Comodo Internet Security User Guide

1
www.comodo.com
Comodo Internet Security
Comodo Security Solutions Inc. 525 Washington Bvld, Jersey City, NJ 07310 United States
www.comodo.com
Version 4.1
User Guide
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Table of Contents
1 Introduction to Comodo Internet Security.........................6
1.1 Special Features........................................................................................................................................... 10
1.2 System Requirements.................................................................................................................................. 13
1.3 Installation.................................................................................................................................................... 14
1.3.1 Installation Process................................................................................................................................. 14
1.3.2 Upgrading to CIS Plus or Pro.................................................................................................................. 25
1.3.3 CIS Complete – Installation and Activation ............................................................................................. 37
1.4 Starting Comodo Internet Security................................................................................................................ 58
1.4.1 Comodo Internet Security Tray Icon........................................................................................................ 58
1.4.2 Windows Desktop.................................................................................................................................... 58
1.4.3 Start Menu............................................................................................................................................... 58
1.5 Overview of Summary Screens.................................................................................................................... 59
1.5.1 Comodo Internet Security – Summary..................................................................................................... 59
1.5.2 Comodo Antivirus – Summary................................................................................................................. 62
1.5.3 Comodo Firewall – Summary.................................................................................................................. 65
1.6 Comodo Internet Security – Navigation .......................................................................................................67
1.7 Understanding Alerts.................................................................................................................................... 68
2 Antivirus Tasks Overview..................................................86
2.1 Common Tasks............................................................................................................................................. 86
2.1.1 Run a Scan.............................................................................................................................................. 87
2.1.2 Update Virus Database............................................................................................................................ 98
2.1.3 Quarantined Items................................................................................................................................... 99
2.1.4 View Antivirus Events............................................................................................................................ 101
2.1.5 Submit Files to Comodo for Analysis..................................................................................................... 114
2.1.6 Scheduled Scans................................................................................................................................... 116
2.1.7 Scan Profiles.......................................................................................................................................... 119
2.1.8 Scanner Settings................................................................................................................................... 124
2
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
2.1.8.1 Real Time Scanning ...................................................................................................................... 125
2.1.8.2 Manual Scanning............................................................................................................................ 127
2.1.8.3 Scheduled Scanning ...................................................................................................................... 129
2.1.8.4 Exclusions...................................................................................................................................... 131
3 Firewall Tasks Overview..................................................133
3.1 Common Tasks........................................................................................................................................... 135
3.1.1 View Firewall Events.............................................................................................................................. 136
3.1.2 Define a New Trusted Application.......................................................................................................... 146
3.1.3 Define a New Blocked Application......................................................................................................... 147
3.1.4 Stealth Ports Wizard.............................................................................................................................. 148
3.1.5 View Active Connection......................................................................................................................... 152
3.1.6 My Blocked Network Zones................................................................................................................... 154
3.2 Advanced Tasks.......................................................................................................................................... 158
3.2.1 Network Security Policy......................................................................................................................... 158
3.2.1.1 General Navigation......................................................................................................................... 160
3.2.1.2 Application Rules............................................................................................................................ 160
3.2.1.3 Global Rules................................................................................................................................... 172
3.2.1.4 My Network Zones.......................................................................................................................... 174
3.2.1.5 My Port Sets................................................................................................................................... 178
3.2.2 Predefined Firewall Policies................................................................................................................... 181
3.2.3 Firewall Behavior Settings..................................................................................................................... 183
3.2.3.1 General Settings............................................................................................................................. 184
3.2.3.2 Alert Settings.................................................................................................................................. 186
3.2.3.3 Advanced Settings.......................................................................................................................... 188
4 Defense+ Tasks Overview...............................................190
4.1 Common Tasks........................................................................................................................................... 193
4.1.1 View Defense+ Events.......................................................................................................................... 194
4.1.2 My Protected Files................................................................................................................................. 202
4.1.3 My Blocked Files................................................................................................................................... 205
4.1.4 My Pending Files................................................................................................................................... 207
3
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
4.1.5 My Own Safe Files................................................................................................................................ 210
4.1.6 View Active Process List........................................................................................................................ 211
