Comodo Internet Security 2011 User Guide
Comodo Internet Security 2011 User Guide
com
www.comodo.com
Version 5.0
1
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Table of Contents
1 Introduction to Comodo Internet Security.........................6
1.1 Special Features........................................................................................................................................... 11
1.3 Installation.................................................................................................................................................... 14
1.3.2.1 Installing Comodo Internet Security 2011 Pro and Live PC Support.................................................27
1.3.3.1 Installing Comodo Internet Security 2011 Complete and Live PC Support.......................................38
1.3.3.2 Activating Your Online Backup and TrustConnect Services and Guarantee.....................................44
1.3.4 Activating Your CIS Pro and CIS Complete Services after Installation ...................................................72
2
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
5 More Options-Introduction..............................................277
5.1 Preferences................................................................................................................................................ 279
4
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
6 Live PC Support...............................................................296
6.1 Overview of the Services............................................................................................................................ 296
7 TrustConnect Overview...................................................301
7.1 Microsoft Windows – Configuration and Connection .................................................................................302
About Comodo.....................................................................338
5
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Comodo Internet Security 2011 offers 360° protection against internal and
external threats by combining a powerful Antivirus protection, an enterprise class
packet filtering firewall, and an advanced host intrusion prevention system called
Defense+.
CIS is also available in Premium, Pro and Complete editions, each offering a range of additional services to the
core protection offered by the free version. These include services such us LivePCSupport (Comodo support
experts available 24/7 to fix any problem with your computer); TrustConnect (secure Internet proxy service that
ensures 128 bit encrypted connectivity from any public wireless hotspot); Online Backup (10GB of online storage
space) and the Comodo Guarantee (if your computer becomes damaged as a result of malware and Comodo
support services cannot return it to a working condition then we’ll pay the costs of getting it repaired. See terms and
conditions for full details. Available to USA residents only).
New features in CIS 2011 include Cloud based antivirus scanning and behavior analysis, user-friendly application
white-listing, a new spyware scanner and improved malware cleaning, all new 'game mode', improved Defense+
application compatibility and a completely re-designed interface.
When used individually, each product delivers superior protection against its specific threat challenge. When used
together as a full suite they provide a complete 'prevention, detection and cure' security system for your computer.
6
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Firewall - The Firewall that constantly defends your system from inbound and outbound Internet attacks
with a highly effective packet filtering firewall.
• Defense+ - A rules based intrusion prevention system that protects your critical operating system files from
malicious processes, internal attacks and blocks unknown malware before it ever gets a chance to install.
Defense+ now features automated sandboxing of unknown applications. The sandbox ensures untrusted
(but harmless) applications are allowed freedom to operate whilst untrusted (and genuinely malicious)
applications are prevented from accessing or infecting your computer.
• Live PC Support (Pro and Complete versions only) - a 24 x 7 online support service in which Comodo
experts remotely access your computer when you need it, for:
7
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Software Installation;
Printer Setup/ Troubleshooting;
Optimizing your computer's power settings;
Computer Troubleshooting.
• Secure Wireless Internet Connectivity (Premium, Pro and Complete versions) - TrustConnect makes
surfing the web safe from any public Wi-Fi location (10 GB per month)
• Comodo Guarantee (Pro and Complete versions only) - If your computer becomes damaged as a result
of malware and Comodo support services cannot return it to a working condition then we’ll pay the costs of
getting it repaired. See terms and conditions for full details. Available to USA residents only.
• Online BackUp (Complete version only) - Back-up your important data to Comodo's highly secure
servers. Data is encrypted and can accessed only by the user from any Internet connected computer in the
world (10GB storage space).
Comodo Internet Security can be used ‘out of the box’ - so even the most inexperienced users need not have to
deal with complex configuration issues after installation.
Comodo Internet Security alerts you whenever potential malware attempts to attack or gain access to your system.
The alerts are displayed as pop-ups at the right hand corner of your screen and allow you to allow or block the
unrecognized activities, processes and connection attempts of running applications (CIS now even protects against
'drive-by-download' buffer overflow attacks.)
Guide Structure
This introduction is intended to provide an overview of the basics of Comodo Internet Security and should be of
interest to all users.
• Introduction
• Special Features
• System Requirements
• Installation
• General Navigation
• Understanding Alerts
The next four sections of the guide cover every aspect of the configuration of Comodo Internet Security. The final
two sections contain configuration and technical help for the Live PC Support and TrustConnect.
• Run a Scan
8
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Quaratined Items
• Scheduled Scans
• Scan Profiles
• Scanner Settings
• Manual Scanning
• Scheduled Scanning
• Exclusions
• General Navigation
• Application Rules
• Global Rules
• Predefined Policies
• Network Zones
• Blocked Zones
• Port Sets
• General Settings
• Alert Settings
• Advanced Settings
9
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Trusted Files
• Unrecognized Files
• Unrecognized Files
• Submitted Files
• Predefined Policies
• Always Sandbox
• Blocked Files
• Defense+ Settings
• General Settings
• Sandbox Settings
• Monitoring Settings
• More... Options
• Preferences
• General Settings
• Language Settings
• Themes
• Connection Settings
• Update Settings
• Manage My Configuration
• Diagnostics
10
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Help
• About
• Live PC Support
• Live PC Support
• TrustConnect
• TrustConnect Overview
• Windows Configuration
• Mac OS X Configuration
• TrustConnect FAQ
• Authenticates the integrity of every program before allowing it to load into your computer's memory;
• Alerts you every time an unknown or untrusted applications attempts to run or install;
• Blocks Viruses, Trojans and Spy-ware before they can ever get onto your system;
• Prevents unauthorized modification of critical operating system files and registry entries;
• Includes new Sandbox feature to completely isolate untrusted files from the rest of your computer
11
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Diagnostics to analyze your system for potential conflicts with the firewall and much more.
• Scans even Windows Registry and System Files for possible spyware infection and cleans them;
• Highly configurable On-Demand scanner allows you to run instant checks on any file, folder or drive;
• Seamless integration into the Windows operating system allows scanning specific objects ‘on the fly’;
• Built in scheduler allows you to run scans at a time that suits you;
• Simple to use - install it and forget it - Comodo AV protects you in the background.
• Easy and quick navigation between each module of the firewall, Antivirus and Defense+;
• New completely redesigned security rules interface - you can quickly set granular access rights and
privileges on a global or per application. The firewall also contains preset policies and wizards that help
simplify the rule setting process.
• PC Tune-up
• Software Installation
12
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Green PC
• Computer Troubleshooting
Please visit http://livepcsupport.com for full product details. Please visit http://personalfirewall.comodo.com to sign
up for CIS Pro package.
• For Enterprises with remote workers and road-warriors that need secure access to internal networks
Event logging
Comodo Internet Security features a vastly improved log management module - allowing users to export records
of Antivirus, Firewall and Defense+ activities according to several user-defined filters. Beginners and advanced
users alike are greatly benefited from this essential troubleshooting feature.
These modes enable the firewall and host intrusion prevention systems to automatically create 'allow' rules for new
13
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
components of applications you have decided to trust, so you won't receive pointless alerts for those programs you
trust. The firewall learns how they work and only warn you when it detects truly suspicious behavior.
The Firewall includes an extensive white-list of safe executables called the 'Comodo Safe-List Database'. This
database checks the integrity of every executable and the Firewall alerts you of potentially damaging applications
before they are installed. This level of protection is new because traditionally firewalls only detect harmful
applications from a blacklist of known malware - often-missing new forms of malware as might be launched in day
zero attacks.
The Firewall is continually updated and currently over 1,000,000 applications are in Comodo Safe list, representing
virtually one of the largest safe lists within the security industry.
Viruses and Trojans often try to disable your computer's security applications so that they can operate without
detection. CIS protects its own registry entries, system files and processes so malware can never shut it down or
sabotage the installation.
Comodo Internet Security's new sandbox is an isolated operating environment for unknown and untrusted
applications. Running an application in the sandbox means that it cannot make permanent changes to other
processes, programs or data on your 'real' system. Comodo have integrated sandboxing technology directly into
the security architecture of CIS to complement and strengthen the Firewall, Defense+ and Antivirus modules.
Are you the first victim of a brand new type of spyware? Users can help combat zero-hour threats by using the built
in submit feature to send files to Comodo for analysis. Comodo then analyzes the files for any potential threats and
update our database for all users.
• Windows 7 (Both 32-bit and 64-bit versions), Windows Vista (Both 32-bit and 64-bit versions) or Windows
XP (Both 32-bit and 64-bit versions)
• 210 MB hard disk space for both 32-bit and 64-bit versions
1.3 Installation
Before you install Comodo Internet Security, read the installation instructions carefully and also review the system
requirements. Additional services and features such as activation of your LivePCSupport account and/or Comodo
Guarantee are carried out after the base installation has been completed.
14
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Please note - the CIS software itself is identical for all customers regardless of the package type. All versions
(including free) include all security features, technologies and updates. The difference between the package types
lies in the availability of additional services such as LivePCSupport, TrustConnect, Online Storage and the Comodo
Guarantee. Activation of additional services is carried out after the base installation has been completed.
After downloading the Comodo Internet Security setup file to your local hard drive, double click on
The installation wizard starts automatically and the 'Select the language' dialog is displayed. Comodo Internet
Security is available in several languages.
• Select the language in which you want Comodo Internet Security to be installed from the drop-down menu
and click 'OK'.
15
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
To continue with the installation, you must read and then accept the End User License Agreement (EULA). Click 'I
accept' to continue the installation. If you want to cancel the installation at this stage, click 'Cancel'.
16
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The next step is to choose which elements you would like to install. In order to obtain maximum protection,
Comodo recommends that you uninstall any third party personal Firewall and Antivirus in your system and select
both the Comodo Antivirus and Comodo Firewall options (installation of both is mandatory for Pro and Complete
customers). CIS Pro and Complete customers will also need to install Comodo TrustConnect to take advantage of
the service (this is optional for users of the free product).
• Install COMODO Firewall - Selecting this option installs Comodo Firewall and Defense+ components.
De-select this option, if you already have third party Firewall protection activated in your computer system.
Installing Comodo Firewall is a mandatory requirement if you are a Premium, Pro or Complete customer. If
you choose to install the firewall BUT NOT the antivirus then you will be asked to configure the firewall
security settings in Step 6.
• Install COMODO Antivirus - Selecting this option installs Comodo Antivirus and Defense+ components.
De-select this option, if you already have a third party virus protection activated in your computer system.
Installing Comodo Antivirus is a mandatory requirement if you are a Premium, Pro or Complete customer.
17
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
To install the application in the default location, click 'Next'. If you want to install the application in a location other
than the default location, click 'Change' to choose a different location.
18
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Firewall only - This option is only recommended for experienced firewall users that have alternative Host
Intrusion Prevention software installed on their systems. Selecting this option will install ONLY the packet filtering
network firewall and not Defense+ (Defense+ is essential for blocking malicious software like worms and Trojans
from making outgoing connection attempts). This isn't to say this option is an unwise choice (the network firewall is
one of the strongest available - offering highly effective and configurable inbound and outbound protection) but it is
important to realize that, on it's own, it does not offer the host intrusion protection as afforded by Defense+.
Firewall with Optimum Proactive Defense - Selecting this option will install the packet filtering Comodo Firewall
with Defense+. Defense+ is installed with optimum protection settings. This also sets the default configuration for
security settings to optimum level. Click here for more details on default protection level.
Firewall with Maximum Proactive Defense - This is the most complete option and offers the greatest level of
security. Selecting this will install Comodo Firewall with Defense+. Defense+ settings are set to the highest
protection levels. This also sets the default configuration for security settings to maximum level. Click here for more
details on default protection level.
In addition, Comodo's Secure DNS ensures safety against attacks in the form of malware, spyware, phishing etc.,
19
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
In this step of installation of Comodo Internet Security, the DNS settings of your computer can be changed
automatically to direct to our DNS servers. You can disable the service at anytime and revert to your previous
settings.
For more details on Comodo Secure DNS Service and to know how to enable or disable the service, refer to
Appendix 1 Comodo Secure DNS Service.
To enable the Comodo Secure DNS Service, select I Would like to use Comodo Secure DNS Servers and click
'Next'.
20
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click the 'Back' button to review and/or modify any of settings you have previously specified. To confirm your
choices and begin the installation of Comodo Internet Security, click 'Install'.
21
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click 'Finish' .
22
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click Finish. In order for the installation to take effect, your computer needs to be restarted.
Please save any unsaved data and click 'Yes' to restart the system. If you want to restart the system at a later time,
click 'No'.
Note: The installation will take effect only on the next restart of the computer.
23
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Step 1: Even home users with a single computer have to configure a home network in order to connect to Internet.
(this is usually displayed in the Step 1 text field as you network card). Most users should accept this name.
Step 2: If you wish your computer to accept connections from other PC's in this network (e.g. a work or home
network) or for printer sharing, then check the option 'I would like to be fully accessible to the other PCs in this
network'. This then becomes a trusted network. Users that only have a single home computer connecting to the
Internet should avoid this setting.
Select 'Do not automatically detect new networks' If you are an experienced user that wishes to manually set-up
their own trusted networks (this can be done in 'Network Zones' and through the 'Stealth Ports Wizard')
You must click 'OK' to confirm your choice. If you click on 'Close' button, all the network connections are blocked.
• LivePCSupport - Computer support service carried out by Comodo security experts through remote
desktop connection. The service includes:
• Virus Diagnosis / Removal - Includes scanning and removal of virus and spyware from your
computer for an unlimited number of incidents;
• PC Tune Up - Expert evaluation of issues affecting your computer's performance. Fine Tuning key
areas and improving speed and stability;
24
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Internet Login Protection - Activating your computer's basic security settings to prevent loss of
sensitive data and identity theft;
• Email Account Set Up - Setting up your Internet-based email account - any provider, any account.
Great for new computers and novice email users;
• Software Installation - Installing your Comodo products and customizing configuration for maximum
security protection and efficiency;
• Printer Set Up and Troubleshooting - Installing or updating software and printer drivers, checking
ink levels and configuring your printer to work on a wireless or wired network;
• Green PC - Optimizing your power management setting based on how you use your computer. Go
green and save money on your electric bill;
LivePCSupport is carried out by Comodo security experts through remote desktop connection. For more details
refer to Live PC support.
• TrustConnect - (Encrypted Internet Proxy Service). Trustconnect makes surfing the web safe from any
public Wi-Fi location)
• Comodo Guarantee - (If your computer becomes damaged as a result of malware and Comodo support
services cannot return it to a working condition then we’ll pay the costs of getting it repaired. See terms and
conditions for full details). The guarantee can only be activated if your computer meets certain pre-
conditions that qualify it as an eligible computer. This means that it is currently free of malware, that certain
applications are installed and that certain CIS settings are enabled. These settings are tested for and
enabled by a wizard during the guarantee activation process. See 'Activating Your Guarantee Coverage' for
more details. The Comodo guarantee is only available to residents of the USA.
After downloading the Comodo Internet Security setup file to your local hard drive, double click on
• Select the language in which you want Comodo Internet Security to be installed from the drop-down menu
25
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Install Comodo Internet Security 2011 Pro - If you have not yet installed CIS then you should first select 'Install
Comodo Internet Security 2011 Pro'.
• Click here for more details on installing Comodo Internet Security 2011 Pro
Activate TrustConnect - Begins the activation processes for your TrustConnect account and for your Comodo
Guarantee. Please locate your License Key before starting. You should have received your License Key through
email. After entering a valid license key, you will be taken to a Comodo web-form to start the account registration
process.
Install TrustConnect - Begins the Comodo TrustConnect setup procedure. TrustConnect usage can be managed
by logging into your account at https://accounts.comodo.com.
Install Dragon Web Browser - Begins the installation of Dragon web browser. The Dragon is an user-friendly
web browser from the house of Comodo.
26
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1.3.2.1 Installing Comodo Internet Security 2011 Pro and Live PC Support
Click 'Install COMODO Internet Security 2011 Pro' from the main Comodo Internet Security 2011 Pro Installer
screen. The installation wizard for installing CIS 2011 and Live PC Support will start immediately.
To continue with the installation, you must read and then accept the End User License Agreement (EULA). Click 'I
accept' to continue the installation. If you want to cancel the installation at this stage, click 'Cancel'.
27
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Tip: You can skip this step if you don't have the subscription key handy at the time of installation. In order to
continue the installation without entering the key, press 'Next'. You can activate your subscription and guarantee
at a later time from the main interface of CIS. For more details refer to Activating your CIS Pro and CIS Complete
Services after Installation'.
28
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
On successful validation of your license key, you need to register your account with Comodo Accounts Manager.
Fill up the registration form with the necessary details. The login and password entered in this form can be used to
login into your account with Comodo Account Manager at anytime.
29
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click 'Next'.
