Comodo Help
Find the desired product help
Comodo Internet Security

Comodo Internet Security

Version 12.2

English

Print Help Download Help
CIS Settings > Advanced Protection Configuration > Comodo Secure Shopping
  • Introduction To Comodo Internet Security
    • Special Features
    • Download, Installation And Activation
    • Start Comodo Internet Security
    • The Main Interface
      • The Home Screen
      • The Tasks Interface
      • The Widget
      • The System Tray Icon
    • Understand Security Alerts
  • General Tasks – Introduction
    • Scan And Clean Your Computer
      • Run A Quick Scan
      • Run A Full Computer Scan
      • Run A Rating Scan
      • Run A Custom Scan
        • Scan A Folder
        • Scan A File
        • Create, Schedule And Run A Custom Scan
    • Secure Shopping Settings
    • Manage Virus Database And Program Updates
    • Get Live Support
    • Manage Blocked Items
    • Instantly Scan Files And Folders
    • Process Infected Files
  • Firewall Tasks - Introduction
    • Configure Internet Access Rights For Applications
    • Manage Network Connections
    • Stop All Network Activities
    • Stealth Your Computer Ports
    • View Active Internet Connections
  • Containment Tasks - Introduction
    • Run An Application In The Container
    • Reset The Container
    • Identify And Kill Unsafe Running Processes
    • View Active Process List
    • The Virtual Desktop
      • Start The Virtual Desktop
      • The Main Interface
      • Run Browsers Inside The Virtual Desktop
      • Open Files And Run Applications Inside The Virtual Desktop
      • Configure The Virtual Desktop
      • Close The Virtual Desktop
  • Advanced Tasks – Introduction
    • Create A Rescue Disk
      • Download And Burn Comodo Rescue Disk
    • Remove Deeply Hidden Malware
    • Manage CIS Tasks
    • Manage Quarantined Items
    • View CIS Logs
      • Antivirus Logs
      • VirusScope Logs
      • Firewall Logs
      • HIPS Logs
      • Containment Logs
      • Website Filtering Logs
      • Device Control Logs
      • Autorun Event Logs
      • Alerts Logs
      • CIS Tasks Logs
      • File List Changes Logs
      • Vendor List Changes Logs
      • Trusted Certificate Authority Change Logs
      • Configuration Change Logs
      • Secure Shopping Activity Logs
      • Search And Filter Logs
    • Submit Files For Analysis To Comodo
  • CIS Settings
    • General Settings
      • Customize User Interface
      • Configure Program And Virus Database Updates
      • Log Settings
      • Manage CIS Configurations
        • Comodo Preset Configurations
        • Personal Configurations
    • Antivirus Configurations
      • Real-time Scan Settings
      • Scan Profiles
    • Firewall Configuration
      • General Firewall Settings
      • Application Rules
      • Global Rules
      • Firewall Rule Sets
      • Network Zones
        • Network Zones
        • Blocked Zones
      • Port Sets
    • HIPS Configuration
      • HIPS Settings
      • Active HIPS Rules
      • HIPS Rule Sets
      • Protected Objects
        • Protected Files
        • Blocked Files
        • Protected Registry Keys
        • Protected COM Interfaces
        • Protected Data Files And Folders
      • HIPS Groups
        • Registry Groups
        • COM Groups
    • Containment Configuration
      • Containment Settings
      • Auto-Containment Rules
      • Containment - An Overview
      • Unknown Files - The Scanning Processes
    • File Rating Configuration
      • File Rating Settings
      • File Groups
      • Submitted Files
    • Advanced Protection Configuration
      • VirusScope Settings
      • Scan Exclusions
      • Device Control Settings
      • Script Analysis Settings
      • Miscellaneous Settings
      • Comodo Secure Shopping
    • Website Filtering Configuration
      • Website Filtering Rules
      • Website Categories
  • Comodo GeekBuddy
    • Download And Install GeekBuddy
    • Overview Of Services
    • Activation Of Service
    • Launch The Client And Use The Service
    • Accept Remote Desktop Requests
    • Uninstall Comodo GeekBuddy
  • TrustConnect Overview
  • Dragon Browser
  • Comodo Backup
  • Comodo Internet Security Essentials
    • What Is Comodo Internet Security Essentials
    • What Is A Man-in-the-middle Attack
    • How Does Comodo Internet Security Essentials Protect Me From A Man-in-the-middle Attack
    • What Is The Install Location Of Comodo Internet Security Essentials
    • How Do I Update CISE
    • Understand Alerts And Configure Exceptions
    • How Do I View CISE Help
    • How Do I View The Version Number And Release Notes
    • How Do I Remove Comodo Internet Security Essentials
  • Appendix 1 CIS How To... Tutorials
    • Enable / Disable AV, Firewall, Auto-Containment, VirusScope And Website Filter Easily
    • Set Up The Firewall For Maximum Security And Usability
    • Block Internet Access While Allowing Local Area Network (LAN) Access
    • Block/Allow Specific Websites To Specific Users
    • Set Up HIPS For Maximum Security And Usability
    • Create Rules To Auto-Contain Applications
    • Password Protect Your CIS Settings
    • Reset Forgotten Password (Advanced)
    • Run An Instant Antivirus Scan On Selected Items
    • Create An Antivirus Scan Schedule
    • Run Untrusted Programs In The Container
    • Run Browsers In The Container
    • Run Untrusted Programs In The Virtual Desktop
    • Run Browsers In The Virtual Desktop
    • Restore Incorrectly Blocked Items
    • Restore Incorrectly Quarantined Items
    • Submit Quarantined Items To Comodo For Analysis
    • Enable File Sharing Applications Like BitTorrent And Emule
    • Block Any Downloads Of A Specific File Type
    • Switch Between Complete CIS Suite And Individual Components (just AV Or FW)
    • Switch Off Automatic Antivirus And Software Updates
    • Suppress CIS Alerts Temporarily While Playing Games
    • Renew Or Upgrade Your License
    • Use CIS Protocol Handlers
    • Configure Secure Shopping
    • Comodo Cloud Backup
    • Give Contained Applications Write Access To Local Folders
    • Use The Comodo Uninstaller Tool
  • Appendix 2 - Comodo Secure DNS Service
    • Router - Enable Comodo Secure DNS Service
    • Windows - Enable Comodo Secure DNS
  • Appendix 3 - Glossary Of Terms
  • Appendix 4 - CIS Versions
  • About Comodo Security Solutions