4.1.7 My Trusted Software Vendors................................................................................................................ 212
4.1.8 My Protected Registry Keys.................................................................................................................. 218
4.1.9 My Protected COM Interfaces...............................................................................................................221
4.2 The Sandbox.............................................................................................................................................. 223
4.2.1 The Sandboxing Process....................................................................................................................... 224
4.2.2 Add a Program to the Sandbox.............................................................................................................. 226
4.2.3 Sandbox Settings.................................................................................................................................. 230
4.2.3.1 General Settings............................................................................................................................. 230
4.2.3.2 Alert Settings.................................................................................................................................. 233
4.2.4 Run Programs in the Sandbox............................................................................................................... 234
4.3 Advanced Tasks.......................................................................................................................................... 236
4.3.1 Computer Security Policy ..................................................................................................................... 237
4.3.2 Predefined Security Policies.................................................................................................................. 243
4.3.3 Image Execution Control Settings.........................................................................................................245
4.3.3.1 General Settings ............................................................................................................................ 245
4.3.3.2 Files to Check Settings................................................................................................................... 246
4.3.4 Defense+ Settings................................................................................................................................. 247
4.3.4.1 General Settings............................................................................................................................. 248
4.3.4.2 Monitor Settings.............................................................................................................................. 251
5 More... Options.................................................................254
5.1 Settings....................................................................................................................................................... 255
5.1.1 General Settings.................................................................................................................................... 256
5.1.2 Language Settings................................................................................................................................. 257
5.1.3 Parental Control Settings....................................................................................................................... 257
5.1.4 Themes.................................................................................................................................................. 259
5.1.5 Logging Settings.................................................................................................................................... 259
5.1.6 Connection Settings.............................................................................................................................. 260
5.1.7 Update Settings..................................................................................................................................... 261
4
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
5.1.8 Threatcast Settings................................................................................................................................ 261
5.2 Manage My Configuration .......................................................................................................................... 262
5.2.1 Importing/Exporting and Managing Personal Configurations.................................................................264
5.3 Diagnostics................................................................................................................................................. 269
5.4 Check for Updates...................................................................................................................................... 270
5.5 Browse Support Forums............................................................................................................................. 272
5.6 Help ........................................................................................................................................................... 273
5.7 About.......................................................................................................................................................... 273
6 Live PC Support...............................................................275
6.1 Overview of the Services............................................................................................................................ 275
6.2 Live PC Support - 30 Day Free Trial........................................................................................................... 276
6.3 Launching The Client And Requesting The Service....................................................................................278
6.4 Uninstalling Live PC Support Client............................................................................................................ 280
7 TrustConnect Overview...................................................281
7.1 Microsoft Windows – Configuration and Connection .................................................................................282
7.2 Mac OS X – Configuration and Connection ...............................................................................................287
7.3 Linux / Open VPN – Configuration and Connection ................................................................................... 287
7.4 Apple iPhone / iPod Touch / iPad – Configuration and Connection.............................................................289
7.5 TrustConnect FAQ...................................................................................................................................... 291
8 Comodo Hopsurf..............................................................301
Appendix 1 Comodo Secure DNS Service.........................311
Router – Manually Enabling or Disabling Comodo Secure DNS Service...........................................................312
Windows XP – Manually Enabling or Disabling Comodo Secure DNS Service.................................................313
Windows Vista – Manually Enabling or Disabling Comodo Secure DNS Service..............................................319
About Comodo.....................................................................327
5
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
1 Introduction to Comodo Internet
Security
Overview
Comodo Internet Security offers 360° protection against internal and external threats by combining a powerful Antivirus protection, an enterprise class packet filtering firewall, and an advanced host intrusion prevention system called Defense+.
CIS version 4 sees a major leap forward in security and usability with the addition of the new sandbox feature - an isolated operating environment for unknown applications. Under default settings, unknown applications are now automatically sandboxed so that they cannot make permanent changes to other processes, programs or data on your 'real' system. CIS is also available in Plus, Pro and Complete editions, each offering a range of additional services to the core protection offered by the free version. These include services such us LivePCSupport (Comodo support experts available 24/7 to fix any problem with your computer); TrustConnect (secure Internet proxy service that ensures 128 bit encrypted connectivity from any public wireless hotspot); Online Backup (2GB of online storage space) and the Comodo Guarantee (if your computer becomes damaged as a result of malware and Comodo support services cannot return it to a working condition then we’ll pay the costs of getting it repaired. See terms and conditions for full details. Available to USA residents only).