On successful activation, you will see a final confirmation screen that summarizes your license entitlements:
30
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Copy and save your licence key in a safe place, as you will need it for installation in other machines (your license
entitiles you for installing the product and obtaining the services on upto three machines).
Important note: You need to activate your guarantee after completion of installation of CIS. Refer to Activating
Your Guarantee Coverage for more details.
31
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
On completion of installation you will be prompted to restart your computer, for the installation to take effect.
Please save any unsaved data and click 'Yes' to restart the system. If you want to restart the system at a later time,
click 'No'.
Note: The installation will take effect only on the next restart of the computer.
32
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Step 1: Even home users with a single computer have to configure a home network in order to connect to Internet.
(this is usually displayed in the Step 1 text field as you network card). Most users should accept this name.
Step 2: If you wish your computer to accept connections from other PC's in this network (e.g. a work or home
network) or for printer sharing, then check the option 'I would like to be fully accessible to the other PCs in this
network'. This then becomes a trusted network. Users that only have a single home computer connecting to the
Internet should avoid this setting.
Select 'Do not automatically detect new networks' If you are an experienced user that wishes to manually set-up
their own trusted networks (this can be done in 'Network Zones' and through the 'Stealth Ports Wizard')
You must click 'OK' to confirm your choice. If you click on 'Close' button, all the network connections are blocked.
• Click 'Activate TrustConnect' from the main Comodo Internet Security 2011 Pro Installer screen. You will
be prompted to enter the your license key in the provided space.
33
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Enter the license key sent to you by email. The license key will be validated.
After the License key is verified, the Comodo Accounts Manager page is displayed.
Enter your login ID and password for Comodo Accounts Manager (the credentials you defined when activating your
34
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click on the 'TrustConnect' tab. Your TrustConnect account details will be displayed.
• Note down the Service Login and Service Password shown in this page. These are the service credentials
you need to use for getting the TrustConnect Sevices. For more details, refer to the chapter TrustConnect
35
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Overview.
• LivePCSupport – Computer support service carried out by Comodo security experts through remote
desktop connection. The service includes:
• Virus Diagnosis / Removal - Includes scanning and removal of virus and spyware from your
computer for an unlimited number of incidents;
• PC Tune Up - Expert evaluation of issues affecting your computer's performance. Fine Tuning key
areas and improving speed and stability;
• Internet Login Protection - Activating your computer's basic security settings to prevent loss of
sensitive data and identity theft;
• Email Account Set Up - Setting up your Internet-based email account - any provider, any account.
Great for new computers and novice email users;
• Software Installation - Installing your Comodo products and customizing configuration for maximum
security protection and efficiency;
• Printer Set Up and Troubleshooting - Installing or updating software and printer drivers, checking
ink levels and configuring your printer to work on a wireless or wired network;
• Green PC - Optimizing your power management setting based on how you use your computer. Go
green and save money on your electric bill;
LivePCSupport is carried out by Comodo security experts through remote desktop connection. For more
details refer to Live PC support.
• TrustConnect - (Encrypted Internet Proxy Service). Trustconnect makes surfing the web safe from any
public Wi-Fi location.
• 10GB Online Storage Space - Comodo Backup allows users to schedule regular backups to Comodo's
highly secure servers. Data is encrypted and can accessed only by the user from any Internet connected
computer in the world
• Comodo Guarantee - (If your computer becomes damaged as a result of malware and Comodo support
services cannot return it to a working condition then we’ll pay the costs of getting it repaired. See terms and
conditions for full details). The guarantee can only be activated if your computer meets certain pre-
conditions that qualify it as an eligible computer. This means that it is currently free of malware, that certain
applications are installed and that certain CIS settings are enabled. These settings are tested for and
enabled by a wizard during the guarantee activation process. See 'Activating Your Guarantee Coverage' for
more details. The Comodo guarantee is only available to residents of the USA.
After inserting the DVD, the setup program will start automatically.
Tip: If the setup program does not start automatically, click Start > My Computer and double click on the your
DVD drive in the Windows Explorer window.
36
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Select the language in which you want Comodo Internet Security to be installed from the drop-down menu
and click 'OK'.
Install Comodo Internet Security 2011 Complete - If you have not yet installed CIS then you should first select
'Install Comodo Internet Security 2011 Complete'.
• Click here for more details on installing Comodo Internet Security 2011 Complete
Activate Online Backup and TrustConnect - Begins the activation processes for your online storage space
37
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
account, TrustConnect account and for your Comodo Guarantee. Please locate your License Key before starting
(this is either printed on the DVD itself or printed on an insert included in the box packaging). After entering a valid
license key, you will be taken to a Comodo web-form to start the account registration process.
Install Online Backup - Begins the Comodo BackUp installation procedure. Once installed, you will be able to
schedule regular backups to local and network drives. You also get 10GB of secure online backup space (access
this by entering your Comodo account username and password in the Comodo BackUp interface).
• Click here if you wish to download the Comodo BackUp User Guide
Install TrustConnect - Begins the Comodo TrustConnect setup procedure. TrustConnect usage can be managed
by logging into your account at https://accounts.comodo.com.
Install Dragon Web Browser - Begins the installation of Dragon web browser. The Dragon is an user-friendly
web browser from the house of Comodo.
1.3.3.1 Installing Comodo Internet Security 2011 Complete and Live PC Support
Click 'Install COMODO Internet Security 2011' from the main Comodo Internet Security 2011 Complete Installer
screen. The installation wizard for installing CIS 2011 and Live PC Support will start immediately.
38
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
To continue with the installation, you must read and then accept the End User License Agreement (EULA). Click 'I
accept' to continue the installation. If you want to cancel the installation at this stage, click 'Cancel'.
39
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Tip: You can skip this step if you don't have the subscription key handy at the time of installation. In order to
continue the installation without entering the key, press 'Next'. You can activate your subscription and guarantee
at a later time from the main interface of CIS. For more details refer to Activating your CIS Pro and CIS Complete
Services after Installation'.
Enter the key fully and click 'Next'. Your License key will be validated.
40
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
After your license key has been validated, a final confirmation screen will be displayed, that summarizes your
license entitlements:
41
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
42
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
On completion of installation you will be prompted to restart your computer, for the installation to take effect.
Please save any unsaved data and click 'Yes' to restart the system. If you want to restart the system at a later time,
click 'No'.
Note: The installation will take effect only on the next restart of the computer.
43
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Step 1: Even home users with a single computer have to configure a home network in order to connect to Internet.
(this is usually displayed in the Step 1 text field as you network card). Most users should accept this name.
Step 2: If you wish your computer to accept connections from other PC's in this network (e.g. a work or home
network) or for printer sharing, then check the option 'I would like to be fully accessible to the other PCs in this
network'. This then becomes a trusted network. Users that only have a single home computer connecting to the
Internet should avoid this setting.
Select 'Do not automatically detect new networks' If you are an experienced user that wishes to manually set-up
their own trusted networks (this can be done in 'Network Zones' and through the 'Stealth Ports Wizard')
You must click 'OK' to confirm your choice. If you click on 'Close' button, all the network connections are blocked.
1.3.3.2 Activating Your Online Backup and TrustConnect Services and Guarantee
In order to utilize your 10GB online storage space and TrustConnect services, you need to activate the services.
Keep the license key handy, before starting this process.
• Reinsert the DVD and click 'Activate Online Backup and TrustConnect' from the main Comodo Internet
Security 2011 Complete Installer screen. You will be prompted to enter the your license key in the provided
space.
44
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Enter the license key provided to you with the CIS product. The license key will be validated.
After the License key is verified, the Comodo Sign-Up Page is displayed.
45
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
46
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Enter the required field details and click 'Sign Up' button after selecting the 'I accept the Terms and Conditions'
checkbox. The Order Confirmation page is displayed. Click the 'Confirm' button to activate the service.
Clicking the 'Confirm' button displays the invoice generated for you. The invoice displays your details that you
entered while registering, the services you have ordered for, links for downloading the software, your license key
and other login details.
You can now login to your account at https://accounts.comodo.com, with the login details you specified during sign-
up.
47
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• For using TrustConnect services, you need the Service login and Service Password generated for you. For
more details, refer to the chapter TrustConnect Overview.
• Click the TrustConnect tab from your accounts page and note down the Service Login and Service
Password shown in this page.
• For using Online Storage Services, you can use the same login and password you specified during
Signing-up for Comodo Account. See Start Using Online Storage Space for more details.
• Reinsert the DVD and click 'Install Online Backup' from the main Comodo Internet Security 2011 Complete
Installer screen. The installation wizard of Comodo Backup will start immediately.
48
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click 'I Agree' to continue installation. If you want to cancel the installation, click 'Cancel'.
49
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If you want to install the application in a location other than the default location, click 'Browse' to choose a different
location.
• Click the 'Back' button to review / change any of settings you specified before or press 'Install' to continue
with installation process.
50
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
51
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
52
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
53
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Please save any unsaved data, leave 'Reboot now' checkbox selected and click 'Close'. If you want to restart the
system at a later time, uncheck 'Reboot now' checkbox click 'Close'.
Note: The installation will take effect only after restarting the computer.
54
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
55
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Enter your Login ID and pasword with Comodo Account Manager in the Username and Password fields
respectively and click Sign In.
After successful login, your username is displayed in the tab structure area and the disk partitions and folders of
your system are displayed as a tree structure in the left hand side pane and the folders and files in your online
storage space are displayed as a tree structure in the right hand side pane. You can drag and drop files and folders
between the two windows.
56
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
For more details on using your online storage space, refer to Comodo Backup Userguide available at
http://backup.comodo.com/comodo_backup_user_manual.pdf
• Click 'Install TrustConnect' from the main Comodo Internet Security 2011 Pro/Complete Installer screen.
The installation wizard of Comodo TrustConnect will start immediately.
57
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
58
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• If you want to cancel the installation at this stage, select I Do Not Agree.
59
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
60
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If you want to install the client in a location other than the default location, click 'Browse' to choose a different
location.
61
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click the 'Back' button to review and/or modify any of settings you have previously specified. To confirm your
choices and begin the installation of Comodo Internet Security, click 'Next'.
62
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
63
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• If you have already registered for TrustConnect sevice through Acivate Online Backup and TrustConnect,
uncheck the checkbox Register Comodo Trust Connect and click Close. The Installation will be completed.
• If you haven't registered for TrustConnect sevice through Acivate Online Backup and TrustConnect, keep
the checkbox Register Comodo Trust Connect checked and click Close. The Registration dialog will be
displayed.
Your key will be validated and a registration confirmation dialog will be diaplayed.
64
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Full details on using Comodo TrustConnect can be found in the TrustConnect section of this guide.
65
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click 'Install Dragon Web Browser' from the main Comodo Internet Security 2011 Pro/Complete Installer
screen. The installation wizard of Comodo Dragon will start immediately.
66
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Select the checkbox 'Install Comodo Dragon Internet Browser'. I agree to the above terms and click 'Next'.
67
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If you want to install the client in a location other than the default location, click 'Browse' to choose a different
location.
68
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
69
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
70
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
71
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If you want to run Comodo Dragon Browser immediately, keep the check box 'Run Comodo Dragon' checked, else
uncheck it and click 'Finish' to exit the wizard.
1.3.4 Activating Your CIS Pro and CIS Complete Services after
Installation
CIS Pro and CIS Complete enable activation of the subscription and guarantee coverage even after installation.
Ths is useful in cases where you skipped the process of validating your license during the installation process.
Click the links below for detailed explanations:
72
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
On the bottom left corner of the main interface, you will see the 'Settings' area.
• Select 'I have a valid license key and I would use it for activation your new installation' and click 'Next'.
73
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Enter your license key and click 'Next'. The wizard starts validating your license.
On successful validation, your subscription will be activated and a confirmation screen will be displayed with a
summary of your license entitlements:
74
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Copy and save your licence key in a safe place, as you will need it for installation in other machines (your license
entitiles you for installing the product and obtaining the services on upto three machines).
• Please note that if you wish to use and activate the Comodo guarantee then you must have installed
Comodo Internet Security (both Antivirus and Firewall components) and Comodo LivePCSupport. You must
also have run and passed a Comodo Antivirus scan using the latest signature database. The guarantee is
only available if you are a resident of the United States.
75
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
files. Comodo does not guarantee against the loss of any file or information. The guarantee is void if you
breached this agreement, failed to follow the procedures described in this Section 3 of the End User
License Agreement (EULA) or failed to pay any fees applicable to your use of the Software.
• Full Terms and Conditions on the Comodo Guarantee Coverage can be read in Section 3 of CIS EULA
(Step 1 of the Installation process of CIS Pro or CIS Complete).
Important Note: Before activating the guarantee, it is essential to run a full computer AV scan with the latest
version of the Comodo Virus database in order to ensure that your system is eligible for the Guarantee coverage.
Make sure that the virus database of your CIS installation has been updated to the latest one. The update status
is indicated next to 'Last Update' in the 'Virus Defence' box of the CIS main interface and with a green tick mark
and the text 'All Systems are active and running' in the lower left corner of the main interface. If your virus
database is not up-to-date, click the link next to 'Last Update' in the 'Virus Defence' box to update to the latest
version. Then run a full computer scan from the Antivirus Tasks interface of the CIS. For more details on running
an Antivirus Scan Click here.
Step 1: To activate your guarantee coverage, click 'Not Activated' beside 'Guarantee:' from the Settings area at the
bottom left corner of the main interface.
If you have not yet run a full virus scan with the latest signature database (as mentioned above), you will be asked
to do so. A full system scan to remove all known viruses is a mandatory requirement if your computer is to be
eligible for guarantee coverage. If this step has already been performed (and your system is clean), then the
process moves to step 2.
76
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click 'Results' to view the Scan Results window. If malicious executables are discovered on your system,
the scan results window displays the number of objects scanned and the number of threats (Viruses,
Malware and so on).
77
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• If No threats are found, click the 'Close' button to return to the main CIS interface.
Step 2: The next stage is to run the Guarantee Activation Wizard again.
• Click 'Not Activated' beside 'Guarantee:' from the Settings area at the bottom left corner of the main
interface.
78
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click Next to continue. The wizard will check whether your computer meets the prerequisites for guarantee
coverage. The prerequisites are:
• Comodo Internet Security 2011 (Pro or Complete) is fully installed (both Firewall and Antivirus)
• That your computer has undergone and passed a full virus scan using the latest signature database
If any of the items listed above are not detected then the next stage of the wizard will implement them (for example,
it will install any missing components and start a full virus scan). If all components are present then the process
moves to step 3.
79
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click 'Next' to continue. The wizard will start downloading and installing the components automatically.
80
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
... and on completion, a final confirmation screen indicating successful activation of the Guarantee will be
displayed.
Successfully activating your Guarantee will change the information displayed in the 'Settings' area:
To renew your subscription click 'Activate Now' beside 'Subscription:' from the Settings area at the bottom left
81
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Select 'I do not have a license key or my license key is expired' and click 'Next'.
• Select 'Yes' to the question Are you an existing Comodo customer? in Customer information area, enter
your login and password and complete the payment procedures.
The Subscription key will be sent to you by email. Activate your subscription using the new key to enjoy the
continued services.
There are 3 different ways to access the management interface of Comodo Internet Security:
• Windows Desktop
82
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Start Menu
You can also access Comodo Internet Security via the Windows Start Menu.
• Click Start and select All Programs > Comodo > COMODO Internet Security > COMODO Internet
Security.
Windows Desktop
• Just double click the shield icon in the desktop to start Comodo Internet Security.
By right-clicking on the tray icon, you can access short cuts to selected settings such as Antivirus Security Level,
Firewall security Level, Defense+ Security Level, Sandbox Security Level, Configuration including Game Mode
option.
Antivirus Security Level – Click here for more details on Antivirus Security Level setting
Firewall Security Level – Click here for more details on Firewall security Level setting
Defense+ Security Level – Click here for more details on Defense+ Security Level setting
Sandbox Security Level – Click here for more details on Sandbox Security Level
Game Mode – Switches CIS 2011 to Game Mode to enable you to play your games without any interruptions from
various alerts in your computer. The operations that can interfere with users’ gaming experience are either
suppressed or postponed.
83
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
In game mode:
• AV database updates and scheduled scans are postponed until the gaming is over;
• Automatic isolation of unknown applications and real-time virus detection are still functional.
The specific layout of the summary screen that you see is dependent on the type of installation you chose. Click
the links below to view an outline of the summary screen that applies to your installation:
84
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
On the left-hand side of the main interface the status of the system will be displayed and recommendations
on actions you need to perform.
2. Antivirus
85
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
3. Defense+
You can see in-depth details of all running processes by clicking View Active Processes in
Defense+ center.
4. Firewall
86
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
iv. Traffic
The Traffic area in the Summary screen of Comodo Firewall displays a bar graph showing the
applications that are currently connected to the Internet and are sending or receiving data. The
summary also displays the % of total traffic each application is responsible for and the filename of
the executable. Clicking on any application name opens View Active Connections interface.
