Comodo Help
Find the desired product help
Comodo Internet Security

Comodo Internet Security

Version 12.2

English

Print Help Download Help
Appendix 1 CIS How To... Tutorials > Configure Secure Shopping
  • Introduction To Comodo Internet Security
    • Special Features
    • Download, Installation And Activation
    • Start Comodo Internet Security
    • The Main Interface
      • The Home Screen
      • The Tasks Interface
      • The Widget
      • The System Tray Icon
    • Understand Security Alerts
  • General Tasks – Introduction
    • Scan And Clean Your Computer
      • Run A Quick Scan
      • Run A Full Computer Scan
      • Run A Rating Scan
      • Run A Custom Scan
        • Scan A Folder
        • Scan A File
        • Create, Schedule And Run A Custom Scan
    • Secure Shopping Settings
    • Manage Virus Database And Program Updates
    • Get Live Support
    • Manage Blocked Items
    • Instantly Scan Files And Folders
    • Process Infected Files
  • Firewall Tasks - Introduction
    • Configure Internet Access Rights For Applications
    • Manage Network Connections
    • Stop All Network Activities
    • Stealth Your Computer Ports
    • View Active Internet Connections
  • Containment Tasks - Introduction
    • Run An Application In The Container
    • Reset The Container
    • Identify And Kill Unsafe Running Processes
    • View Active Process List
    • The Virtual Desktop
      • Start The Virtual Desktop
      • The Main Interface
      • Run Browsers Inside The Virtual Desktop
      • Open Files And Run Applications Inside The Virtual Desktop
      • Configure The Virtual Desktop
      • Close The Virtual Desktop
  • Advanced Tasks – Introduction
    • Create A Rescue Disk
      • Download And Burn Comodo Rescue Disk
    • Remove Deeply Hidden Malware
    • Manage CIS Tasks
    • Manage Quarantined Items
    • View CIS Logs
      • Antivirus Logs
      • VirusScope Logs
      • Firewall Logs
      • HIPS Logs
      • Containment Logs
      • Website Filtering Logs
      • Device Control Logs
      • Autorun Event Logs
      • Alerts Logs
      • CIS Tasks Logs
      • File List Changes Logs
      • Vendor List Changes Logs
      • Trusted Certificate Authority Change Logs
      • Configuration Change Logs
      • Secure Shopping Activity Logs
      • Search And Filter Logs
    • Submit Files For Analysis To Comodo
  • CIS Settings
    • General Settings
      • Customize User Interface
      • Configure Program And Virus Database Updates
      • Log Settings
      • Manage CIS Configurations
        • Comodo Preset Configurations
        • Personal Configurations
    • Antivirus Configurations
      • Real-time Scan Settings
      • Scan Profiles
    • Firewall Configuration
      • General Firewall Settings
      • Application Rules
      • Global Rules
      • Firewall Rule Sets
      • Network Zones
        • Network Zones
        • Blocked Zones
      • Port Sets
    • HIPS Configuration
      • HIPS Settings
      • Active HIPS Rules
      • HIPS Rule Sets
      • Protected Objects
        • Protected Files
        • Blocked Files
        • Protected Registry Keys
        • Protected COM Interfaces
        • Protected Data Files And Folders
      • HIPS Groups
        • Registry Groups
        • COM Groups
    • Containment Configuration
      • Containment Settings
      • Auto-Containment Rules
      • Containment - An Overview
      • Unknown Files - The Scanning Processes
    • File Rating Configuration
      • File Rating Settings
      • File Groups
      • Submitted Files
    • Advanced Protection Configuration
      • VirusScope Settings
      • Scan Exclusions
      • Device Control Settings
      • Script Analysis Settings
      • Miscellaneous Settings
      • Comodo Secure Shopping
    • Website Filtering Configuration
      • Website Filtering Rules
      • Website Categories
  • Comodo GeekBuddy
    • Download And Install GeekBuddy
    • Overview Of Services
    • Activation Of Service
    • Launch The Client And Use The Service
    • Accept Remote Desktop Requests
    • Uninstall Comodo GeekBuddy
  • TrustConnect Overview
  • Dragon Browser
  • Comodo Backup
  • Comodo Internet Security Essentials
    • What Is Comodo Internet Security Essentials
    • What Is A Man-in-the-middle Attack
    • How Does Comodo Internet Security Essentials Protect Me From A Man-in-the-middle Attack
    • What Is The Install Location Of Comodo Internet Security Essentials
    • How Do I Update CISE
    • Understand Alerts And Configure Exceptions
    • How Do I View CISE Help
    • How Do I View The Version Number And Release Notes
    • How Do I Remove Comodo Internet Security Essentials
  • Appendix 1 CIS How To... Tutorials
    • Enable / Disable AV, Firewall, Auto-Containment, VirusScope And Website Filter Easily
    • Set Up The Firewall For Maximum Security And Usability
    • Block Internet Access While Allowing Local Area Network (LAN) Access
    • Block/Allow Specific Websites To Specific Users
    • Set Up HIPS For Maximum Security And Usability
    • Create Rules To Auto-Contain Applications
    • Password Protect Your CIS Settings
    • Reset Forgotten Password (Advanced)
    • Run An Instant Antivirus Scan On Selected Items
    • Create An Antivirus Scan Schedule
    • Run Untrusted Programs In The Container
    • Run Browsers In The Container
    • Run Untrusted Programs In The Virtual Desktop
    • Run Browsers In The Virtual Desktop
    • Restore Incorrectly Blocked Items
    • Restore Incorrectly Quarantined Items
    • Submit Quarantined Items To Comodo For Analysis
    • Enable File Sharing Applications Like BitTorrent And Emule
    • Block Any Downloads Of A Specific File Type
    • Switch Between Complete CIS Suite And Individual Components (just AV Or FW)
    • Switch Off Automatic Antivirus And Software Updates
    • Suppress CIS Alerts Temporarily While Playing Games
    • Renew Or Upgrade Your License
    • Use CIS Protocol Handlers
    • Configure Secure Shopping
    • Comodo Cloud Backup
    • Give Contained Applications Write Access To Local Folders
    • Use The Comodo Uninstaller Tool
  • Appendix 2 - Comodo Secure DNS Service
    • Router - Enable Comodo Secure DNS Service
    • Windows - Enable Comodo Secure DNS
  • Appendix 3 - Glossary Of Terms
  • Appendix 4 - CIS Versions
  • About Comodo Security Solutions