When used individually, each product delivers superior protection against its specific threat challenge. When used together as a full suite they provide a complete 'prevention, detection and cure' security system for your computer.
6
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Comodo Internet Security Features:
Antivirus - The proactive antivirus system that automatically detects and eliminates viruses, Worms and
Trojan horses.
Firewall - The Firewall that constantly defends your system from inbound and outbound internet attacks
with a highly effective packet filtering firewall.
Defense+ - A rules based intrusion prevention system that protects your critical operating system files from
malicious processes, internal attacks and blocks unknown malware before it ever gets a chance to install.
Defense+ now features automated sandboxing of unknown applications. The sandbox ensures untrusted
(but harmless) applications are allowed freedom to operate whilst untrusted (and genuinely malicious)
applications are prevented from accessing or infecting your computer.
Live PC Support – Tier 1 (Pro version only) - a 24 x 7 support in which Comodo experts remotely access your computer when you need it, for:
Virus Diagnosis/ Removal;
PC Tune-up;
Internet Login Protection;
Email Account Setup;
Software Installation;
Printer Setup/ Troubleshooting;
Optimizing your computer's power settings;
Computer Troubleshooting.
7
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Live PC Support - Tier 1 + Tier 2 (Pro and Complete versions only) - a 24 x 7 online support service in which Comodo experts remotely access your computer when you need it, for:
Virus Diagnosis/ Removal PC Tune-up; Internet Login Protection; Email Account Setup; Software Installation; Printer Setup/ Troubleshooting; Optimizing your computer's power settings; Computer Troubleshooting.
Secure Wireless Internet Connectivity (Plus, Pro and Complete versions only) - TrustConnect makes
surfing the web safe from any public Wi-Fi location (10 GB per month)
Comodo Guarantee (Pro and Complete versions only) - If your computer becomes damaged as a result
of malware and Comodo support services cannot return it to a working condition then we’ll pay the costs of getting it repaired. See terms and conditions for full details. Available to USA residents only.
Online BackUp (Complete version only) - Back-up your important data to Comodo's highly secure
servers. Data is encrypted and can accessed only by the user from any Internet connected computer in the world (2 GB storage space).
Comodo Internet Security can be used ‘out of the box’ - so even the most inexperienced users need not have to deal with complex configuration issues after installation.
Comodo Internet Security alerts you whenever potential malware attempts to attack or gain access to your system. The alerts are displayed as pop-ups at the right hand corner of your screen and allow you to allow or block the unrecognized activities, processes and connection attempts of running applications (CIS now even protects against 'drive-by-download' buffer overflow attacks.) Apart from expert advice in the form of 'Security Considerations', each alert now also features the innovative ThreatCast feature to help users arrive at an informed decision on how to react to the alert. The ThreatCast system allows users to share their responses among the community of millions of CIS users worldwide. Whenever an alert appears, it contains a report of how other users have responded to the same alert. The report provides an additional guidance to even inexperienced users on making a decision to respond to the alert.
Guide Structure
This introduction is intended to provide an overview of the basics of Comodo Internet Security and should be of interest to all users.
Introduction
Special Features
System Requirements
Installing Comodo Internet Security
Starting Comodo Internet Security
General Navigation
Understanding Alerts
The next four sections of the guide cover every aspect of the configuration of Comodo Internet Security. The final
8
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
two sections contain configuration and technical help for the Live PC Support and TrustConnect.