87
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
On the left-hand side of the main interface the status of the system will be displayed and recommendations
on actions you need to perform.
2. Antivirus
3. Defense+
You can see in-depth details of all running processes by clicking View Active Processes in
88
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Defense+ center.
On the left-hand side of the main interface the status of the system will be displayed.
2. Firewall
89
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Internet Security is displayed here as a link. On clicking the link, Firewall Events panel is opened.
For more details on viewing Firewall events, refer View Firewall Events.
iv. Traffic
The Traffic area in the Summary screen of Comodo Firewall displays a bar graph showing the
applications that are currently connected to the Internet and are sending or receiving data. The
summary also displays the % of total traffic each application is responsible for and the filename of
the executable. Clicking on any application name opens View Active Connections interface.
3. Defense+
You can see in-depth details of all running processes by clicking View Active Processes in
Defense+ center.
90
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
See Starting Comodo Internet Security if you are unsure of how to access the main interface.
Persistent Navigation
Comodo Internet Security is divided into five main areas indicated by the tabs with respective icons at the top right
hand side of the main interface screen.
• Summary
• Antivirus
• Firewall
• Defense+
• More.
Each of these areas contains several sub-sections that provide total control over configuration of the security Suite.
These icons are ever-present and can be accessed at all times.
• Summary - Contains at-a-glance details of important settings, activity and other information. The summary
screen differs for different types of installation, namely:
See the Overview of summary screens section for more details on this area.
• Firewall - Clicking this icon opens Firewall Tasks configuration screen. Advanced users are advised to first
visit the Network Security Policy area for an introduction to firewall policies and rule creation.
• Defense+ - Clicking this icon opens Defense+ Tasks configuration screen. Advanced users are advised to
first visit the Computer Security Policy area for an introduction to Defense+ policies, rule creation and
91
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Sandboxing features.
• More - Clicking this icon opens More... options screen which contains several options relating to overall
configuration of Comodo Internet Security.
Buffer Overflow Protection Feature - Buffer overflow attack occurs when a malicious program or script
deliberately sends more data to its memory buffer than the buffer can handle. Defense+ provides alerts on attempt
of most types of buffer overflow attacks and provides protection against data theft, computer crashes and system
damage. For more details, please refer Defense+ Settings > Execution Control Settings > Detect Shell Code
Injections.
Alerts Overview
Comodo Internet Security alerts come in four main varieties, namely:
• Antivirus Alerts
• Firewall Alerts
• Sandbox Alerts
Broadly speaking, Antivirus alerts inform you when a virus or malware is executed into your system, Firewall alerts
inform you about network connection attempts and Defense+ alerts tell you about the behavior of application on
your system. In all the three cases, the alert can contain very important security warnings or may simply occur
because you are running an application for the first time. Your reaction should depend on the information that is
presented at the alert.
92
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Type of Alert
Can be Firewall,
Defense+ or Antivirus
Color indicates
severity of the Alert
Description of activity or
Both firewall and connection attempt
Defense+ alerts are
color coded to the
risk level High visibility icons quickly inform
you which applications and
techniques are involved in an alert.
The information area Clicking the name of the
contains advice to executables here opens a window
user on how to react containing more information about
to the alert. the application in question
Severity Level
The upper strip of both Defense+ and Firewall alerts are color coded according to risk level. This provides a fast,
at-a-glance, indicator of the severity of the alert. However, it cannot be stressed enough that you should still read
the 'Security Considerations' section in order to reach an informed decision on allowing or blocking the activity.
Note: Antivirus alerts are not ranked in this way. They always appear with a red upper strip.
• Yellow Alerts - Low Severity - In most cases, you can safely approve these connection request or activity.
The 'Remember my answer for this application' option is automatically pre-selected for safe requests
• Orange Alerts - Medium Severity - Carefully read the ‘Security Considerations section before making a
decision. These alerts could be the result of a harmless process or activity by a trusted program or an
indication of an attack by malware. If you know the application to be safe, then it is usually okay to allow
the request. If you do not recognize the application performing the activity or connection request then you
should block it.
• Red Alerts - High Severity - These alerts indicate highly suspicious behavior that is consistent with the
activity of a Trojan horse, virus or other malware program. Carefully read the information provided when
deciding whether to allow it to proceed.
93
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Remember my answer - Select this option if you want Firewall to implement the same decision for
identical requests in future - meaning you are not prompted if same type of activity or connection attempt
arises in future. The response you made this time is applied automatically to the all the similar activities or
connection attempts.
More Options
Clicking the More Options in the Firewall alert expands the lower panel and displays more options for reacting to
the alert.
94
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The first three options enable you to select your reaction to the activity or connection attempt requested.
• Treat this application as - Enables you to select a predefined security policy to be deployed on to the
application in question. Select this option and select a predefined policy depending on the trustworthiness
and type of the application.
Refer to Predefined Firewall Policies and Predefined Computer Security Policies for more details.
• Submit the files to COMODO for analysis - Select this option if you suspect that that the application that
has raised this alert as a malware. Comodo Internet Security sends the application to Comodo
automatically, irrespective of your Allow or Block response. Comodo analyzes the application and includes
it in the safe list or black list accordingly.
• Create a "Windows" system restore point - Selecting this option instructs your Windows Operating
System to create a restore point. This enables you to safely rollback your system to the previous system
state if you encounter problems because of allowing or blocking this request.
• If you have Comodo Time Machine (CTM) installed then CIS creates a Time Machine restore point.
• If you do not have Comodo Time Machine installed, then CIS creates a regular Windows System
Restore point.
Note: This option is only available if Windows System Restore is enabled in your system. You can check
whether system restore is enabled by visiting the Windows control panel:
95
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Windows 7
1. Click Start > Control Panel > System > System Protection
2. Make sure that the Protection status of the hard disk drive partition(s) is set to 'On' under 'Protection
Settings'.
Windows Vista
1. Click Start > Control Panel > System > System Protection
2. Make sure that the checkbox(es) beside the hard disk drive partition(s) under 'Automatic restore points >
Create restore points automatically on the selected disks'' are selected.
96
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Windows XP
1. Click Start > Control Panel > System > System Restore tab
2. Make sure that the checkbox 'Turn off System Restore on all drives' is NOT selected.
If Comodo Time Machine (CTM) is installed in your system, the restore point is created by it irrespective of whether
the Windows Restore Point is enabled in your system or not.
Background Note: Comodo Time Machine is a powerful system rollback utility that allows you to quickly restore
97
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
your computer to an earlier point in time. The software is free of charge and allows you to quickly recover your
computer to its last working state in the event of malware attacks or system crashes. Find out more and download
the application from http://www.comodo.com/home/data-storage-encryption/data-recovery.php.
Now that we've outlined the basic construction of an alert, lets look at how you should react to them:
The alert contains the name of the virus detected and the location of the file or application infected by it.
You can take one of the following steps to answer the Antivirus alert.
• Move the file or application to Quarantined Items for later analysis, if you feel that the virus appears to be
suspicious.
• Disinfect the file if there exists a disinfection routine for the detected file.
• Delete the file or application from your system if you do not trust the application.
• Ignore the alert only if you trust the application or the source of application by clicking 'Ignore'.
• Click the drop-down arrow beside the 'Clean' button and select 'Quarantine' from the 'Clean' options.
98
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click the drop-down arrow beside the 'Clean' button and select 'Disinfect' from the 'Clean' options.
99
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Once. If you click 'Once', the virus is ignored only at that time only. If the same application invokes
again, an Antivirus alert is displayed.
• Add to Trusted Files. If you click 'Add to Trusted Files', the virus is moved to Trusted Files area. The
alert is not generated if the same application invokes again.
• Report this to COMODO as a False Alert. If you are sure that the file is safe, select 'Report this to
COMODO as a False Alert'. The Antivirus sends the file to Comodo for analysis. If the file is
trustworthy, it is added to the Comodo safelist.
• Add to Exclusions. If you click 'Add to Exclusions', the virus is moved to Exclusions list. The alert is
not generated if the same application invokes again.
100
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Carefully read the 'Security Considerations' section. The Firewall can recognize thousands of safe
applications. (For example, Internet Explorer and Outlook are safe applications). If the application is known
to be safe - it is written directly in the security considerations section along with advice that it is safe to
proceed. Similarly, if the application is unknown and cannot be recognized you are informed of this.
If it is one of your everyday applications that you want to grant Internet access to then you should select
Allow This Request (it may be the case that the application has not yet been added to the safe application
database yet).
If you don't recognize the application then we recommend you select Block This Request, but do not
select the Remember My Answer option.
In all cases, clicking on the name of the application opens a properties window that can help you determine
whether or not to proceed:
2. If you are sure that it is one of your everyday application, try to use the Treat This Application As option
as much as possible. This deploys a predefined firewall policy on the target application. For example, you
may choose to apply the policy Web Browser to the known and trusted applications 'Internet Explorer',
'FireFox' and 'Opera'. Each predefined policy has been specifically designed by Comodo to optimize the
security level of a certain type of application.
101
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If you do not see the Treat this Application As option, you should click More Options. Remember to
check the box Remember My Answer.
3. If the Firewall alert reports a behavior, consistent with that of a malware in the security considerations
section, then you should block the request AND click Remember My Answer to make the setting
permanent.
1. As with Firewall Alerts, carefully read the 'Security Considerations' section. Comodo Internet Security can
recognize thousands of safe applications. If the application is known to be safe - it is written directly in the
security considerations section along with advice that it is safe to proceed. Similarly, if the application is
unknown and cannot be recognized you are informed of this.
If it is one of your everyday applications that you want to grant execution rights to then you should select
Allow This Request.
If you don't recognize the application then we recommend you select Block This Request but do not
select Remember My Answer check box.
2. Avoid using the Installer or Updater policy if you are not installing an application. This is because treating
an application as an 'Installer or Updater' grants maximum possible privileges onto to an application -
something that is not required by most 'already installed' applications. If you select 'Installer or Updater',
you may consider using it temporarily with Remember My Answer left unchecked.
3. Pay special attention to Device Driver Installation and Physical Memory Access alerts. Again, not many
legitimate applications would cause such an alert and this is usually a good indicator of malware/rootkit like
behavior. Unless you know for a fact that the application performing the activity is legitimate, then Comodo
recommends blocking these requests.
102
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
4. Protected Registry Key Alerts usually occur when you install a new application. If you haven't been
installing a new program and do not recognize the application requesting the access , then a 'Protected
Registry Key Alert' should be a cause for concern.
103
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
5. Run with elevated Privileges. CIS will display this kind of alert when the installer of an unknown
application requires administrator, or elevated, privileges to run. An installer that is allowed to run with
elevated privileges is permitted to make changes to important areas of your computer such as the registry.
• If you have good reason to trust the publisher of the software then you can click the 'Allow' button.
This will grant the elevated privilege request and allow the installer to run.
• If you are unsure of the safety of the software, then Comodo recommends that you run it in the
sandbox by clicking the 'Sandbox' button.
• If this alert is unexpected then you should abort the installation by clicking the 'Block' button (for
example, you have not proactively started to install an application and the executable does not
belong to an updater program that you recognize)
• If you select 'Always trust the publisher of this file' then CIS will treat all files from this installer as
safe and no future alerts will be generated when you run executables by this publisher.
• In all cases, please remember to select 'Submit this file to Comodo for analysis' so that our
researchers can establish whether the application is safe or not. If it is found to be safe, we shall
add it to the global safelist (whitelist). If it is found to be malicious we will add it to our global list of
malware signatures (blacklist). Comodo will then distribute the updated lists to all users of CIS.
104
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
and
• 'Automatically detect and run installers outside the sandbox' is enabled. These settings can be modified in
Defense+ Tasks > Defense+ Settings > Sandbox Settings.
There are two versions of this alert - one for unknown installers that are not digitally signed and the second for
unknown installers that are digitally signed but the publisher of the software has not yet been white-listed (they are
not yet a 'Trusted Software Vendor').
• Unknown but signed installers can be allowed to run if you trust the publisher, or may be sandboxed if you
would like to evaluate the behavior of the application.
• In both instances, select 'Submit the file to Comodo for analysis' so that we can effectively categorize the
file and add it to to our global white-list or blacklist.
Also see:
• 'Answering a Sandbox Alert' to see how CIS handles unknown applications that are not detected as being
an installer or updater program.
• 'Unknown Files: The Sand-boxing and Scanning Processes' - to understand the decision making process
behind why CIS chooses to sandbox certain applications.
105
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• 'Trusted Software Vendors' - for an explanation of digitally signed files and 'Trusted Software Vendors'.
6. Protected File Alerts usually occur when you try to download or copy files or when you update an already
installed application.
Were you installing new software or trying to download an application from the Internet? If you are
downloading a file from the 'net, try to use Allow without Remembering option to cut down on the
creation of unnecessary rules within the firewall.
If an application is trying to create an executable file in the Windows directory (or any of its subdirectories)
then pay special attention. The Windows directory is a favorite target of malware applications. If you are not
installing any new applications or updating Windows then make sure you recognize the application in
question. If you don't, then select Block This Request without selecting Remember My Answer option.
If an application is trying to create a new file with a random filename e.g. "hughbasd.dll" then it is probably
a virus and you should block it permanently by selecting Treat As Isolated Application (fourth down in the
graphic below).
7. A Buffer overflow Alert is generated when an application tries to send more data to its memory buffer than
that the buffer can handle. This may be a possible hacking attempt.
106
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If you click Skip, the application is excluded from monitoring for the moment and is allowed access. But on
the next attempt of attack the alert is generated again.
If you select 'Skip this application in the future', and click Skip, the application is excluded from monitoring
permanently and allowed access all the times. Do this only of the application is from a trusted vendor.
8. If a Defense+ alert reports a malware behavior in the security considerations area then you should Block
the request permanently by selecting Remember My Answer option. As this is probably a virus, you
should also submit the application in question, to Comodo for analysis.
9. Unrecognized applications are not always bad. Your best loved applications may very well be safe but not
yet included in the Comodo certified application database. If the security considerations section says “If xxx
is one of your everyday applications, you can allow this request”, you may allow the request permanently if
you are sure it is not a virus. You may report it to Comodo for further analysis and inclusion in the certified
application database.
10. If Defense+ is in Clean PC Mode, you probably are seeing the alerts for any new applications introduced to
the system - but not for the ones you have already installed. You may review the 'Unrecognized Files'
section for your newly installed applications and remove them from the list for them to be considered as
clean.
11. Avoid using Trusted Application or Windows System Application policies for you email clients, web
browsers, IM or P2P applications. These applications do not need such powerful access rights.
The alert will show the name of the executable that has been isolated in the sandbox. The application will be
automatically added to Unrecognized Files list.
• Clicking the name of the application will open the Unrecognized Files interface, that displays a list of the
unrecognized files including the currently sandboxed application.
• Clicking Don't isolate it again removes the application from the Unrecognized Files list and adds it to the
Trusted Files list, enabling the application to run outside the sandbox. Choose this option if you are
absolutely sure that the executable is safe.
Users are also reminded that they should submit such unknown applications to Comodo via the 'Unrecognized
107
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Files' interface. This will allow Comodo to analyze the executable and, if it is found to be safe, to add it to the global
safe list. This will ensure that unknown but ultimately safe applications are quickly white-listed for all users.
Also see:
• 'Unknown Files: The Sand-boxing and Scanning Processes' - to understand the decision making process
behind why CIS chooses to sandbox certain applications.
Comodo Antivirus detects and removes threats that are present on your machine and forms an additional layer of
security on top of the threat prevention offered by the Firewall and Defense+ components. The heuristics scanning
capability of the application identifies previously unknown viruses and Trojans.
In order to maintain maximum security levels, Comodo advises you to run regular Antivirus scans.
On-Demand scanning is also seamlessly integrated into the Windows operating system. Users can scan specific
objects ‘on the fly’ by simply right-clicking on a file, folder or drive and selecting Scan with Comodo AntiVirus’
from the context sensitive menu.
The Antivirus tasks center can be accessed at all times by clicking on the Antivirus tab from
the navigation panel.
108
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The Antivirus main configuration area provides easy access to all the features. Click the links below to see detailed
explanations of each area in this section.
• Run a Scan
• Quarantined Items
• Submit Files
• Scheduled Scans
• Scan Profiles
• Scanner Settings
You have two options available when you choose to run an On-Demand Scan:
2. Define a custom scan of the areas you choose, by creating a Scan Profile.
109
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Apart from running an On-Demand scan from Run a Scan interface, you can also scan specific objects
using Context Sensitive Scan.
i. My Computer - When this Profile is selected, Comodo Antivirus scans every local drive, folder and file on
your system.
ii. Critical Areas - When this profile is selected, Comodo Antivirus scans the Program Files Folder and
WINDOWS Folder of the Operating System of your computer.
iii. Spyware Scan - Among the many types of malware, spyware is a unique malware, which when it gets
installed in your computer without your knowledge while browsing the Internet or installed secretly, gathers
small bits of data from your system without affecting its performance in any way. It is mainly used to collect
vital information from your computer such as passwords by detecting keystrokes and various other
personal information with a potential to seriously compromise your important data.