Configure Secure Shopping


  • Comodo Secure Shopping provides unbeatable security for online banking and shopping sessions by ensuring you connect to those websites from within a dedicated, security-hardened browsing environment.
  • You also have the option to create alerts when you visit certain sites, so you can choose whether or not to open the site in the secure environment.

In addition to websites and browsers, you can also run any 'regular' application inside Secure Shopping. This is especially valuable for applications that process sensitive data, such as:

  • Email applications like Outlook and Thunderbird
  • Accounting software like Tally and Sage
  • Password managers
  • Spreadsheet software like Excel and Open Office Calc
  • FTP and VPN clients
  • Instant messaging and chat applications
  • File sharing clients like Drop Box

Configure Secure Shopping

  • Click 'Settings' on the CIS home screen
  • Click 'Advanced Protection' > 'Secure Shopping'




Add websites for Secure Shopping Protection
    • Click the 'Add' button then type the URL of the site you want to visit securely:


       

      • Click 'OK' to add the site to the list. Repeat the process to add more sites
      • Click 'OK' in the 'Advanced Settings' interface to save your changes

      An alert is shown if you visit a site on the secure shopping list:



      • Choose how you want to proceed:
      • Visit with Secure Browser - The site opens in a browser protected by all secure shopping technologies except full process isolation. Full process isolation is replaced with partial process isolation. The browser window will have a blue border around it:


      • Visit in Secure Shopping Environment - The website opens in a security hardened, virtual environment. When inside this environment, your browser cannot be accessed or potentially attacked by other processes running on your computer. The environment also features a virtual keyboard which allows you to enter confidential information without fear of your keystrokes being tracked. See Use Comodo Secure Shopping Enviroment for more details.
      • Continue in Current Browser – Resume your browsing activities with the same browser through which the website was opened. See  ror more details on the Secure Shopping Environment.
      Use Comodo Secure Shopping Environment


      The 'Secure Shopping' environment automatically opens when you choose 'Visit in Secure Shopping Environment' in the 'Secure Shopping' alert.