Antivirus Task Center
Run a Scan
Update a Virus Database
Quaratined Items
Viewing Antivirus Events
Submit Files to Comodo for Analysis
Scheduled Scans
Scan Profiles
Scanner Settings
Firewall Task Center
Overview of Task Interface
Common Tasks
View Firewall Events
Define a New Trusted Application
Define a New Blocked Application
Stealth Ports Wizard
View Active Connections
My Blocked Network Zones
Advanced
Network Security Policy
Predefined Firewall Policies
Firewall Behavior Settings
Defense+ Task Center
Overview of Task Interface
Common Tasks
View Defense+ Events
My Protected Files
My Blocked Files
My Pending Files
My Own Safe Files
View Active Process List
My Trusted Software Vendors
My Protected Registry Keys
My Protected COM Interfaces
The Sandbox
Sandbox Overview
Add a Program to the Sandbox
Sandbox Settings
Run a Program in the Sandbox
Advanced
Computer Security Policy
9
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Predefined Security Policies
Image Execution Control Settings
Defense+ Settings
More... Options
Overview of More Options Interface
Settings
Manage My Configurations
Diagnostics
Check For Updates
Browse Support Forums
Help
About
Live PC Support
Live PC Support
TrustConnect
TrustConnect Overview
Windows Configuration
Mac OS X Configuration
Linux / OpenVPN Configuration
Apple iPhone / iPod Touch / iPad Configuration
TrustConnect FAQ
Comodo HopSurf
Overview of Comodo HopSurf
Accessing HopSurf Home Page
Signing-up to HopSurf
Make Quick Internet Searches
Run an Online Antivirus Scan
Uninstalling Hopsurf
Appendix 1 Comodo Secure DNS Service
Comodo Secure DNS Overview
Windows XP Manually Enabling or Disabling Comodo Secure DNS Service
Windows Vista Manually Enabling or Disabling Comodo Secure DNS Service

1.1 Special Features

Defense+ Host Intrusion Prevention System
Virtually Bulletproof protection against root-kits, inter-process memory injections, key-loggers and more;
Authenticates the integrity of every program before allowing it to load into your computer's memory;
Alerts you every time an unknown or untrusted applications attempts to run or install;
Blocks Viruses, Trojans and Spy-ware before they can ever get onto your system;
Prevents unauthorized modification of critical operating system files and registry entries;
10
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Includes new Sandbox feature to completely isolate untrusted files from the rest of your computer
Advanced Network Firewall Engine
The Firewall component of Comodo Internet Security offers the highest levels of perimeter security against inbound and outbound threats - meaning you get the strongest possible protection against hackers, malware and identity thieves. Now we've improved it again by adding new features like,
Stealth Mode to make your PC completely invisible to opportunistic port scans;
Wizard based auto-detection of trusted zones;
Predefined Firewall policies allow you to quickly implement security rules;
Diagnostics to analyze your system for potential conflicts with the firewall and much more.
Comprehensive Antivirus Protection
Detects and eliminates viruses from desktops, laptops and network workstations;
Employs heuristic techniques to identify previously unknown viruses and Trojans;
Constantly protects with real-time, On-Access scanning;
Highly configurable On-Demand scanner allows you to run instant checks on any file, folder or drive;
Seamless integration into the Windows operating system allows scanning specific objects ‘on the fly’;
Daily, automatic updates of virus definitions;
Isolates suspicious files in quarantine preventing further infection;
Built in scheduler allows you to run scans at a time that suits you;
Simple to use - install it and forget it - Comodo AV protects you in the background.
Intuitive Graphical User Interface
Summary screen gives an at-a-glance snapshot of your security settings;
Easy and quick navigation between each module of the firewall;
Simple point and click configuration - no steep learning curves;
New completely redesigned security rules interface - you can quickly set granular access rights and
privileges on a global or per application. The firewall also contains preset policies and wizards that help simplify the rule setting process.
Live PC Support (Plus, Pro and Complete versions only )
Comodo Internet Security Plus, Pro and Complete customers receive LivePCSupport - the easiest and most comprehensive way of getting your computer problems fixed. The support services are delivered by a Comodo security expert accessing your computer through a remote desktop. The services include:
Virus Diagnosis/ Removal
PC Tune-up
Internet Login Protection
11
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Email Account Setup
Software Installation
Printer Setup/ Troubleshooting
Green PC
Computer Troubleshooting
Please visit http://livepcsupport.com for full product details. Please visit http://personalfirewall.comodo.com to sign up for a Plus or Pro package.