Spyware Scan feature in Comodo Antivirus scans your Windows registry and system files to check whether
your computer is infected with such malware and alerts you. This scanning feature improves the detection
and successful cleaning rate of already infected systems.
Custom Scan
You can run the virus scan on selected disks or folders by setting the scan profiles beforehand. For more details on
Scan profiles, refer to Antivirus Tasks > Scan Profiles. You can also Create a Scan Profile from the Run a Scan
option.
Comodo Antivirus also scans the archive files such as .ZIP, .RAR, and so on, on running an on-demand scanning.
110
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Comodo Antivirus checks for AV database updates and if available, updates the virus database in your
system.
111
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Then Comodo Antivirus starts to scan the items, based on the scan profile you have selected.
3. Click 'Results' to view the Scan Results window. If malicious executables are discovered on your system,
the scan results window displays the number of objects scanned and the number of threats (Viruses,
Malware and so on).
112
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Tip: You can sort the scan results by alphabetical order by clicking the 'Threat Name' column header. Similarly
you can sort the scan results based on the risk level by clicking the 'Risk' column header. To select all the entries
for actions such as moving them to quarantine or disinfect, select the check box beside the 'Threat name'.
113
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The selected application is moved to the Quarantined items. For more details on quarantined applications, refer to
Antivirus Tasks > Quarantined Items.
114
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The antivirus disinfects the file if there exists a disinfection routine defined for the file and the file is recovered to its
pre-viral state. If no any disinfection routine is available, the file is deleted permanently from your system.
115
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
To ignore an application / file you consider as safe from the threat list
• Click the 'Ignore' button
116
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Once - If you click 'Once', the virus is ignored only at that time only. If the same application invokes
again, an Antivirus alert is displayed.
• Add to Trusted Files - If you click 'Add to Trusted Files', the virus is moved to Trusted Files area. The
alert is not generated if the same application invokes again.
• Report this to COMODO as a False Alert - If you are sure that the file is safe, select 'Report this to
COMODO as a False Alert'. The Antivirus sends the file to Comodo for analysis. If the file is
trustworthy, it is added to the Comodo safelist.
• Add to Exclusions - If you click 'Add to Exclusions', the virus is moved to Exclusions list. The alert is
not generated if the same application invokes again.
117
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Type a name for the scan profile to be created in the 'Name' box.
3. Click 'Add'.
118
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
A configuration screen appears, prompting you to select the locations to be scanned when the newly created scan
profile is selected.
4. Select the locations from the left column, drag and drop to the right column or select the locations and click
right arrow to move selected folders to right column.
5. Click 'Apply'.
Note: You can also create new Scan Profiles by accessing Scan Profiles in the Antivirus Screen.
119
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Our anti-virus database is maintained and updated around the clock by a team of dedicated technicians, providing
you with the solutions to the latest virus outbreaks. Updates can be downloaded to your system manually or
automatically from Comodo's update servers.
To manually check for the latest virus Database and then download the updates
1. Click on the 'Update Virus Database' from the main Antivirus Task Manager Screen.
120
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
When infected or possibly infected files are found, if the anti-virus database has been not updated for a critically
long time, or your computer has not been scanned for a long time, the main window of Comodo Antivirus
recommends a course of action and gives a supporting explanation. We have customized our application to
achieve optimal performance based on the extensive expertise of Comodo in the anti-virus protection business.
Automatic Updates
Comodo AntiVirus checks for latest virus database updates from Comodo website and downloads the updates
automatically. You can configure Comodo Antivirus to download updates automatically in the Scanner Settings for
Real Time Scanning (On-Access Scanning) and Scheduled Scanning. Refer to Real Time Scanning Settings and
Scheduled Scanning Settings.
For adding executables to Quarantined items, refer to Antivirus Tasks > Run a Scan. You can also:
• Manually add applications, executables or other files, that you do not trust, as a Quarantined item
121
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Column Descriptions
• Location - Indicates the location where the application or the file is stored;
• Date/Time - Indicates date and time, when the item is moved to quarantine.
• Click Add and select the file from Open dialog box.
122
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If the restored item does not contain a malware, it operates as usual. But if it contains a malware, it is detected as a
threat immediately, if the Real Time Scanning is enabled or during the next scan.
• Click 'Clear'.
This deletes all the quarantined items from the system permanently.
Note: Quarantined files are stored using a special format and do not constitute any danger to your computer.
123
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Column Descriptions
• Location - Indicates the location where the application detected with a threat is stored.
• Malware Name - Name of the malware event that has been detected.
• Status - Gives the status of the action taken. It can be either 'Success' or 'Fail'.
Click 'More' to load the full, Comodo Internet Security Log Viewer module.
This window contains a full history of logged events in two categories: Logs per Module and Other Logs.
It also allows you to build custom log files based on specific filters and to export log files for archiving or
troubleshooting purposes.
The Log Viewer Module is divided into three sections. The top panel displays a set of handy, predefined time
Filters. The left panel the types of Logs. The right hand side panel displays the actual events that were logged for
the time period you selected in the top panel and the type of log selected in the left panel (or the events that
124
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The Logs per Module option contains the logged events of Firewall, Defense+ and Antivirus modules and Other
Logs options contains logged events of the following:
• Alerts Displayed: Displays the list of various alerts that were displayed to the user, the response given by
the user to those alerts and other related details of the alert.
• Tasks Launched: Displays the various Antivirus tasks such as updates and scans that have taken place.
This area will contain a log of all on demand and scheduled AV scans and the result of that scan.
• Configuration Changes: Displays a log of all configuration changes made by the user in the CIS
application.
Clicking on any of the preset filters in the top panel alters the display in the right hand panel in the following ways:
The example below shows an example display when the Antivirus Events for 'Today' are displayed.
125
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Note: The type of events logged by the Antivirus, Firewall and Defense+ modules of Comodo Internet Security
differ from each other. This means that the information and the columns displayed in the right hand side panel
change depending on which type of log you have selected in the top and left hand side panel. For more details on
the data shown in the columns, see View Firewall Events or View Defense+ Events.
Having chosen a preset time filter from the top panel, you can further refine the displayed events according to
specific filters. The type of filters available for Firewall logs differ to those available for Defense+ logs. The table
below provides a summary of available filters and their meanings:
Date - Displays only the events Date - Displays only the events Date - Displays only the events
logged during the user defined logged during the user defined logged during the user defined
date(s) date(s) date(s)
126
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Location - Displays only the Application - Displays only the Application - Displays only the
events logged from a specific events propagated by a specific events propagated by a specific
location application application
Malware Name - Displays only Action - Displays events Action - Displays events according to
the events logged corresponding according to the response (or the response (or action taken) by
to a specific malware action taken) by the firewall Defense+
Action - Displays events Direction - Indicates if the event Target Name - Displays only the
according to the response (or was an Inbound or Outbound events that involved a specified target
action taken) by the Antivirus connection application
Destination IP address -
Displays only the events with a
specific target IP address
127
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click View > Advanced Filter to open the ‘Advanced Filter’ configuration area.
Or
• Right click on any event and select 'Advanced Filter' option to open the corresponding configuration area.
The ‘Advanced Filter’ configuration area is displayed in the top half of the interface whilst the lower half displays the
Events, Alerts, Tasks or Configuration Changes that the user has selected from the upper left pane. If you wish to
view and filter event logs for other modules then simply click log name in the tree on the upper left hand pane.
The Advanced Log filter displays different fields and options depending on the log type chosen from the left hand
pane (Antivirus, Defense+, Firewall).
This section will deal with Advanced Event Filters related to ‘Antivirus Events’ and will also cover the custom
filtering that can be applied to the ‘Other Logs’ (namely ‘Alerts Displayed’, ‘Tasks’ Launched’ and ‘Configuration
Changes’). The Firewall and Defense+ Advanced Event Filters are dealt with in their respective sections.
You have 4 categories of filter that you can add. Each of these categories can be further refined by either selecting
or deselecting specific filter parameters or by the user typing a filter string in the field provided.
3. Click the ‘Add’ button when you have chosen the category upon which you wish to filter.
128
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
i. Action: Selecting the 'Action' option displays a dropdown field and a set of specific filter parameters that
can be selected or deselected.
a) Select 'Equal' or 'Not Equal' option from the dropdown. ‘Not Equal’ will invert your selected choice.
b) Now select the checkboxes of the specific filter parameters to refine your search. The parameter
available are:
•Quarantine: Displays events where the user chose to quarantine a file
• Remove: Displays events where the user chose to delete an item
• Ignore: Displays events where the user chose to ignore an item
• Detect: Displays events for detection of a malware
• Ask: Displays events when user was asked by alert concerning some Defense+, Firewall or
Antivirus event
• Restore: Displays events of the applications that were quarantined and restored.
The filtered entries are shown directly underneath.
129
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
For example, if you checked the ‘Quarantine’ box then selected ‘Not Equal’, you would see only those
Events where the Quarantine Action was not selected at the virus notification alert.
ii. Location: Selecting the 'Location' option displays a drop-down field and text entry field.
a) Select 'Contains' or 'Does Not Contain' option from the dropdown field.
b) Enter the text or word that needs to be filtered.
The filtered entries are shown directly underneath.
For example, if you select 'Contains' option from the dropdown field and enter the word
'unclassifiedMalware' in the text field, then all events containing the word 'unclassifiedMalware' in the
Location field will be displayed directly underneath. If you select 'Does Not Contain' option from the drop-
down field and enter the word 'System' in the text field, then all events that do not have the word 'System'
will be displayed directly underneath.
iii. Malware Name: Selecting the 'Malware' option displays a dropdown field and text entry field.
a) Select 'Contains' or 'Does Not Contain' option from the drop-down field.
b) Enter the text or word that needs to be filtered.
The filtered entries are shown directly underneath.
Refer to the example given for 'Location' option for better understanding.
iv. Status: Selecting the 'Status' option displays a drop-down field and a set of specific filter parameters
that can be selected or deselected.
a) Select 'Equal' or 'Not Equal' option from the dropdown field. ‘Not Equal’ will invert your selected
choice.
b) Now select the checkboxes of the specific filter parameters to refine your search. The parameter
available are:
130
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Refer to the example given for 'Action' option for better understanding.
Note: More than one filters can be added in the ‘Advanced Filter’ pane. After adding one filter type, the option to
select the next filter type automatically appears. You can also remove a filter type by clicking the 'Remove' option
at the end of every filter option.
This will open the Advanced Filter pane to the upper right. From here, you can chose the category of filter
from a drop down box. Each of these categories can be further refined by either selecting or deselecting
specific filter parameters or by the user typing a filter string in the field provided.
3. Click ‘Add’ when you have chosen the category upon which you wish to filter.
131
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The following table lists the various filter categories and parameters for ‘Alerts Displayed’.
Type Displays the type of alert. It can be a Firewall, Defense+ or Antivirus alert
Advice Suggests an advice that can be executed by the user for that event
Answered Displays the date and time on which the alert was answered
Flags Filters the events based on the flags set for them.
Answer Displays the answer that was given by you for the alert
Treat As Displays the type of policy, if any, for the corresponding event type
132
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
This will open the Advanced Filter pane to the upper right. From here, you can chose the category of filter
from a drop down box. Each of these categories can be further refined by either selecting or deselecting
specific filter parameters or by the user typing a filter string in the field provided.
3. Click ‘Add’ when you have chosen the category upon which you wish to filter.
The following table lists the various filter categories and parameters for ‘Tasks Launched’.
Type Displays the type of task. It can be an antivirus update or scan type.
Parameter Displays the name of the scan profile. This column is populated only if 'Av Scan' option
133
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Completed Displays the date and time at which the task was executed.
Code Displays a code value if the task was not performed successfully and for task updates it
shows a standard value: 0x00000001 if base is up to date
This will open the Advanced Filter pane to the upper right. From here, you can chose the category of filter
from a drop down box. Each of these categories can be further refined by either selecting or deselecting
specific filter parameters or by the user typing a filter string in the field provided.
3. Click ‘Add’ when you have chosen the category upon which you wish to filter.
The following table lists the various filter categories and parameters for ‘Configuration Changes’.
134
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Action Displays events according to the response (or action taken) by Defense+
Modifier Displays events sorted based on whether the configuration was changed by the User,
Antivirus alert, Firewall alert or Defense+ alert. It could also be a Buffer Overflow alert,
Auto learn or Execution alert.
Object Displays the object for which the configuration change took place.
Date Filter
The Date Filter can be seen in the lower left hand pane. Using the Date Filter you can easily see the events on a
particular date or on a date range.
135
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Now, click the required date. The events on that particular date is displayed.
2. Select the start date from which you wish to view the events. Hold the shift key and click the end date till
which you wish to view the events. The events for that particular date range is displayed.
Or
• Click 'View' in the menu bar and click the 'Date Filter' option. This is a toggle command and you can repeat
this step to make the Date Filter appear.
136
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
i. File Menu
1. Select the event for which the log report is to be taken.
3. Select the location where the log report has to be saved, provide a file name and click 'Save'.
1. Right click in the log display window to export the currently displayed log file to HTML.
You can export a custom view that you created using the available Filters by right clicking and selecting 'Export'
from the context sensitive menu. Again, you are asked to provide a file name and save location for the file.
You can submit the files which you suspect to be a malware or the files which you consider as safe but identified as
malware by Comodo Antivirus (False Positives). The files are analyzed by experts in Comodo and added to white
list or black list accordingly.
137
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Select the items (files or folders) you wish to submit to Comodo for analysis from the right hand pane and
move them to left hand pane by clicking the right arrow one by one. (If you want to revert a file, select the
file from the left hand pane and click the left arrow)
138
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
When a file is first submitted, Comodo's online file look-up service will check whether the file is already queued for
analysis by our technicians. The results screen displays these results:
• 'Successfully submitted' - The file's signature was not found in the list of files that are waiting to be tested
and was therefore uploaded from your machine to our research labs.
• 'Already submitted' - The file has already been submitted to our labs by another CIS user and was not
uploaded from your machine at this time.
Comodo will analyze all submitted files. If they are found to be trustworthy, they will be added to the Comodo safe
list (i.e. white-listed). Conversely, if they are found to be malicious then they will be added to the database of virus
signatures (i.e. black-listed).
139
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
You can add an unlimited number of scheduled scans to run at a time that suits your preference. A scheduled scan
may contain any profile of your choice.
You can choose to run scans at a certain time on a daily, weekly, monthly or custom interval basis. You can also
choose which specific files, folders or drives are included in that scan.
Perhaps you wish to check your entire system first thing in the morning; maybe you prefer the middle of the night!!
Comodo Antivirus gives you the power to choose, allowing you to get on with more important matters with complete
peace of mind.
The detection settings for the Scheduled Scans can be configured under the Scheduled Scanning tab of the
Scanner Settings interface.
A default schedule 'Weekly Virus Scanning' is displayed. This schedule is set so that your computer is scanned on
140
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
every Sunday at 12:00am. You can edit this schedule by selecting it and clicking the 'Edit' button.
3. Type a name for the newly scheduled scan in the 'Name' box.
4. Select a scanning profile from the list of preset scanning profiles by clicking at the drop-down arrow, in the
'Profile' box. (For more details on creating a custom Scan Profile that can be selected in a scheduled scan,
see Antivirus Tasks > Scan Profiles)
5. Select the days of the week you wish to schedule the scanning from 'Days of the Week' check boxes.
6. Set the starting time for the scan in the selected days in the 'Start time' drop-down boxes.
7. Click 'Apply'.
Repeat the process to schedule other scans with other predefined scan profiles.
4. Click 'Apply'.
141
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Select the Scan Schedule you wish to cancel in the 'Scheduled Scans' settings panel.
2. Click 'Remove'.
You can create custom scan profiles, to define selected disks or folders to be scanned and the created scan profile
can be re-used for any desired scan event i.e. Run a Scan (On-Demand Scanning) and Scheduled Scans. You can
create as many number of custom scan profiles as you wish according to the usage of your system. A Scan Profile
allows you to scan only a selected area of your storage, saving time and resources.
• New scan profiles can be created by clicking the ‘Create New Scan’ button in the ‘Run a Scan’ panel or by
clicking the ‘Add button’ in the ‘Scan Profiles’ area.
• New scan profiles can then be referenced when creating a new ‘Scheduled Scan’ and as the target of an
on-demand scan in the ‘Run a scan’ area.
Just to clarify, AntiVirus scan profiles are purely concerned with the location of a scan, not the parameters of the
scan. All scan profiles use the parameters as determined in the specific ‘Scanner Settings’ tab of that type of scan.
• Click 'Scan Profiles' from the main Antivirus Tasks Manager Screen.