      You can manually open the 'Secure Shopping' environment in the following ways:

      • CIS Home Screen - Click 'Tasks' > 'General Tasks' > 'Secure Shopping'



       

      • CIS Desktop Widget - Click the 'Secure Shopping' icon from the CIS desktop widget




      • Windows Start menu - Click Windows Start/Home > All Programs > Comodo > Comodo Secure Shopping
      • Windows Desktop icon - Double-click the 'Comodo Secure Shopping' shortcut on the desktop



      When you start the application, a welcome screen will appear which explains the benefits of secure shopping:



      • Check 'Do not show this window again' to disable the welcome screen in future.

      Shopping and Banking Activities

      • If you are visiting a pre-configured online shopping or a banking website and choose 'Visit in Secure Shopping Environment' from the alert, the environment will open automatically. The website in the browser chosen as per the Secure Shopping configuration.
      • If you are opening the 'Secure Shopping' environment manually, the environment will open with the browser chosen as per the configuration. You can enter the URL of the website in the address bar of the browser.


       

      • The tools panel at the bottom right of the screen lets you to open the virtual keyboard, temporarily switch back to your desktop, or to fully exit the secure shopping virtual environment.

      See the explanations given below for more help on the tools panel:

      • Use virtual keyboard
      • Switch to your desktop
      • Exit Secure Shopping

      Open applications inside the secure shopping Environment

      • Start the Secure Shopping environment and click the folder icon at bottom-left:

      • Browse to the application you want to run and open it




      The application will open inside the Secure Shopping environment:




      The tools panel at the bottom right of the screen allows you to open the virtual keyboard, temporarily switch back to your desktop, or to fully exit the Secure Shopping virtual environment.

       

      The Tools Panel


      The tools panel at the bottom right of the screen allows you to open the virtual keyboard, temporarily switch back to your desktop, or to fully exit the Secure Shopping virtual environment.


      Use the virtual keyboard


      The Secure Shopping environment features an on-screen virtual keyboard that helps you in entering confidential information like website user-names, passwords and credit card numbers.

      • Click the language button  at the bottom-right and select the keyboard layout you want to use.


       

      • Click the keyboard icon in the tools panel to open the on-screen virtual keyboard




      Temporarily switch to your desktop

      • Click the  button from the tools pane at the bottom right

      The Secure Shopping Desktop will be hidden. You can quickly return to it by clicking the button again.


      Close Secure Shopping

      • Click the 'X' button

      A confirmation dialog is shown.




      • Click 'Yes' to exit the Secure Shopping environment.
      Our Products
      • Free Antivirus
      • Free Internet Security
      • Website Malware Removal
      • Free Anti-Malware
      • Anti-Spam (Free Trial)
      • Windows Antivirus
      • Antivirus for Windows 7
      • Antivirus for Windows 8
      • Antivirus for Windows 10
      • Antivirus for MAC
      • Antivirus for Linux
      • Free Endpoint Security
      • Free ModSecurity
      • Free RMM
      • Free Website Malware Scanner
      • Free Device Manager for Android
      • Free Demo
      • Network Security
      • Endpoint Protection
      • Antivirus for Android
      • Comodo Antivirus
      • Wordpress Security
      Cheap CDN
      • Bootstrap CDN
      • Semantic UI CDN
      • Jquery CDN
      • CDN Plans
      • CDN
      • Free CDN
      Enterprise
      • Patch Management Software
      • Patch Manager
      • Service Desk
      • Website Down
      • Endpoint Protection Solutions
      • Website Security Check
      • Remote Monitoring and Management
      • Website Security
      • Device Manager
      • ITSM
      • CRM
      • MSP
      • Android Device Manager
      • MDR Services
      • Managed IT Support Services
      • Free EDR
      Free SSL Certificate
      Support Partners Terms and Conditions Privacy Policy

      © Comodo Group, Inc. 2025. All rights reserved.