Comodo TrustConnect (Plus, Pro and Complete versions only )
Included with a Plus, Pro or Complete subscription, Comodo TrustConnect is a fast, secure internet proxy service that makes surfing the web safe -
At Coffee shops, Hotels and Airports;
At any other public Wi-Fi location;
At your home location;
For Enterprises with remote workers and road-warriors that need secure access to internal networks
Comodo Internet Security - Extended Features
Highly Configurable Security Rules Interface
Comodo Internet Security offers more control over security settings than ever before. Users can quickly set granular Internet access rights and privileges on a global or per application basis using the flexible and easy to understand GUI. This version also sees the introduction of preset security policies which allow you to deploy a sophisticated hierarchy of firewall rules with a couple of mouse clicks.
Application Behavior Analysis
Comodo Internet Security features an advanced protocol driver level protection - essential for the defense of your PC against Trojans that run their own protocol drivers.
Event logging
Comodo Internet Security features a vastly improved log management module - allowing users to export records of Antivirus, Firewall and Defense+ activities according to several user-defined filters. Beginners and advanced users alike are greatly benefited from this essential troubleshooting feature.
Threatcast Functionality
Comodo Internet Security provides a report on how the others among millions if its users have reacted to each of its pop-up alerts generated during different circumstances. This provides guidance to make a decision on allowing or blocking an activity that has generated the alert. Comodo Internet Security has a savvy and technically knowledgeable user base. Therefore, the responses of our intelligent user base are help to guide the novice users who do not know how to react. Once signed up, your responses are also uploaded to the servers to guide others.
Memory Firewall Integration
Comodo Internet Security includes the buffer-overflow protection of Comodo Memory Firewall. On the attempt of a buffer overflow attack, CIS raises a pop-up alert. This provides protection against data theft, computer crashes and
12
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
system damage, which are possible consequences of a buffer overflow attack.
'Training Mode' and 'Clean PC' Mode
These modes enable the firewall and host intrusion prevention systems to automatically create 'allow' rules for new components of applications you have decided to trust, so you won't receive pointless alerts for those programs you trust. The firewall learns how they work and only warn you when it detects truly suspicious behavior.
Application Recognition Database (Extensive and proprietary application safe list)
The Firewall includes an extensive white-list of safe executables called the 'Comodo Safe-List Database'. This database checks the integrity of every executable and the Firewall alerts you of potentially damaging applications before they are installed. This level of protection is new because traditionally firewalls only detect harmful applications from a blacklist of known malware - often-missing new forms of malware as might be launched in day zero attacks.
The Firewall is continually updated and currently over 1,000,000 applications are in Comodo Safe list, representing virtually one of the largest safe lists within the security industry.
Self Protection against Critical Process Termination
Viruses and Trojans often try to disable your computer's security applications so that they can operate without detection. CIS protects its own registry entries, system files and processes so malware can never shut it down or sabotage the installation.
Sandboxing as a security feature
Comodo Internet Security's new sandbox is an isolated operating environment for unknown and untrusted applications. Running an application in the sandbox means that it cannot make permanent changes to other processes, programs or data on your 'real' system. Comodo have integrated sandboxing technology directly into the security architecture of CIS to complement and strengthen the Firewall, Defense+ and Antivirus modules.
Submit Suspicious Files to Comodo
Are you the first victim of a brand new type of spyware? Users can help combat zero-hour threats by using the built in submit feature to send files to Comodo for analysis. Comodo then analyzes the files for any potential threats and update our database for all users.

1.2 System Requirements

To ensure optimal performance of Comodo Internet Security, please ensure that your PC complies with the minimum system requirements as stated below:
Windows 7 (Both 32-bit and 64-bit versions), Windows Vista (Both 32-bit and 64-bit versions) or Windows
XP (Both 32-bit and 64-bit versions)
Internet Explorer Version 5.1 or above
128 MB available RAM
210 MB hard disk space for both 32-bit and 64-bit versions
13
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.

1.3 Installation

Before you install Comodo Internet Security, read the installation instructions carefully and also review the system requirements. Additional services and features such as activation of your LivePCSupport account and/or Comodo Guarantee are carried out after the base installation has been completed.