Comodo Antivirus contains three default Scan Profiles 'My Computer', 'Critical Areas' and Spyware Scan. These
142
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• My Computer – On selecting this, the Antivirus scans all drives on your machine
• Critical Areas – On selecting this, the Antivirus scans "Windows", "Program Files", and "Document and
Settings" folders.
• Spyware Scan – Among the many types of malware, spyware is a unique malware, which when it gets
installed in your computer without your knowledge while browsing the Internet or installed secretly, gathers
small bits of data from your system without affecting its performance in any way. It is mainly used to collect
vital information from your computer such as passwords by detecting keystrokes and various other
personal information with a potential to seriously compromise your important data.
Spyware Scan feature in Comodo Antivirus scans your Windows registry and system files to check whether
your computer is infected with such malware and alerts you. This scanning feature improves the detection
and successful cleaning rate of already infected systems.
You can select any one of these Scan Profiles if you want to scan the respective areas.
1. Click 'Scan Profiles' from the main Antivirus Tasks Manager Screen.
3. Type a name for the scan profile to be created in the 'Name' box and click 'Add'.
A configuration screen appears, prompting you to select the locations to be scanned when the newly created scan
profile is selected. The left column displays all possible items (drives, folders and files) on your system for which
scanning is available.
143
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
4. Browse to the folder location in the left column and select the folder.
5. Drag and drop all the files, folders and/or drives you require, into the right hand panel or select the files or
folders and move them to left-hand pane by clicking the right arrow one by one. (If you want to revert a file,
select the file from the left hand pane and click the left arrow)
6. Click 'Apply'.
8. Click 'Apply' in the Scan Profile interface for the created profiles to take effect.
You can see that the Scan Profile you have created, appearing as a target profile in the 'Run a Scan' panel.....
144
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
.....it is also available for selection during a scheduled scan in the drop-down.
145
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• The settings made for each type of the scan applies to all future scans of that type.
• All items listed and all items added to the ‘Exclusions’ list is excluded from all future scans of all types.
• Click on 'Scanner Settings' link in the main Antivirus Tasks Management Screen.
The options that can be configured using the settings panel are
• Manual Scanning - To set the parameters for manual Scanning (Run a Scan);
146
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Exclusions - To see the list of ignored threats and to set the parameters for Exclusions.
The Real Time Scanner also scans the system memory on start. If you launch a program or file which creates
destructive anomalies, then the scanner blocks it and alerts you immediately - giving you real time protection
against threats.
You also have options to automatically remove the threats found during scanning and to update virus database
before scanning. It is highly recommended that you enable the Real Time Scanner to ensure your system remains
continually free of infection.
The Real Time Scanning setting allows you to switch the On Access scanning between Disabled, Stateful and On
Access and allows you to specify detection settings and other parameters that are deployed during on-access
scans.
• Click on the 'Real Time Scanning' tab in the 'Scanner Settings' panel.
• Drag the real time Scanning slider to the required level. The choices available are Disabled (not
recommended), Stateful (default) and On Access. The setting you choose here are also displayed in the
Summary screen.
147
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• On Access - Provides the highest level of On Access Scanning and protection. Any file opened is scanned
before it is run and the threats are detected before they get a chance to be executed.
• Stateful - Not only is Comodo Internet Security one of the most thorough and effective AV solutions
available, it is also very fast. CIS employs a feature called Stateful File Inspection (tm) for real time virus
scanning to minimize the effects of on-access scanning on the system performance. Selecting the ‘Stateful’
option means CIS scans only files that have not been scanned since the last virus update - greatly
improving the speed, relevancy and effectiveness of the scanning.
• Disabled - The Real time scanning is disabled. Antivirus does not perform any scanning and the threats
cannot be detected before they impart any harm to the system.
Detection Settings
• Scan memory on start - When this check box is selected, the Antivirus scans the system memory during
system start-up.
• Automatically quarantine threats found during scanning - When this check box is selected, the
Antivirus moves the file detected to be containing the malware, to Quarantined Items. From the
quarantined items the files can be restored or deleted at your will.
• Automatically update virus database before scanning - When this check box is selected, Comodo
148
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Internet Security checks for latest virus database updates from Comodo website and downloads the
updates automatically, on system start-up and subsequently at regular intervals.
• Show alerts/notification messages – Alerts are the pop-up notifications that appear in the lower right
hand of the screen whenever the on-access scanner discovers a virus on your system. These alerts are a
valuable source of real-time information that helps the user to immediately identify which particular files are
infected or are causing problems. Disabling alerts does not affect the scanning process itself and Comodo
Antivirus still continues to identify and deals with threats in the background. For more details on Antivirus
alerts, click here.
• Heuristics Scanning/Level - Comodo AntiVirus employs various heuristic techniques to identify previously
unknown viruses and Trojans. ‘Heuristics’ describes the method of analyzing the code of a file to ascertain
whether it contains code typical of a virus. If it is found to do so then the application deletes the file or
recommends it for quarantine. Heuristics is about detecting virus-like behavior or attributes rather than
looking for a precise virus signature that matches a signature on the virus blacklist.
This is a quantum leap in the battle against malicious scripts and programs as it allows the engine to
‘predict’ the existence of new viruses - even if it is not contained in the current virus database.
The drop-down menu allows you to select the level of Heuristic scanning from the four levels:
• Off – Selecting this option disables heuristic scanning. This means that virus scans only uses the
‘traditional’ virus signature database to determine whether a file is malicious or not.
• Low - Lower sensitivity to detecting unknown threats but the possibility of false positives is less.
• Medium - Detects unknown threats with medium sensitivity but the possibility of false positives is
also medium.
• High - Higher sensitivity to detecting unknown threats but this also raises the possibility of more
false positives too.
• Do not scan files larger than - This box allows you to set a maximum size (in MB) for the individual files
to be scanned during on-access scanning. Files larger than the size specified here are not scanned
automatically. To scan those files, you can go for Run a Scan option.
• Keep an alert on the screen for - This box allows you to set the time period (in seconds) for which the
alert message should stay on the screen.
149
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Scan memory on start - When this check box is selected, the Antivirus scans the system memory while
starting a manual scan i.e. Run a Scan option.
• Scan archive files - When this check box is selected, the Antivirus scans archive files such as .ZIP and
.RAR files. You are alerted to the presence of viruses in compressed files before you even open them.
These include RAR, WinRAR, ZIP, WinZIP ARJ, WinARJ and CAB archives.
• Automatically update virus database before scanning - Instructs Comodo Internet Security to check for
latest virus database updates from Comodo website and download the updates automatically before
starting an on-demand scanning.
• Enable Cloud Scanning - Instructs Comodo Internet Security to perform cloud based antivirus scanning.
Selecting this option quickens scanning and enables to detect the very latest malware, viruses and rootkits
more accurately, as the scanning is performed with real-time connection to Comodo's online database.
The cloud scanning enables detection of zero-day malware even if you do not have an up-to-date local
antivirus database or a local antivirus database at all.
• Heuristics Scanning/Level - Comodo Internet Security employs various heuristic techniques to identify
previously unknown viruses and Trojans. ‘Heuristics’ describes the method of analyzing the code of a file to
ascertain whether it contains code typical of a virus. If it is found to do so then the application deletes the
150
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
file or recommend it for quarantine. Heuristics is about detecting virus-like behavior or attributes rather than
looking for a precise virus signature that matches a signature on the virus blacklist.
This is a quantum leap in the battle against malicious scripts and programs as it allows the engine to
‘predict’ the existence of new viruses - even if it is not contained in the current virus database.
The drop-down menu allows you to select the level of Heuristic scanning from the four levels:
• Off – Selecting this option disables heuristic scanning. This means that virus scans only uses the
‘traditional’ virus signature database to determine whether a file is malicious or not.
• Low - Lower sensitivity to detecting unknown threats but the possibility of false positives is less.
• Medium - Detects unknown threats with medium sensitivity but the possibility of false positives is also
medium.
• High - Higher sensitivity to detecting unknown threats but this also raises the possibility of more false
positives too.
• Do not scan files larger than - This box allows you to set a maximum size (in MB) for the individual
files to be scanned during manual scanning. Files larger than the size specified here, are not scanned.
151
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
You can choose to run scheduled scans at a certain time on a daily, weekly, monthly or custom interval basis. You
can also choose which specific files, folders or drives are included in that scan by choosing the scan profiles.
• Scan memory on start - When this check box is selected, the Antivirus scans the system memory during
the start of any scheduled scan.
• Scan archive files - When this check box is selected, the Antivirus scans archive files such as .ZIP and
.RAR files during any scheduled scan. You are alerted to the presence of viruses in compressed files
before you even open them. These include RAR, WinRAR, ZIP, WinZIP ARJ, WinARJ and CAB archives.
• Automatically quarantine threats found during scanning - When this check box is selected, the
Antivirus moves the file detected to be containing the malware, to Quarantined Items. From the
quarantined items the files can be restored or deleted at your will.
• Automatically update virus database before scanning - When this check box is selected, Comodo
Internet Security checks for latest virus database updates from Comodo website and downloads the
updates automatically, before the start of every scheduled scan.
• Show Scanning progress - When this check box is selected, a progress bar is displayed on start of a
152
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
scheduled scan. Clear this box if you do not want to see the progress bar.
• Enable Cloud Scanning - Instructs Comodo Internet Security to perform cloud based antivirus scanning.
Selecting this option quickens scanning and enables to detect the very latest malware, viruses and rootkits
more accurately, as the scanning is performed with real-time connection to Comodo's online database.
The cloud scanning enables detection of zero-day malware even if you do not have an up-to-date local
antivirus database or a local antivirus database at all.
• Heuristics Scanning/Level - Comodo Internet Security employs various heuristic techniques to identify
previously unknown viruses and Trojans. ‘Heuristics’ describes the method of analyzing the code of a file to
ascertain whether it contains code typical of a virus. If it is found to do so then the application deletes the
file or recommends it for quarantine. Heuristics is about detecting virus-like behavior or attributes rather
than looking for a precise virus signature that matches a signature on the virus blacklist.
This is a quantum leap in the battle against malicious scripts and programs as it allows the engine to
‘predict’ the existence of new viruses - even if it is not contained in the current virus database.
The drop-down menu allows you to select the level of Heuristic scanning from the four levels:
• Off - Selecting this option disables heuristic scanning. This means that virus scans only uses the
‘traditional’ virus signature database to determine whether a file is malicious or not.
• Low - Lower sensitivity to detecting unknown threats but the possibility of false positives is less.
• Medium - Detects unknown threats with medium sensitivity but the possibility of false positives is also
medium.
• High - Higher sensitivity to detecting unknown threats but this also raises the possibility of more false
positives too.
• Do not scan files larger than - This box allows you to set a maximum size (in MB) for the individual files
to be scanned during scheduled scanning. Files larger than the size specified here are not scanned during
a scheduled scan.
2.8.4 Exclusions
The Exclusions tab in the Scanner Settings panel displays a list of applications/files for which you have selected
Ignore in the Scan Results window of Run a Scan option or added to the Exclusions from an antivirus alert.
153
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
All items listed and all items added to the ‘Exclusions’ list is excluded from all future scans of all types.
Also, you can manually define trusted files or applications to be excluded from a scan .
1. Click 'Add'.
You now have 2 methods available to choose the application that you want to trust – 'Browse Files...' and
'Browse Running Processes'.
• Browse Files... - This option is the easiest for most users and simply allows you to browse the files
which you want to exclude from a virus scan.
• Browse Running Processes - As the name suggests, this option allows you to choose the target
application from a list of processes that are currently running on your PC.
When you have chosen the application using one of the methods above, the application name appears along with
its location.
154
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
It can be accessed at all times by clicking on the Firewall link from the Navigation panel.
The Firewall main configuration area provides easy access to all the features and allows you to create rules for
applications and network connections through a series of shortcuts and wizards. Click on the links below to see
detailed explanations of each area in this section.
155
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click 'View Firewall Events' in the common tasks of Firewall task center.
156
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Column Descriptions
1. Application - Indicates which application or process propagated the event. If the application has no icon,
the default system icon for executable files are used;
2. Action - Indicates how the firewall has reacted to the connection attempt.
3. Protocol - Represents the Protocol application attempted to use to create the connection. This is usually
TCP/IP or UDP - which are the most heavily used networking protocols.
4. Source IP - States the IP address of the host that made the connection attempt. This is usually the IP
address of your computer for outbound connections.
5. Source Port - States the port number on the host at the source IP which was used to make this connection
attempt.
6. Destination IP - States the IP address of the host to which the connection attempt was made. This is
usually the IP address of your computer for inbound connections.
7. Destination Port - States the port number on the host at the destination IP to which the connection
attempt was made.
8. Date/Time - Contains precise details of the date and time of the connection attempt.
• Click 'Refresh' to reload and update the displayed list, to include all events generated since the time you
first accessed the 'Firewall Events' area.
• Click 'More ...' to load the full, Comodo Internet Security Log Viewer module. See below for more details on
this module.
157
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
It also allows you to build custom log files based on specific filters and to export log files for archiving or
troubleshooting purposes.
The Log Viewer Module is divided into three sections. The top panel displays a set of handy, predefined time
Filters. The left panel the types of Logs. The right hand side panel displays the actual events that were logged for
the time period you selected in the top panel and the type of log selected in the left panel (or the events that
correspond to the filtering criteria you selected).
The Logs per Module option contains the logged events of Firewall, Defense+ and Antivirus modules and Other
Logs options contains logged events of the following:
• Alerts Displayed: Displays the list of various alerts that were displayed to the user, the response given by
the user to those alerts and other related details of the alert.
• Tasks Launched: Displays the various Antivirus tasks such as updates and scans that have taken place.
This area will contain a log of all on demand and scheduled AV scans and the result of that scan.
• Configuration Changes: Displays a log of all configuration changes made by the user in the CIS
application.
158
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Clicking on any of the preset filters in the top panel alters the display in the right hand panel in the following ways:
The example below shows an example display when the Defense+ Logs for 'Today' are displayed.
Note: The type of events logged by the Antivirus, Firewall and Defense+ modules of Comodo Internet Security
differ from each other. This means that the information and the columns displayed in the right hand side panel
change depending on which type of log you have selected in the top and left hand side panel. For more details on
the data shown in the columns, see View Antivirus Events or View Defense+ Events.
159
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Having chosen a preset time filter from the top panel, you can further refine the displayed events according to
specific filters. The type of filters available for Firewall logs differ to those available for Defense+ logs. The table
below provides a summary of available filters and their meanings:
Date - Displays only the events Date - Displays only the events Date - Displays only the events
logged during the user defined logged during the user defined logged during the user defined
date(s) date(s) date(s)
Location - Displays only the Application - Displays only the Application - Displays only the
events logged from a specific events propagated by a specific events propagated by a specific
location application application
Malware Name - Displays only Action - Displays events Action - Displays events according to
the events logged corresponding according to the response (or the response (or action taken) by
to a specific malware action taken) by the firewall Defense+
Action - Displays events Direction - Indicates if the event Target Name - Displays only the
according to the response (or was an Inbound or Outbound events that involved a specified target
action taken) by the Antivirus connection application
Destination IP address -
Displays only the events with a
specific target IP address
160
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click View > Advanced Filter to open the ‘Advanced Filter’ configuration area.
Or
• Right click on any event and select 'Advanced Filter' option to open the corresponding configuration area.
The ‘Advanced Filter’ configuration area is displayed in the top half of the interface whilst the lower half displays the
Events, Alerts, Tasks or Configuration Changes that the user has selected from the upper left pane. If you wish to
view and filter event logs for other modules then simply click log name in the tree on the upper left hand pane.
The Advanced Log filter displays different fields and options depending on the log type chosen from the left hand
pane (Antivirus, Defense+, Firewall).
This section will deal with Advanced Event Filters related to ‘Antivirus Events’ and will also cover the custom
filtering that can be applied to the ‘Other Logs’ (namely ‘Alerts Displayed’, ‘Tasks’ Launched’ and ‘Configuration
Changes’). The Firewall and Defense+ Advanced Event Filters are dealt with in their respective sections.
You have 8 categories of filter that you can add. Each of these categories can be further refined by either
selecting or deselecting specific filter parameters or by the user typing a filter string in the field provided.
3. Click the ‘Add’ button when you have chosen the category upon which you wish to filter.
161
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
i. Action: Selecting the 'Action' option displays a drop-down box and a set of specific filter parameters
that can be selected or deselected.
a) Select 'Equal' or 'Not Equal' option from the drop-down box. ‘Not Equal’ will invert your selected
choice.
b) Now select the checkboxes of the specific filter parameters to refine your search. The parameter
available are:
• Blocked: Displays list of events that were blocked
• Allowed: Displays list of events that were allowed
• Asked: Displays list of events that were asked to the user
• Suppressed: Displays list of events that were suppressed by the user
The filtered entries are shown directly underneath.
ii. Application: Selecting the 'Application' option displays a drop-down box and text entry field.