Comodo Secure Shopping

 

Comodo Secure Shopping provides unbeatable security for online banking and shopping sessions by ensuring you connect to those websites from within a security-hardened browsing environment. Browsers running in the secure environment are isolated from any potentially hostile processes running on your computer.

  • Hides sensitive online data from other processes running on your PC
  • Prevents key-loggers from recording your keystrokes
  • Warns you if there is a remote connection to your computer
  • Stops hackers and malware taking screenshots of your session
  • Detects fake SSL certificates to stop man-in-the-middle attacks

You can configure Secure Shopping to alert you whenever you visit  specific shopping, banking and other websites and ask you if you want to use Secure Shopping environment, open the website in a secure browser window or continue with the same browser.




In addition to websites and browsers, you can also run any 'regular' application inside Secure Shopping. This is especially valuable for applications that process sensitive data, such as:

  • Email applications like Outlook and Thunderbird
  • Accounting software like Tally and Sage
  • Password managers
  • Spreadsheet software like Excel and Open Office Calc
  • FTP and VPN clients
  • Instant messaging and chat applications
  • File sharing clients like Drop Box

Data handled by applications inside the virtual environment cannot be tracked by any other process running on your computer.


The technology behind Comodo Secure Shopping is already being used by major point-of-sale and money transfer organizations to secure sensitive customer transactions.

With Comodo Internet Security, we bring this same level of security to your home. If you need a truly secure place to work and go online, then use Comodo Secure Shopping.


The following sections explain more about:

  • Configure Secure Shopping
  • Use Secure Shopping Environment
  • Shopping and Banking Activities
  • Open applications inside Secure Shopping Environment

Configure Secure Shopping


The 'Secure Shopping' configuration screen allows you to add websites for Secure Shopping protection and to configure the general behavior of the module.


Configure Secure Shopping

  • Click 'Settings' on the CIS home screen
  • Click 'Advanced Protection' > 'Secure Shopping' on the left



Secure Shopping Settings

  • Enable Secure Shopping Protection - Activate or deactivate Secure Shopping. (Default = Enabled)
  • Set new on-screen alert timeout to - Secure Shopping displays an alert whenever you visit a website configured for Secure Shopping protection and will ask you if you want to enter secure mode. If enabled, this setting allows you to choose how long an unanswered alert can remain on the screen. If the alert is unanswered and times-out, the website will continue in the current browser. (Default = Disabled)
  • Use this browser for Secure Shopping protection - Choose the web browser to be used when in secure shopping mode. The drop-down lists all browsers installed on your computer:

Add websites for Secure Shopping protection

  • Website - URL of the protected website
  • Status - The toggle switch allows you enable or disable secure shopping protection for the website.

Add websites

  1. Click the 'Add' button' then enter the domain name of your website.




2. Click 'OK' to add the website to the list. Repeat the process to add more websites.


3. To edit the settings for a website, select the website and click 'Edit'. The Edit Website dialog will appear, similar to the Add New Website dialog. Edit the parameters as required and click 'OK'.