Please note - the CIS software itself is identical for all customers regardless of the package type. All versions (including free) include all security features, technologies and updates. The difference between the package types lies in the availability of additional services such as LivePCSupport, TrustConnect, Online Storage and the Comodo Guarantee. Activation of additional services is carried out after the base installation has been completed.

1.3.1 Installation Process

To install, download the Comodo Internet Security setup files to your local hard drive. (setup.exe can be downloaded from http://www.personalfirewall.comodo.com)
Next, double click on the setup file to start the installation wizard and follow the process as shown below.
STEP 1: Select your installation language
Firstly, choose the installation language.
The language you choose here will determine the language you see during the rest of the installation process and in all areas of the CIS 4 interface. Use the drop down to make your selection.
STEP 2: License Agreement
To continue with the installation, you must read then accept the End User License Agreement (EULA).
14
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Click 'I Accept' to agree to the terms and continue.
STEP 3: Product Registration
Next, the wizard will activate your free lifetime license. If you wish to sign up for news about Comodo products, updates and offers then enter your email address in the space provided. This is optional. Click 'Next'.
15
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
STEP 4: Select which components you wish to install
The next step is to choose which elements you would like to download and install. Details on each product can be viewed in the right hand pane.
16
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
In order to obtain maximum protection, Comodo recommends that you uninstall any third party personal Firewall and Antivirus in your system and select both the Comodo Antivirus and Comodo Firewall options (installation of both is mandatory for Plus, Pro and Complete customers). CIS Plus, Pro and Complete customers will also need to install Comodo TrustConnect to take advantage of the service (this is optional for users of the free product). Comodo HopSurf and Comodo Time Machine are optional installations for all users.
Install COMODO Firewall - Selecting this option installs Comodo Firewall and Defense+ components. De-
select this option, if you already have third party Firewall protection activated in your computer system. Installing Comodo Firewall is a mandatory requirement if you are a Plus, Pro or Complete customer. If you choose to install the firewall BUT NOT the antivirus then you will be asked to configure the firewall security settings in Step 5
Install COMODO Antivirus - Selecting this option installs Comodo Antivirus and Defense+ components.
De-select this option, if you already have a third party virus protection activated in your computer system. Installing Comodo Antivirus is a mandatory requirement if you are a Plus, Pro or Complete customer.
Install COMODO HopSurf - Selecting this option installs the Comodo HopSurf browser toolbar to provide
fingertip access to the world's most exciting social network. This is optional for all users.
Install COMODO TrustConnect - Selecting this option installs the client for Comodo's secure proxying
service - ensuring all wireless connections from public hotspots are encrypted and secure. This is optional for free users and necessary for Pro, Plus and Complete users that wish to use the service.
The lower part of the dialog indicates the location on your hard drive that the files will be download to; the current size of the download based on the choices you have made and the amount of space you have available on the drive to which you have decided to download. The installation process will vary slightly depending on the choices you make here. Once you have made your choices, select 'Next to begin downloading the required components:
17
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Once downloaded, the installation process will automatically begin and you will be asked to choose which folder to install to. If you do not wish installation to begin immediately after downloading is complete, then check the box 'Do not install the packages after downloading.'
The default installation folder is C:\Program Files\COMODO\COMODO Internet Security.
If you do not wish to install Comodo Internet Security in the default location, click Change and select a different folder for installation. Click 'Next' to install to the desired folder.
Step 5: Firewall Configuration
If you chose not to install the antivirus component then you are provided with the opportunity to set the security level of the Firewall. This option should only be chosen when you have a third party Antivirus protection activated in your system. If this step does not apply to you then click here to skip to step 6.
18
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
The options available are;
Firewall only - This option is only recommended for experienced firewall users that have alternative Host Intrusion Prevention software installed on their systems. Selecting this option will install ONLY the packet filtering network firewall and not Defense+ (Defense+ is essential for blocking malicious software like worms and Trojans from making outgoing connection attempts). This isn't to say this option is an unwise choice (the network firewall is one of the strongest available - offering highly effective and configurable inbound and outbound protection) but it is important to realize that, on it's own, it does not offer the host intrusion protection as afforded by Defense+.