162
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
a) Select 'Contains' or 'Does Not Contain' option from the drop-down box.
b) Enter the text or word that needs to be filtered.
The filtered entries are shown directly underneath.
iii. Destination IP: Selecting the 'Destination IP' option displays a drop-down box and text entry field.
a) Select 'Equal' or 'Not Equal' option from the drop-down box. ‘Not Equal’ will invert your selected
choice.
b) Enter the destination system's IP address that needs to be filtered.
The filtered entries are shown directly underneath.
iv. Destination Port: Selecting the 'Destination Port' option displays a drop-down box and text entry field.
v. Direction: Selecting the 'Direction' option displays a drop-down box and a set of specific filter
parameters that can be selected or deselected.
a) Select 'Equal' or 'Not Equal' option from the drop-down box. ‘Not Equal’ will invert your selected
choice.
b) Now select the check box of the specific filter parameters to refine your search. The parameter
available are:
• In: Displays a list of events that were directed into the system
• Out: Displays a list of events that were directed out of the system
The filtered entries are shown directly underneath.
vi. Protocol: Selecting the 'Protocol option displays a drop-down box and a set of specific filter parameters
that can be selected or deselected.
163
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
a) Select 'Equal' or 'Not Equal' option from the drop-down box. ‘Not Equal’ will invert your selected
choice.
b) Now select the checkboxes of the specific filter parameters to refine your search. The parameter
available are:
• TCP
• UDP
• ICMP
• IPV4
• IGMP
• GGP
• PUP
• IDP
• ND
The filtered entries are shown directly underneath.
vii. Source IP: Selecting the 'Source IP' option displays a drop-down box and a set specific filter
parameters that can be selected or deselected.
a) Select 'Equal' or 'Not Equal' option from the drop-down box. ‘Not Equal’ will invert your selected
choice.
b) Enter the source system's IP address that needs to be filtered.
The filtered entries are shown directly underneath.
viii.Source Port: Selecting the 'Status' option displays a drop-down box and a set specific filter parameters
that can be selected or deselected.
164
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Note: More than one filters can be added in the ‘Advanced Filter’ pane. After adding one filter type, the option to
select the next filter type automatically appears. You can also remove a filter type by clicking the 'Remove' option
at the end of every filter option.
Date Filter
Click here to know more about Date Filter functionality.
i. File Menu
1. Select the event for which the log report is to be taken.
3. Select the location where the log report has to be saved, provide a file name and click 'Save'.
You can export a custom view that you created using the available Filters by right clicking and selecting 'Export'
from the context sensitive menu. You will be asked to provide a file name and save location for the file.
Advanced users can reconfigure the parameters of this rule in the section 'Network Security Policy'.
2. A dialog box appears prompting you to select the application you want to trust.
165
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
4. You now have 3 methods available to choose the application that you want to trust - 'File Groups'; 'Running
Processes' and 'Browse...'.
• File Groups - Choosing this option allows you to choose your application from a category of pre-set
files or folders. For example, selecting 'Executables' would enable you to create an allow rule for any
file that attempts to connect to the Internet with the extensions .exe .dll .sys .ocx .bat .pif .scr .cpl .
Other such categories available include 'Windows System Applications' , 'Windows Updater
Applications' , 'Start Up Folders' and so on - each of which provide a fast and convenient way to batch
select important files and folders.
• Running Processes - as the name suggests, this option allows you to choose the target application
from a list of processes that are currently running on your PC.
• Browse... - this option is the easiest for most users and simply allows you to browse to the location of
the application which you want to trust.
When you have chosen the application using one of the methods above, the application name appears
along with its location:
166
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Advanced users can view and edit the parameters of this new rule in 'Network Security Policy'. (for example, you
later realize that a program really ought to be allowed some level of Internet access)
2. A dialog box appears prompting you to select the application that you want to be blocked.
4. You now have 3 methods available to choose the application that you want to block - 'File Groups';
'Running Processes' and 'Browse...'.
• File Groups - Choosing this option allows you to choose your application from a category of pre-set
files or folders. For example, selecting 'Executables' would enable you to create a block rule for any file
that attempts to connect to the Internet with the extensions .exe .dll .sys .ocx .bat .pif .scr .cpl . Other
such categories available include 'Windows System Applications' , 'Windows Updater Applications' ,
'Start Up Folders' and so on - each of which provide a fast and convenient way to batch select
important files and folders.
• Running Processes - as the name suggests, this option allows you to choose the target application
from a list of processes that are currently running on your PC.
• Browse... - this option is the easiest for most users and simply allows you to browse to the location of
167
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
6. Click 'Apply' to confirm your choice. The new block and log rule for the application takes effect immediately.
When this application seeks Internet access, Comodo Internet Security automatically denies it and records
an entry in the View Firewall Events interface.
Both application rules and global rules are consulted when the firewall is determining whether or not to allow or
block a connection attempt.
• For Outgoing connection attempts, the application rules are consulted first and then the global rules.
• For Incoming connection attempts, the global rules are consulted first and then application specific rules.
The Network Security Policy interface also allows users to define the Network Zones for specifying access
privileges on them and Port Sets, which are predefined groupings of one or more ports of the system that can be
deployed across multiple traffic filtering rules.
The interface is divided into six main sections - Application Rules, Global Rules, Predefined Polices, Network
Zones, Blocked Zones and Port Sets.
The Application Rules tab allows users to view, manage and define the network and Internet access rights of
applications on your system.
The Global Rules tab allows users view, manage and define overall network policy that applies to your computer
and is independent of application rules.
The Predefined Policies tab allows users to view and manage a set of one or more individual network control
rules that have been saved and can be re-used and deployed on multiple applications.
The Network Zones tab allows the users to define the network zones for applying access privileges for them.
The Blocked Zones tab allows the user the configure settings to allow only the desired and trusted networks.
The Port Sets tab allows the users to define groups of ports for deploying application specific and global rules.
168
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• See General Navigation for a summary of the navigational options available from the Application Rules and
Global Rules tabs of Network Security Policy interface.
• See the section 'Application Rules' for help to configure application rules and policies.
• See the section 'Global Rules' for help to configure global rules and to understand the interaction between
global and application rules.
• See the section Predefined Policies for help to configure predefined firewall policies.
• See the section Network Zones for information and help on defining the network zones.
• See the section Blocked Zones for information and help of configuring the networks to be blocked from
accessing your computer.
• See the section Port Sets for information and help on defining port groups.
• Edit... - Allows the user to modify the selected rule or application policy. See Overview of Policies and
Rules, Creating and Modifying Network Policy and Understanding Network Control Rules
• Move Up - Raises the currently selected rule or policy up one row in the priority list. Users can also re-
169
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
prioritize policies or re-assign individual rules to another application's policy by dragging and dropping.
• Move Down - Lowers the currently selected rule or policy down one row in the priority list. Users can also
re-prioritize policies or re-assign individual rules to another application's policy by dragging and dropping.
• Purge - Runs a system check to verify that all the applications for which policies are listed are actually
installed on the host machine at the path specified. If not, the policy is removed, or 'purged', from the list.
Users can re-order the priority of policies by simply dragging and dropping the rule in question. Alternatively, select
the rule you wish to re-prioritize and click either the 'Move Up' or 'Move Down' button.
• See Application Network Access Control interface for an introduction to the rule setting interface
• See Creating and Modifying Network Policies to learn how to create and edit network policies
• See Understanding Network Control Rules for an overview of the meaning, construction and importance of
individual rules
• See Adding and Editing a Network Control Rule for an explanation of individual rule configuration
Whenever an application makes a request for Internet or network access, Comodo Firewall allows or denies this
request based upon the Firewall Policy that has been specified for that application. Firewall Policies are, in turn,
made up from one or more individual network access rules. Each individual network access rule contains
instructions that determine whether the application should be allowed or blocked; which protocols it is allowed to
use; which ports it is allowed to use and so forth.
• Double click on the application name to begin 'Creating or Modifying Network Policy'
170
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Select the application name, right-click and choose 'Edit' to begin 'Creating or Modifying Network Policy'
• Select the application name and click the 'Edit...' button on the right to begin 'Creating or Modifying
Network Policy'
• Double click on the specific rule to begin 'Adding and Editing a Network Control Rule'
• Select the specific rule right-click then choose 'Edit' to begin 'Adding and Editing a Network Control Rule'
• Select the specific rule and click the 'Edit...' button on the right to begin 'Adding and Editing a Network
Control Rule'
Users can also re-prioritize policies or re-assign individual rules to another application's policy by dragging and
dropping.
Although each policy can be defined from the ground up by individually configuring its constituent rules, this
practice would be time consuming if it had to be performed for every single program on your system. For this
reason, Comodo Firewall contains a selection of predefined policies according to broad application category. For
example, you may choose to apply the policy 'Web Browser' to the applications like 'Internet Explorer', 'FireFox'
and 'Opera'. Each predefined policy has been specifically designed by Comodo Firewall to optimize the security
level of a certain type of application. Users can, of course, modify these predefined policies to suit their
environment and requirements. For more details, see Predefined Policies.
Network control rules can be added/modified/removed and re-ordered through the Application Network Access
Control interface. Any rules created using Adding and Editing a Network Control Rule is displayed in this list.
171
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Comodo Firewall applies rules on a per packet basis and applies the first rule that matches that packet type to be
filtered (see Understanding Network Control Rules for more information). If there are a number of rules in the list
relating to a packet type then one nearer the top of the list is applied.
Users can re-order the priority of rules by simply dragging and dropping the rule in question. Alternatively, select
the rule you wish to re-prioritize and click either the 'Move Up' or 'Move Down' button. To begin creating network
policies, first read 'Overview of Policies and Rules' then 'Creating and Modifying Network Policies'
To begin defining an application's network policy, you need take two basic steps.
1. Select the application that you wish the policy to apply to.
If you wish to define a policy for a new application (i.e. one that is not already listed) then click the 'Add...' button in
the main application rules interface. This brings up the 'Application Network Access Control' interface shown below:
172
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Because this is a new application, the 'Application Path' field is blank. (If you are modifying an existing policy, then
this interface shows the individual rules for that application's policy).
You now have 3 methods available to choose the application for which you wish to create a policy - File Groups;
Running Processes and Browse...
i. File Groups - choosing this option allows you to create firewall policy for a category of pre-set files
or folders. For example, selecting 'Executables' would enable you to create a firewall policy for any
file that attempts to connect to the Internet with the extensions .exe .dll .sys .ocx .bat .pif .scr .cpl .
Other such categories available include 'Windows System Applications' , 'Windows Updater
Applications' , 'Start Up Folders' etc - each of which provide a fast and convenient way to apply a
generic policy to important files and folders. To view the file types and folders that are affected by
choosing one of these options, you need to visit the Defense+ area of Comodo Internet Security by
navigating to: Defense+ > Protected Files and Folders> Groups...
173
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
More details on Files and File Groupings is available in this help guide in the Protected Files and Folders
and Blocked Files sections.
ii. Running Processes - as the name suggests, this option allows you to create and deploy firewall
policy for any process that is currently running on your PC.
You can choose an individual process (shown above) or the parent process of a set of running processes.
Click 'Select' to confirm your choice.
Note: A more detailed and powerful 'View Active Process List' is available in the Defense+ Tasks.
iii. Browse... - this option is the easiest for most users and simply allows you to browse to the location
of the application for which you want to deploy the firewall policy. In the example below, we have
decided to create a firewall policy for the Opera web browser.
174
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Having selected the individual application, running process or file group, the next stage is to Configure the rules for
this application's policy.
There are two broad options available for creating a policy that applies to an application - Use a Predefined Policy
or Use a Custom Policy.
• Use a Predefined Policy - Selecting this option allows the user to quickly deploy a existing policy on to the
target application. Choose the policy you wish to use from the drop-down menu. In the example below, we
have chosen 'Web Browser' because we are creating a policy for the 'Opera' browser. The name of the
predefined policy you choose is displayed in the Treat As column for that application in the interface.
Note: Predefined Policies, once chosen, cannot be modified directly from this interface - they can only be
modified and defined using the Predefined Policies interface. If you require the ability to add or modify rules for an
application then you are effectively creating a new, custom policy and should choose the more flexible Use
Custom Policy option instead.
175
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Use a Custom Policy - designed for more experienced users, the Custom Policy option enables full
control over the configuration of firewall policy and the parameters of each rule within that policy.
You can create an entirely new policy or use a predefined policy as a starting point by:
176
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Clicking the 'Add...' button to add individual network control rules. See 'Adding and Editing a Network
Control Rule' for an overview of the process.
• Use the 'Copy From' button to populate the list with the network control rules of a Predefined Firewall
Policy.
• Use the 'Copy From' button to populate the list with the network control rules of another application's policy.
General Tips:
• If you wish to create a reusable policy for deployment on multiple applications, we advise you add a new
Predefined Firewall Policy (or modify one of the existing ones to suit your needs) - then come back to this
section and use the 'Use Predefined Policy' option to roll it out.
• If you want to build a bespoke policy for maybe one or two specific applications, then we advise you
choose the 'Use a Custom Policy' option and create your policy either from scratch by adding individual
rules (click the 'Add...' button) or by using one of the built-in policies as a starting point.
At their core, each network control rule can be thought of as a simple IF THEN trigger - a set of conditions (or
attributes) pertaining to a packet of data from a particular application and an action it that is enforced if those
conditions are met.
As a packet filtering firewall, Comodo Firewall analyses the attributes of every single packet of data that attempts to
enter or leave your computer. Attributes of a packet include the application that is sending or receiving the packet,
the protocol it is using, the direction in which it is traveling, the source and destination IP addresses and the ports it
is attempting to traverse. The firewall then tries to find a network control rule that matches all the conditional
attributes of this packet in order to determine whether or not it should be allowed to proceed. If there is no
corresponding network control rule, then the connection is automatically blocked until a rule is created.
The actual conditions (attributes) you see* on a particular Network Control Rule are determined by the protocol
chosen in Adding and Editing a Network Control Rule
If you chose 'TCP' , 'UDP' or 'TCP and 'UDP', then the rule has the form: Action | Protocol | Direction |Source
Address | Destination Address | Source Port | Destination Port
If you chose 'ICMP', then the rule has the form: Action | Protocol | Direction |Source Address | Destination
Address | ICMP Details
If you chose 'IP', then the rule has the form: Action | Protocol | Direction |Source Address | Destination
Address | IP Details
Action: The action the firewall takes when the conditions of the rule are met. The rule shows 'Allow', 'Block'
or 'Ask'.**
177
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Protocol: States the protocol that the target application must be attempting to use when sending or
receiving packets of data. The rule shows 'TCP', 'UDP', 'TCP or UDP', 'ICMP' or 'IP'
Direction: States the direction of traffic that the data packet must be attempting to negotiate. The rule
shows 'In', 'Out' or 'In/Out'
Source Address: States the source address of the connection attempt. The rule shows 'From' followed by
one of the following: IP , IP range , IP Mask , Network Zone , Host Name or Mac Address
Destination Address: States the address of the connection attempt. The rule shows 'To' followed by one of
the following: IP , IP range , IP Mask , Network Zone , Host Name or Mac Address
Source Port: States the port(s) that the application must be attempting to send packets of data through.
Shows 'Where Source Port Is' followed by one of the following: 'Any', 'Port #', 'Port Range' or 'Port Set'
Destination Port: States the port(s) on the remote entity that the application must be attempting to send to.
Shows 'Where Source Port Is' followed by one of the following: 'Any', 'Port #', 'Port Range' or 'Port Set
ICMP Details: States the ICMP message that must be detected to trigger the action. See Adding and Editing
a Network Control Rule for details of available messages that can be displayed.
IP Details: States the type of IP protocol that must be detected to trigger the action: See Adding and Editing
a Network Control Rule to see the list of available IP protocols that can be displayed here.
Once a rule is applied, Comodo Firewall monitors all network traffic relating to the chosen application and take the
specified action if the conditions are met. Users should also see the section 'Global Rules' to understand the
interaction between Application Rules and Global Rules.
* If you chose to add a descriptive name when creating the rule then this name is displayed here rather than it's full
parameters. See the next section, 'Adding and Editing a Network Control Rule', for more details.
** If you selected 'Log as a firewall event if this rule is fired' then the action is postfixed with "& Log". (e.g. Block &
Log)
The Network Control Rule Interface is used to configure the actions and conditions of an individual network
control rule. If you are not an experienced firewall user or are unsure about the settings in this area, we advise you
first gain some background knowledge by reading the sections 'Understanding Network Control Rules' , 'Overview
of Rules and Policies' and 'Creating and Modifying Network Policies'
178
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
General Settings
Action: Define the action the firewall takes when the conditions of the rule are met. Options available via the drop
down menu are 'Allow', 'Block' or 'Ask'.
