remote Monitoring and Management
                                            • Website Security
                                            • Device Manager
                                            • ITSM
                                            • CRM
                                            • MSP
                                            • Android Device Manager
                                            • MDR Services
                                            • Managed IT Support Services
                                            • Free EDR
                                            Free SSL Certificate
                                            Support Partners Terms and Conditions Privacy Policy

                                            © Comodo Group, Inc. 2025. All rights reserved.