4. To remove a website, select it and click 'Remove'.


5. Click 'OK' in the 'Advanced Settings' interface to save your changes.


An alert is displayed whenever you visit a website added to the list of websites for secure shopping protection. as shown below:




  • You can choose how you want to proceed with the website, from the alert.
  • Visit with Secure Browser - The website will open in a browser protected by all Secure Shopping technologies except full process isolation is replaced with partial process isolation. The browser window have a blue border around it: 



    • Visit in Secure Shopping Environment - The website will be opened in a security hardened, virtual environment. When inside this environment, your browser cannot be accessed or potentially attacked by other processes running on your computer. Your session will be protected by all Secure Shopping technologies (full process isolation, key-logger protection, remote connection warnings, screenshot blocking and SSL certificate checking). See Use Comodo Secure Shopping Environment for more details on the Secure Shopping Environment.
        • Continue in Current Browser - Allows you to continue your browsing activities with the same browser through which the website was opened.

          Use Secure Shopping Environment


          The Secure Shopping environment automatically opens when you choose 'Visit in Secure Shopping Environment' in the Secure Shopping alert.

          You can manually open the Secure Shopping environment in the following ways: 
          • CIS Home Screen - Click 'Tasks' > 'General Tasks' > 'Secure Shopping'




          • CIS Desktop Widget - Click the 'Secure Shopping' icon from the CIS Desktop widget


          • From the Windows Start menu - Click Windows Start/Home > All Programs > Comodo > Comodo Secure Shopping
          • From the Windows Desktop icon - Double-click the 'Comodo Secure Shopping' shortcut on the desktop:



          When you start the application, a welcome screen will appear which explains the benefits of secure shopping:




          • Check 'Do not show this window again' to disable the welcome screen in future.

          Shopping and Banking Activities

          • If you are visiting a pre-configured online shopping or a banking website and choose 'Visit in Secure Shopping Environment' from the alert, the environment will open automatically. The website in the browser chosen as per the Secure Shopping configuration.
          • If you are opening the Secure Shopping environment manually, the environment will open with the browser chosen as per the Secure Shopping configuration. You can enter the URL of the website in the address bar of the browser.



           

          • The tools panel at the bottom right of the screen lets you to open the virtual keyboard, temporarily switch back to your desktop, or to fully exit the Secure Shopping virtual environment.

          See the explanations given below for more help on the tools panel:

          • Use Virtual Keyboard
          • Switch to your Desktop
          • Exit Secure Shopping

          Open applications inside the Secure Shopping Environment

          • Start the Secure Shopping environment and click the folder icon at bottom-left:
          • Browse to the application or file you want to run and open it.




          The application will open inside the Secure Shopping environment:

           

          The Tools Panel


          The tools panel at the bottom right of the screen allows you to open the virtual keyboard, temporarily switch back to your desktop, or to fully exit the Secure Shopping virtual environment.


          Use the virtual keyboard


          The Secure Shopping environment features an on-screen virtual keyboard that helps you in entering confidential information like website user-names, passwords and credit card numbers.

          • Click the language  button at the bottom-right and select the keyboard layout you want to use.



          •  Click the keyboard icon in the tools panel to open the on-screen virtual keyboard. 



          Temporarily switch to your desktop

          • Click the  button from the tools pane at the bottom right.

          The Secure Shopping Desktop will be hidden. You can quickly return to it by clicking the button again.


          Close the Secure Shopping Desktop

          • Click the 'X' button in the tools pane

          A confirmation is shown.




          • Click 'Yes' to exit the Secure Shopping Desktop.

          Our Products
          • Free Antivirus
          • Free Internet Security
          • Website Malware Removal
          • Free Anti-Malware
          • Anti-Spam (Free Trial)
          • Windows Antivirus
          • Antivirus for Windows 7
          • Antivirus for Windows 8
          • Antivirus for Windows 10
          • Antivirus for MAC
          • Antivirus for Linux
          • Free Endpoint Security
          • Free ModSecurity
          • Free RMM
          • Free Website Malware Scanner
          • Free Device Manager for Android
          • Free Demo
          • Network Security
          • Endpoint Protection
          • Antivirus for Android
          • Comodo Antivirus
          • Wordpress Security
          Cheap CDN
          • Bootstrap CDN
          • Semantic UI CDN
          • Jquery CDN
          • CDN Plans
          • CDN
          • Free CDN
          Enterprise
          • Patch Management Software
          • Patch Manager
          • Service Desk
          • Website Down
          • Endpoint Protection Solutions
          • Website Security Check
          • Remote Monitoring and Management
          • Website Security
          • Device Manager
          • ITSM
          • CRM
          • MSP
          • Android Device Manager
          • MDR Services
          • Managed IT Support Services
          • Free EDR
          Free SSL Certificate
          Support Partners Terms and Conditions Privacy Policy

          © Comodo Group, Inc. 2025. All rights reserved.