Protocol: Allows the user to specify which protocol the data packet should be using. Options available via the drop
down menu are 'TCP', 'UDP', 'TCP or UDP', 'ICMP' or 'IP'
Note: Your choice here alters the choices available to you in the tab structure on the lower half of the interface.
Direction: Allows the user to define which direction the packets should be traveling. Options available via the drop
down menu are 'In', 'Out' or 'In/Out'
Log as a firewall event if this rule is fired: Checking this option creates an entry in the firewall event log viewer
whenever this rule is called into operation. (i.e. when ALL conditions have been met).
Description: Allows you to type a friendly name for the rule. Some users find it more intuitive to name a rule by it's
intended purpose. ( 'Allow Outgoing HTTP requests'). If you create a friendly name, then this is displayed to
represent instead of the full actions/conditions in the main Application Rules interface and the Application Network
Access Control interface.
Protocol
179
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. You can choose any IP Address by selecting Any .This menu defaults to an IP range of 0.0.0.0-
255.255.255.255 to allow connection from all IP addresses.
2. You can choose a Single IP address by selecting Single IP and entering the IP address in the IP
address text box, e.g., 192.168.200.113.
3. You can choose an IP Range by selecting IP Range - for example the range in your private network
and entering the IP addresses in the Start Range and End Range text boxes.
4. You can choose IP Mask by selecting IP Mask. IP networks can be divided into smaller networks
called sub-networks (or subnets). An IP address/ Mask is a subnet defined by IP address and mask
of the network. Enter the IP address and Mask of the network.
5. You can choose an entire network zone by selecting Zone .This menu defaults to Local Area
Network. But you can also define your own zone by first creating a Zone through the 'Network
Zones' area.
6. You can choose a named host by selecting a Host Name which denotes your IP address.
7. You can choose a MAC Address by selecting MAC Address and entering the address in the
address text box.
• Exclude (i.e. NOT the choice below): The opposite of what you specify is applicable. For example,
if you are creating an Allow rule and you check the Exclude box in the Source IP tab and enter
values for the IP range, then that IP range is excluded. You have to create a separate Allow rule for
the range of IP addresses that you DO want to use.
180
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. You can choose any port number by selecting Any - set by default , 0- 65535.
2. You can choose a Single Port number by selecting Single Port and selecting the single port
numbers from the list.
3. You can choose a Port Range by selecting Port Range and selecting the port numbers from the
From and To list.
4. You can choose a predefined Port Set by choosing A Set of Ports. If you wish to create a port set
then please see the section 'Port Sets'.
ii. ICMP
When you select ICMP as the protocol in General Settings, you are shown a list of ICMP message types in
the 'ICMP Details' tab alongside the Destination Address tabs. The last two tabs are configured identically
to the explanation above. You cannot see the source and destination port tabs.
181
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Type in the source/ destination IP address. Source IP is the IP address from which the traffic
originated and destination IP is the IP address of the computer that is receiving packets of
information.
2. Specify ICMP Message , Types and Codes. An ICMP message includes a Message that specifies
the type, that is, the format of the ICMP message.
When you select a particular ICMP message , the menu defaults to set its code and type as well. If
you select the ICMP message type 'Custom' then you are asked to specify the code and type.
IP
When you select IP as the protocol in General Settings, you are shown a list of IP message type in the 'IP
Details' tab alongside the Source Address and Destination Address tabs. The last two tabs are configured
identically to the explanation above. You cannot see the source and destination port tabs.
iv. IP Details
Select the types of IP protocol that you wish to allow, from the ones that are listed.
182
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Comodo Firewall analyzes every packet of data in and out of your PC using combination of Application and Global
Rules.
• For Outgoing connection attempts, the application rules are consulted first and then the global rules
second.
• For Incoming connection attempts, the global rules are consulted first and then the application rules
second.
183
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Therefore, outgoing traffic has to 'pass' both the application rule then any global rules before it is allowed out of
your system. Similarly, incoming traffic has to 'pass' any global rules first then application specific rules that may
apply to the packet.
Global Rules are mainly, but not exclusively, used to filter incoming traffic for protocols other than TCP or UDP.
The configuration of Global Rules is identical to that for application rules. To add a global rule, click the 'Add...'
button on the right. To edit an existing global rule, right click and select 'edit'.
See Application Network Access Control interface for an introduction to the rule setting interface.
See Understanding Network Control Rules for an overview of the meaning, construction and importance of
individual rules.
See Adding and Editing a Network Control Rule for an explanation of individual rule configuration.
Note: This section is for advanced and experienced users. If you are a novice user or are new to Comodo
Firewall, we advise you first read the explanations for Network Security Policies, if you have not already done so.
Although each application's firewall policy could be defined from the ground up by individually configuring its
constituent rules, this practice may prove time consuming if it had to be performed for every single program on your
system. For this reason, Comodo Firewall contains a selection of predefined policies according to broad application
category. For example, you may choose to apply the policy 'Web Browser' to the applications 'Internet Explorer',
'FireFox' and 'Opera'. Each predefined policy has been specifically designed by Comodo to optimize the security
level of a certain type of application. Users can, of course, modify these predefined policies to suit their
environment and requirements. (for example, you may wish to keep the 'Web Browers' name but wish to redefine
the parameters of it rules)
1. Click 'Predefined Policies' tab from Firewall Tasks > Network Security Policy interface.
184
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Select the Policy Name in the list, right-click and choose 'Edit'
• Select the Policy Name and click the 'Edit...' button on the right
• Click the 'Add...' button. This launches the policy creation dialog shown below.
185
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• As this is a new predefined policy, you need to name it in the text field at the top. It is advised that you
choose a name that accurately describes the category/type of application you wish to define policy for.
Next you should add and configure the individual rules for this policy. See 'Adding and Editing a Network
Control Rule' for more advice on this.
Once created, this policy can be quickly called as a 'Predefined Policy' when creating or modifying a
network policy.
186
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Background Note: A computer network is a connection between computers through a cable or some type of
wireless connection. It enables users to share information and devices between computers and other users within
the network. Obviously, there are certain computer networks where you need to grant access to, including your
home or work network. Conversely, there may be other networks where you want to restrict communication with -
or even block entirely.
• Click 'Network Zones' tab from Firewall Tasks > Network Security Policy interface.
Note 1: Adding a zone to this area does not, in itself, define any permission levels or access rights to the zone.
This area allows to define the zones so you can quickly assign such permissions in other areas of the firewall.
Note 2: A network zone can be designated as 'Trusted' and allowed access by using the 'Stealth Ports Wizard'
(An example would be your home computer or network)
Note 3: A network zone can be designated as 'Blocked' and denied access by using the 'Blocked Zones'
interface. (An example would be a known spyware site)
Note 4: An application can be assigned specific access rights to and from a network zone when defining an
Application Rule. Similarly, a custom Global Rule can be assigned to a network zone to all activity from a zone.
Note 5: By default, Comodo Firewall automatically detects any new networks (LAN, Wireless etc). This can be
disabled in the More > Preferences area of the application.
187
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
A dialog box will appear, prompting you to specify a name for the new zone.
2. Choose a name that accurately describes the network you are creating.
This adds the name of your new zone to the Network Zones list.
188
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Select the network name, right click on the name of the new zone and select 'Add...' from the menu.
The 'Add a New Address' dialog allows you to specify an address by typing an IP address; an IP range; an
IP address mask; a host name or a MAC address.
The new zone now appears in the main list along with the addresses you assigned to it.
189
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Quickly called and designated as a trusted zone from the 'Network Zones' interface
• Quickly called and designated as a blocked zone from the 'Blocked Zones' interface
To edit the name of an existing Network Zone
• Select the zone name and click the 'Add...' button on the right and select 'A New Address...' from the drop-
down menu.
• Right click on the address (not the zone name) and select 'Edit...' or
• Select the actual address (not the zone name) and click the 'Edit...' button on the right.
Note: We advise new or inexperienced users to first read 'Network Zones' , 'Stealth Ports Wizard' and 'Network
Security Policy' before blocking zones using this interface.
• Deny access to a specific network by selecting a pre-existing network zone and designating it as blocked
• Click 'Blocked Zones' tab from Firewall Tasks > Network Security Policy interface.
190
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Note 1: You must create a zone before you can block it. There are two ways to do this;
1. Using 'Network Zones' to name and specify the network you want to block.
Note 2: You cannot reconfigure pre-existing network zones from this interface. (e.g., to add or modify IP
addresses). You need to use 'My Network Zones' if you want to change the settings of existing zones.
To deny access to a specific network by selecting a pre-existing network zone and designating it
as blocked
1. Click the 'Add' button at the top right and select 'Network Zones' then the particular zone you wish to block.
191
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Click 'Apply' to confirm your choice. All traffic intended for and originating from computer or devices in this
zone are now blocked.
1. Click the 'Add' button at the top right and select 'A New Blocked Address' . This launches the following
dialog where you can specify the IP address(es), IP Mask, Host Name or MAC address that you wish to
block.
After clicking 'Apply' to confirm your choice, the address(es) you blocked appears in the main interface. You
can modify these addresses at any time by selecting the entry and clicking 'Edit'.
192
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Click 'Apply' to confirm your choice. All traffic intended for and originating from computer or devices in this
zone are now blocked.
Special Note: Creating a blocked network zone implements a 'block all' global rule for the zone in question.
However, unlike when you create a 'Trusted Zone', this rule is not displayed or editable from the global rules tab of
the Network Security Policy interface. This is because you are likely to be trusting only a few zones, there is the
potential that you may have to block many. The constant addition of such block rules would make the interface
unmanageable for most users.
1. Click 'My Port Sets' tab from Firewall Tasks > Network Security Policy interface.
193
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The name of the port set is shown above the actual port numbers that belong to that set. The default port
sets shipped with Comodo Internet Security:
• HTTP Ports: 80 and 443. These are the default ports for http traffic. Your Internet browser uses this
ports to connect to the Internet and other networks.
• POP3/SMTP Ports: 110, 25, 143, 995, 465. These are the ports that are typically used by mail clients
like Outlook Express and WinMail for communication using the POP3, SMTP and IMAP protocols.
• Privileged Ports: 0-1024. This set can be deployed if you wish to create a rule that allows or blocks
access to the privileged port range of 0-1024. Privileged ports are so called because it is usually
desirable to prevent users from running services on these ports. Network admins usually reserve or
prohibit the use of these ports.
To add a new port set
2. Select the port numbers you want to belong to this named set .
1. Click the 'Add' button on the right hand side and select 'A New Port Set...' from the drop-down menu.
194
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Type a name for the port set. In the example below, we have chosen to name our port set A test port set.
3. Click 'Apply'. The new port set appears in the main port set list:
195
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
4. Select the port numbers you want to belong to this named set by right clicking on the name of the new port
set and select 'Add...' from the menu.
If you wish to add more ports to this set then repeat the process from the fourth step.
• Select the name of the set in the list (e.g. HTTP Ports) and click 'Edit...' to bring up the naming dialog.
• Right click on the set name and click 'Add...' or select the port set name, right click the 'Add...' button and
select 'A new port' from the drop-down menu.
• Right click on the port number you wish to change and select 'Edit...' OR select the actual port number (not
the port set name), right click on it and Select 'Edit...'.
When defining or modifying a network control rule, any port sets listed in this interface, including any new ones you
196
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
create are available for selection and deployment in the Source Port and Destination Port tabs on selecting A set
of Ports.
This list is updated in real time whenever an application creates a new connection or drops an existing connection.
The View Active Connections is an extremely useful aid when testing firewall configuration; troubleshooting new
firewall policies and rules; monitoring the connection activity of individual applications and your system as a whole
and for terminating any unwanted connections.
197
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Column Description
• Protocol - Shows the application that is making the connection, the protocol it is using and the direction of
the traffic . Each application may have more than one connection at any time.
• Source (IP : Port) - The source IP Address and source port that the application is connecting through. If
the application is waiting for communication and the port is open, it is described as ‘Listening’.
• Destination (IP : Port) - The destination IP Address and destination port address that the application is
connecting to. This is blank if the 'Source' column is 'Listening'.
• Bytes In - Represents the total bytes of incoming data since this connection was first allowed
• Bytes Out - Represents the total bytes of outgoing data since this connection was first allowed
1. Right click on items in the list to see the context sensitive menu.
198
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. If you wish to view the full path of the application, right click on the application name and select 'Show Full
Path'.
3. If you wish to terminate a connection belonging to an application, right click on the specific connection and
click 'Terminate Connection'.
General Note: Your computer sends and receives data to other computers and to the Internet through an
interface called a 'port'. There are over 65,000 numbered ports on every computer - with certain ports being
traditionally reserved for certain services. For example, your machine almost definitely connects to Internet using
port 80 and port 443. Your e-mail application connects to your mail server through port 25. A 'port scanning' attack
consists of sending a message to each of your computer ports, one at a time. This information gathering
technique is used by hackers to find out which ports are open and which ports are being used by services on your
machine. With this knowledge, a hacker can determine which attacks are likely to work if used against your
machine.
Stealthing a port effectively makes it invisible to a port scan. This differs from simply ‘closing’ a port as NO
response is given to any connection attempts (‘closed’ ports respond with a ‘closed’ reply- revealing to the hacker
that there is actually a PC in existence.) This provides an extremely high level of security to your PC. If a hacker or
automated scanner cannot 'see' your computers ports then they presumes it is offline and move on to other targets.
You can still be able to connect to Internet and transfer information as usual but remain invisible to outside threats.
Comodo Firewall provides the user with flexible stealthing options:
199
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Define a new trusted network and make my ports stealth for everyone else
• Alert me to incoming connections and make my ports stealth on a per-case basis
• Block all incoming connections and make my ports stealth for everyone
Define a New Trusted Network and Make my Ports Stealth for Everyone Else
By selecting this option your machine's ports is stealthed (invisible) to everyone EXCEPT those networks that you
specify as trusted.
1. Click 'Define a New Trusted Network and make my ports stealth for everyone else' link.
A dialog box appears, asking you to choose the new trusted zone:
200
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. If you have already configured a network zone then leave the upper option selected, choose your desired
network from the 'Zone Name' drop-down box and click 'OK'.
If you have not yet defined a zone you wish to trust, you can do so in 'Network Zones' area in Network Security
Policy interface of the firewall or manually define and trust a new zone from this dialog box.
To manually define and trust a new zone from this dialog box
1. Select 'I would like to define and trust a new network zone'.
2. Enter the IP range for the zone for which you want your computer to be visible - starting from the Start IP to
the End IP (or specify a Subnet Mask)
201
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If you wish to add more than one zone, simply repeat this procedure.
Using the 'Define a new trusted network and make my ports stealth for everyone else' option creates a new trusted
zone by adding the following rules in the 'Global Rules' interface:
If you would like more information on the meaning and construction of rules, please click here.
Block | ICMP | In | From Any IP Address | To Any IP Address | Where Message is ECHO REQUEST
If you would like more information on the meaning and construction of rules, please click here.
Block all incoming connections and make my ports stealth for everyone
Selecting this option means your computer's ports are invisible to all networks, irrespective of whether you trust
them or not. The average home user (using a single computer that is not part of a home LAN) finds this option the
more convenient and secure. You are not alerted when the incoming connection is blocked, but the rule adds an
entry in the firewall event log file. Specifically, this option adds the following rule in the 'Global Rules' interface:
Block And Log | IP | In | From Any IP Address | To Any IP Address | Where Protocol is Any
If you would like more information on the meaning and construction of rules, please click here.
202
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Block All
• Custom Policy
• Training
• Disabled
The setting you choose here is also displayed on the summary screen.
203
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Block All Mode: The firewall blocks all traffic in and out of your computer regardless of any user-defined
configuration and rules. The firewall does not attempt to learn the behavior of any applications and does
not automatically create traffic rules for any applications. Choosing this option effectively prevents your
computer from accessing any networks, including the Internet.
• Custom Policy Mode: The firewall applies ONLY the custom security configurations and network traffic
policies specified by the user. New users may want to think of this as the 'Do Not Learn' setting because
the firewall does not attempt to learn the behavior of any applications. Nor does it automatically create
network traffic rules for those applications. You will receive alerts every time there is a connection attempt
by an application - even for applications on the Comodo Safe list (unless, of course, you have specified
rules and policies that instruct the firewall to trust the application's connection attempt).
If any application tries to make a connection to the outside, the firewall audits all the loaded components
and checks each against the list of components already allowed or blocked. If a component is found to be
blocked, the entire application is denied Internet access and an alert is generated. This setting is advised
for experienced firewall users that wish to maximize the visibility and control over traffic in and out of their
computer.
• Safe Mode: While filtering network traffic, the firewall automatically creates rules that allow all traffic for the
components of applications certified as 'Safe' by Comodo, if the checkbox Create rules for safe
applications is selected. . For non-certified new applications, you will receive an alert whenever that
204
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
application attempts to access the network. Should you choose, you can grant that application Internet
access by choosing 'Treat this application as a Trusted Application' at the alert. This deploys the predefined
firewall policy 'Trusted Application' onto the application.