Firewall with Optimum Proactive Defense - Selecting this option will install the packet filtering Comodo Firewall with Defense+. Defense+ is installed with optimum protection settings. This also sets the default configuration for security settings to optimum level. Click here for more details on default protection level.
Firewall with Maximum Proactive Defense - This is the most complete option and offers the greatest level of security. Selecting this will install Comodo Firewall with Defense+. Defense+ settings are set to the highest protection levels. This also sets the default configuration for security settings to maximum level. Click here for more details on default protection level.
Select the option of your choice and click Next. The installation moves to Step 6.
STEP 6: Configure Comodo Threatcast
The Threatcast feature in Comodo Internet Security allows you to share your responses to CIS alerts - the decisions made on whether allowing or blocking requests or activities, among the community of millions of CIS users worldwide. The responses of every Threatcast user to this specific alert are collated - enabling you to see how others have reacted as a percentage bar chart in the alert pop-up itself. This will provide an additional guidance to you to make a decision on responding to the alert. Comodo Internet Security has an experienced and technically knowledgeable user base and the responses of our intelligent user base can help guide novice users
19
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
who may be unsure of how to react.
To join the Threatcast Community, select I would like to join Threatcast community and click Next. Otherwise, select I do NOT want to join the Threatcast community and click Next. You can change this setting even at a later time by accessing Miscellaneous > Settings > Threatcast
STEP 7: Configuring your DNS Settings
Comodo Secure DNS service replaces your existing Recursive DNS Servers and resolves all your DNS requests exclusively through Comodo's proprietary Directory Services Platform. Comodo's worldwide network of redundant DNS servers provide fast and secure Internet browsing experience without any hardware or software installation. In this step of installation of Comodo Internet Security, the DNS settings of your computer can be changed automatically to direct to our DNS servers. You can disable the service at anytime and revert to your previous settings.
20
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
To enable the Comodo Secure DNS Service, select I Would like to use Comodo Secure DNS Servers and click Next.
For more details on Comodo Secure DNS Service and to know how to enable or disable the service, refer to
Appendix 1 Comodo Secure DNS Service.
Step 8: Configuring your browser
The next step allows you to configure your browser settings, to have www.hopsurf.com as the homepage for your default browser and Ask.com as your default search provider.
21
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Step 9: Installation and restarting your computer
After completing the configuration options to your satisfaction the setup wizard will ask for confirmation before commencing the installation procedure. Click the 'Back' button to review and/or modify any of settings you have previously specified. To confirm your choices and begin the installation of Comodo Internet Security, click 'Install'.
22
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
After installation is complete, you must restart your computer for CIS to become active.
Please save any unsaved data and click 'Yes' to restart the system. If you want to restart the system at a later time, click 'No'.
Note: The installation will take effect only on the next restart of the computer.
Step 10: After restarting Your System
After restarting, if your computer is connected to a home or work network, then you are prompted to configure it at the 'New Private Network Detected!' dialog:
23
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Step 1: Even home users with a single computer have to configure a home network in order to connect to Internet. (this is usually displayed in the Step 1 text field as you network card). Most users should accept this name.
Step 2: If you wish your computer to accept connections from other PC's in this network or for printer sharing, then also check this option (e.g. a work or home network). This then becomes a trusted network. Users that only have a single home computer connecting to the Internet should avoid this setting.
Select 'Do not automatically detect new networks' If you are an experienced user that wishes to manually set-up their own trusted networks (this can be done in 'My Network Zones' and through the 'Stealth Ports Wizard')
You must click 'OK' to confirm your choice. If you click on 'Close' button, all the network connections are blocked.
The main interface screen of Comodo Internet Security.
24
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Next
CIS Plus and CIS Pro customers should activate their additional services from the summary page of the CIS interface. Click Here for more details.

1.3.2 Upgrading to CIS Plus or Pro

Comodo Internet Security Plus and Pro packages contain additional services which need to be activated after
installation has been completed. Your current activation status can be viewed in the 'Subscription Information' box
on the CIS 'Summary' screen:
25
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Activating your subscription will enable LivePCSupport, TrustConnect and Online Storage. Pro customers will
subsequently need to activate their guarantee.
Comodo Internet Security Plus includes:
LivePCSupport - Tier 1 (Virus Diagnosis and Removal Service. Includes scanning and removal of virus
and spyware from your computer for an unlimited number of incidents. LivePCSupport is carried out by Comodo security experts through remote desktop connection. For more details refer to Live PC support)
TrustConnect - (Encrypted Internet Proxy Service. Trustconnect makes surfing the web safe from any
public Wi-Fi location)
Comodo Internet Security Pro includes all of the above plus the following:
LivePCSupport - Tier 2 (General PC Troubleshooting, PC Tune Up and Optimization, Internet Login
Protection, Email Account Setup, Software Installation, Printer Setup/Troubleshooting)
Comodo Guarantee - (If your computer becomes damaged as a result of malware and Comodo support
services cannot return it to a working condition then we’ll pay the costs of getting it repaired. The guarantee can only be activated if your computer meets certain prerequisites that qualify it as an eligible computer. This means that it is currently free of malware, that certain Comodo applications are installed and that certain CIS settings are enabled. These prerequisites are tested for and enabled by a wizard during the guarantee activation process. See 'Activating the Guarantee' for more details)
Activating Your Plus or Pro Subscription
Step 1: To activate your subscription, click the 'Not Active' link next to 'Subscription Status' in the 'Subscription
Information' box:
26
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Step 2: The next stage is to select whether you wish to activate an account or sign up for an account:
I have a valid license Key and I would like to use it. Select this option if you have already signed up for
either a Plus or Pro package. After signing up, you will have received a license key via email. Please have this key ready as you will need it next to validate your subscription.
I do not have a license key or my license key is expired. Select this option If you have not yet
subscribed and wish to do so. See 'Signing up for CIS Plus or CIS Pro' for more details.
Step 3: Enter your CIS Plus or CIS Pro license key:
27
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Copy and paste your license key into the fields provided. Your license key is located in the confirmation
email that you received after signing up for a CIS Plus or CIS Pro account.
After entering a valid subscription code you will see the message 'The license key is valid' and a green
check mark to the right of the license key fields (shown above). If your key is not accepted then please double check that you copied and pasted the entire key correctly. If you are a valid license holder and your key is still not accepted then email support@comodo.com. Please include your CIS serial number as this will be required in order to identify your account.
Click 'Next' to continue the activation process. The wizard will now contact Comodo servers to validate
your key. Note - you must be connected to the Internet.
28
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Step 4: Finalizing and confirming license activation
After your license key has been validated, you will see a final confirmation screen that summarizes your license entitlements:
Click 'Finish' to complete the activation wizard and return to the main CIS interface.
Successfully activating your license will change the information displayed in the 'Subscription Status' box:
Subscription Status will now indicate how many days remain on your license.
The 'Live Support' button will turn green and become active. Click this button at any time to initiate a
support session with a LivePCSupport expert. More details about LivePCSupport and using the chat window can be found here.
CIS Pro customers can now activate the guarantee by clicking 'Get Coverage'. See 'Activating the
Guarantee' if you would like help with this.
Signing Up for CIS Plus or CIS Pro
29
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
If you have already downloaded and installed the free version of CIS and wish to upgrade to CIS Plus or
CIS Pro then:
On the summary screen of the CIS interface, click the 'Not Active' link in the 'Subscription Infomation'
box:
Select 'I do not have a license key or my license key is expired' on the first screen of the activation
wizard and click 'Next':
Clicking 'Next' will open your web browser at an online form where you can sign up for either a CIS
Plus or Pro account. The online form will also ask you to create a username and password for a Comodo account (neccesary for billing, account management and for using Comodo products such as TrustConnect and Comodo BackUp)
After you have signed up for CIS Plus or Pro and created your Comodo account you will receive a
license key via email. This key will be used by CIS to activate the additional services that come with a Plus or Pro account.
Once you have signed up and received your license key you should return to the CIS summary screen
and click 'Not Active' again. This time, when the activation wizard opens, select 'I have a valid license
30
www.comodo.com
Comodo Internet Security User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
Loading...
+ 298 hidden pages