'Safe Mode' is the recommended setting for most users - combining the highest levels of security with an
easy-to-manage number of connection alerts.
• Training Mode : The firewall monitors network traffic and create automatic allow rules for all new
applications until the security level is adjusted. You will not receive any alerts in 'Training Mode' mode. If
you choose the 'Training Mode' setting, we advise that you are 100% sure that all applications installed on
your computer are assigned the correct network access rights.
Tip: Use this setting temporarily while playing an online game for the first time. This suppresses all alerts while the
firewall learns the components of the game that need Internet access and automatically create 'allow' rules for
them. You can switch back to your previous mode later.
• Disabled: Disables the firewall and makes it inactive. All incoming and outgoing connections are allowed
irrespective of the restrictions set by the user. Comodo strongly advise against this setting unless you are
sure that you are not currently connected to any local or wireless networks.
• The application/file is included in the Trusted Files list under Defense+ Tasks;
• The application is from a vendor included in the Trusted Software Vendors list under Defense+ Tasks;
• The application is included in the extensive and constantly updated Comodo safelist.
By default, CIS does not automatically create ‘allow’ rules for safe applications. This helps saving the resource
usage, simplifies the rules interface by reducing the number of 'Allowed' rules in it, reduces the number of pop-up
alerts and is beneficial to beginners who find difficulties in setting up the rules.
Enabling this checkbox instructs CIS to begin learning the behavior of safe applications so that it can automatically
generate the 'Allow' rules. These rules are listed in the Network Security Policy > Application Rules interface. The
Advanced users can edit/modify the rules as they wish.
Background Note: Prior to version 4.x , CIS would automatically add an allow rule for ‘safe’ files to the rules
interface. This allowed advanced users to have granular control over rules but could also lead to a cluttered rules
interface. The constant addition of these ‘allow’ rules and the corresponding requirement to learn the behavior of
applications that are already considered ‘safe’ also took a toll on system resources. In version 4.x, ‘allow’ rules for
applications considered ‘safe’ are not automatically created – simplifying the rules interface and cutting resource
overhead with no loss in security. Advanced users can re-enable this setting if they require the ability to edit rules
for safe applications (or, informally, if they preferred the way rules were created in CIS version 3.x).
205
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The Alert Frequency settings refer only to connection attempts by applications or from IP addresses that you have
not (yet) decided to trust. For example, you could specify a very high alert frequency level, but not receive any
alerts at all if you have chosen to trust the application that is making the connection attempt.
• Very High: The firewall shows separate alerts for outgoing and incoming connection requests for both TCP
and UDP protocols on specific ports and for specific IP addresses, for an application. This setting provides
the highest degree of visibility to inbound and outbound connection attempts but leads to a proliferation of
firewall alerts. For example, using a browser to connect to your Internet home-page may generate as many
as 5 separate alerts for an outgoing TCP connection alone.
• High: The firewall shows separate alerts for outgoing and incoming connection requests for both TCP and
UDP protocols on specific ports for an application.
• Medium: The firewall shows alerts for outgoing and incoming connection requests for both TCP and UDP
protocols for an application.
• Low: The firewall shows alerts for outgoing and incoming connection requests for an application. This is
206
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
the setting recommended by Comodo and is suitable for the majority of users.
• Very Low: The firewall shows only one alert for an application.
Check boxes
This computer is an Internet connection gateway (i.e. an ICS server) – An Internet Connection Sharing Server
(ICS) is a computer that shares its connection to the Internet with other computers that are connected to it by LAN.
i.e. the other computers access the Internet through this computer.
Designating a computer as an ICS server can be useful in some corporate and home environments that have more
than one computer but which have only one connection to the Internet. For example, you might have 2 computers
in your home but only one connection. Setting one as an ICS server allows both of them to access the Internet.
• Leave this box unchecked if no other computers connect to your computer via Local Area Network to share
your connection. This is the situation for the vast majority of home and business users.
• Check this option if this computer has been configured as an Internet Connection Sharing server through
which other computers connect to the Internet.
Note: If your computer is indeed an ICS server but you leave this box unchecked then you are likely to see an
increase in Firewall alerts. Selecting this checkbox does not decrease the security but tells the firewall to handle
ICS requests too. So it just activates some additional functionality and helps reduce the number of alerts.
Q: “I have more than one computer in my home and both connect to the Internet. Should I check this box?’
A: In most cases no. Having more than one computer in your home, both of which connect to the ‘net via a router
or wireless connection, is not the same as ‘sharing’ a connection in the sense that we mean here. Only check this
box if you know that you have designated this computer as an ICS server.
Enable alerts for TCP requests / Enable alerts for UDP requests / Enable alerts for ICMP requests/ Enable
Alerts for loopback requests - In conjunction with the slider, these checkboxes allow you to fine-tune the number
of alerts you see according to protocol.
207
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Protect the ARP Cache - Checking this option makes Comodo Firewall to start performing stateful
inspection of ARP (Address Resolution Protocol) connections. This blocks spoof ARP requests and
protects your computer from ARP cache poisoning attacks.
The ARP Cache (or ARP Table) is a record of IP addresses stored on your computer that is used to map IP
addresses to MAC addresses. Stateful inspection involves the analysis of data within the lowest levels of
the protocol stack and comparing the current session to previous ones in order to detect suspicious activity.
Background - Every device on a network has two addresses: a MAC (Media Access Control) address and
an IP (Internet Protocol) address. The MAC address is the address of the physical network interface card
inside the device, and never changes for the life of the device (in other words, the network card inside your
PC has a hard coded MAC address that it keeps even if you install it in a different machine.) On the other
hand, the IP address can change if the machine moves to another part of the network or the network uses
DHCP to assign dynamic IP addresses. In order to correctly route a packet of data from a host to the
destination network card it is essential to maintain a record of the correlation between a device's IP
address and it's MAC address. The Address Resolution Protocol performs this function by matching an IP
address to its appropriate MAC address (and vice versa). The ARP cache is a record of all the IP and MAC
addresses that your computer has matched together.
Hackers can potentially alter a computer's ARP cache of matching IP/MAC address pairs to launch a
variety of attacks including, Denial of Service attacks, Man in the Middle attacks and MAC address flooding
and ARP request spoofing. It should be noted, that a successful ARP attack is almost always dependent on
the hacker having physical access to your network or direct control of a machine on your network -
208
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
therefore this setting is of more relevance to network administrators than home users.
• Block gratuitous ARP frames - A gratuitous ARP frame is an ARP Reply that is broadcast to all machines
in a network and is not in response to any ARP Request. When an ARP Reply is broadcast, all hosts are
required to update their local ARP caches, whether or not the ARP Reply was in response to an ARP
Request they had issued. Gratuitous ARP frames are important as they update your machine's ARP cache
whenever there is a change to another machine on the network (for example, if a network card is replaced
in a machine on the network, then a gratuitous ARP frame informs your machine of this change and
requests to update your ARP cache so that data can be correctly routed). Enabling this setting helps to
block such requests - protecting the ARP cache from potentially malicious updates.
• Block fragmented IP Datagrams - When a connection is opened between two computers, they must
agree on a Maximum Transmission Unit (MTU). IP Datagram fragmentation occurs when data passes
through a router with an MTU less than the MTU you are using i.e when a datagram is larger than the MTU
of the network over which it must be sent, it is divided into smaller 'fragments' which are each sent
separately. Fragmented IP packets can create threats similar to a DOS attack. Moreover, these
fragmentations can double the amount of time it takes to send a single packet and slow down your
download time.
Comodo Firewall is set by default to block fragmented IP datagrams i.e the option Block Fragmented IP
datagrams is checked by default.
• Do Protocol Analysis - Protocol Analysis is key to the detection of fake packets used in denial of service
attacks. Checking this option means Comodo Firewall checks every packet conforms to that protocols
standards. If not, then the packets are blocked.
• Monitor NDIS protocols other than TCP/IP - This forces Comodo Firewall to capture the packets
belonging to any other protocol driver than TCP/IP. Trojans can potentially use their own protocol driver to
send/receive packets. This option is useful to catch such attempts. This option is disabled by default:
because it can reduce system performance and may be incompatible with some protocol drivers.
209
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
compromised PC whereby the hacker can reformat the hard drive, steal sensitive user information, or even install
programs that transform the machine into a Zombie PC. For more details refer Execution Control Settings.
Defense+ boasts a highly configurable security rules interface and prevents possible attacks from root-kits, inter-
process memory injections, key-loggers and more. It blocks Viruses, Trojans and Spyware before they can ever get
installed on your system and prevents unauthorized modification of critical operating system files and registry
entries.
The Sandbox functionality of Defense+ allows you to run suspicious and unknown executables in an isolated
environment to safeguard your system from the adverse effects of those executables. This is useful for software
testers and users interested in testing out the new software available over Internet.
The Defense+ Tasks area can be accessed at all times by clicking on the Defense+ tab from
the navigation panel.
The Defense+ main configuration area provides easy access to all the features and allows you to create rules for
applications and sandbox through a series of shortcuts and wizards. Click on the links below to see detailed
explanations of each area in this section.
210
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Trusted Files
• Unrecognized Files
• Defense+ Settings
The smart application control mechanism performs security inspections whenever you start an application and
automatically sandboxes any unknown application so that they can NOT do any harm to your system.
Applications in the sandbox are executed under a carefully selected set of privileges and write to a virtual file
system and registry instead of the real system, with improved compatibility with many Windows products . This
delivers the smoothest user experience possible by allowing unknown applications to run and operate as they
normally would while denying them the potential to cause lasting damage.
After an unknown application has been placed in the sandbox, CIS also automatically queues it for submission to
Comodo Cloud Scanners for automatic behavior analysis. Firstly, the files undergo another anti-virus scan on our
servers. If the scan discovers the file to be malicious, then it is designated as malware, the result is sent back to the
local installation of CIS and the local black-list is updated. If the scan does not detect that the file is malicious then
its behavior will be monitored by running it in a virtual environment within Comodo's Instant Malware Analysis
(CIMA) servers and all its activities are recorded. If these behaviors are found to be malicious then the signature of
the executable is automatically added to the antivirus black list. If no malicious behavior is recorded then the file is
placed into 'Unrecognized Files' (for execution within the sandbox) and will be submitted to our technicians for
further checks. The cloud scanning processes take around 15 minutes to complete and report their results back to
CIS.
By uniquely deploying 'sandboxing as security', CIS 2011 offers improved security, fewer pop-ups and greater ease
of use than ever before.
• Always Sandbox
• Sandbox Settings
211
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Antivirus scan
• Defense+ Heuristic check
• Buffer Overflow check
• If the processes above determine that the file is malware then the user is alerted and the file is quarantined
or deleted
• An application can become recognized as 'safe' by CIS (and therefore not sandboxed or scanned in the
cloud) in the following ways:
• Because the user has added the application to the local 'Trusted Files'
• By the user granting the installer elevated privileges (CIS detects if an executable requires
administrative privileges. If it does, it asks the user. If they choose to trust, CIS regards the installer and
all files generated by the installer as safe)
• Additionally, a file is not sandboxed or sent for analysis in the cloud if it is defined as an Installer or
Updater in HIPS policy (See Computer Security Policy for more details)
• These hashes are uploaded to the FLS to check whether the signature of the file is present
on the latest databases. This database contains the latest, global black list of the signatures of all
known malware and a white list of the signatures of the 'safe' files.
• First, our servers check these hashes against the latest available black-list
• If the hash is not on the latest black-list, it's signature is checked against the latest white-list
212
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
If the hash is not on the latest black-list or white-list then it remains as 'unrecognized'. CIS
simultaneously takes two distinct but complementary actions -
(1) It will run the unrecognized file in the local Sandbox so that it cannot access important operating
system files or damage your computer, and
(2) It will leverage Comodo's Cloud Scanning technology to determine whether the file behaves in a
malicious fashion.
• Unrecognized files and applications will be isolated and locally sandboxed. CIS will alert the user
that it is going to run the application in the sandbox.
• Automatically sandboxed applications are run with 'Partially Limited' restrictions. More detail:
Sandboxed applications are allowed to run under a specific set of conditions or privileges. In CIS,
these are known as 'Restriction Levels'. There are four levels – Partially Limited, Limited,
Restricted and Untrusted ('Partially Limited' is the default level for applications that are
automatically placed in the sandbox). In part, sandbox restriction levels are implemented by
enforcing or relaxing the native access rights that Windows can grant to an application. For
example, the 'Limited' setting applies some of the supported operating system restrictions and
grants it access rights similar to if the application was run under a non-admin user account. These
restriction levels are fortified with certain Defense + restrictions that apply to all sandboxed
applications (for example, they cannot key log or screen grab, set windows hooks, access
protected COM interfaces or access non-sandboxed applications in memory. If the user enables
virtualization, then sandboxed apps. can't modify registry keys or modify existing protected files
either).
• Unrecognized files are simultaneously uploaded to Comodo's Instant Malware Analysis servers for
further checks:
• If the scan discovers the file to be malicious (for example, heuristics discover it is a brand
new variant) then it is designated as malware. This result is sent back to the local
installation of CIS and the local and global black-list is updated.
• If the scan does not detect that the file is malicious then it passes onto the the next stage
of inspection – behavior monitoring.
213
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• The behavior analysis system is a cloud based service that is used to help determine
whether a file exhibits malicious behavior. Once submitted to the system, the unknown
executable will be automatically run in a virtual environment and all actions that it takes will
be monitored. For example, processes spawned, files and registry key modifications, host
state changes and network activity will be recorded.
• If these behaviors are found to be malicious then the signature of the executable is
automatically added to the antivirus black list.
• If no malicious behavior is recorded then the file is placed into 'Unrecognized Files' and will
be submitted to our technicians for further checks. Note: Behavior Analysis can identify
malicious files and add to the global black list, but it cannot declare that a file is 'safe'. The
status of 'safe' can only be given to a file after more in-depth checks by our technicians.
• In either case, the result is reported back to your CIS installation in approximately 15
minutes. If the executable was not found to be malicious then it will be run in the sandbox.
It will simultaneously be added to the 'Unrecognized Files' list and uploaded to our
technicians for analysis. If is discovered to be a threat then CIS will show an AV alert to the
user. From this alert the user can opt to quarantine, clean (delete) or disinfect the malicious
file. This new threat will be automatically added to the global black list database and
therefore benefit all CIS users.
• Applications can be placed in the sandbox automatically by CIS or by the Always Sandbox feature. Users
also have the option to run an application in the sandbox on a 'one-off' basis.
• If a safe or installer application is executed by an application running inside the sandbox, the installer also
runs in the sandbox no matter what
• If a user defines an application for sandboxing, this causes any applications (safe or installer) to also be
executed inside the sandbox.
• In addition to the Sandbox restriction level set for an application, Defense + also implements the following
restrictions. A sandboxed application cannot:
214
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The 'View Defense+ Events' area contains logs of all actions taken by the Defense+. A 'Defense+ Event' is
triggered whenever an application makes an attempt to access memory, other programs, the registry etc. that
contravenes your Computer Security Policy.
Column Descriptions
• Application - Indicates which application or process propagated the event. If the application has no icon,
the default system icon for executable files are used.
• Flags - Indicates flags set for the kinds of actions against the event triggered by the file.
• Date/Time - Contains precise details of the date and time of the access attempt.
• Click Refresh to reload and update the displayed list, to include all events generated since the
time you first accessed the 'Defense+ Events' area.
• Click 'More ...' to load the full, Comodo Internet Security Log Viewer module. See below for more
details on this module.
215
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The Log Viewer Module is divided into two sections. The left hand panel displays a set of handy, pre-defined time
Filters for Firewall, Defense+ and Antivirus event log files. The right hand panel displays the actual events that
were logged for the time period you selected in the left hand panel (or the events that correspond to the filtering
criteria you selected).
Clicking on any of the preset filters in the top panel alters the display in the right hand panel in the following
ways:
216
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Note: The type of events logged by the Antivirus, Firewall and Defense+ modules of Comodo Internet Security
differ from each other. This means that the information and the columns displayed in the right hand side panel
change depending on which type of log you have selected in the top and left hand side panel. For more details on
the data shown in the columns, see View Anti-virus Events or View Firewall Events.
Having chosen a preset time filter from the top panel, you can further refine the displayed events according
to specific filters. The type of filters available for Firewall logs differ to those available for Defense+ logs.
The table below provides a summary of available filters and their meanings:
Defense+ Filters
Antivirus Filter Firewall Filters
Date - Displays only the events Date - Displays only the events Date - Displays only the events
logged during the user defined logged during the user defined logged during the user defined
date(s) date(s) date(s)
217
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Location - Displays only the Application - Displays only the Application - Displays only the
events logged from a specific events propagated by a specific events propagated by a specific
location application application
Malware Name - Displays only Action - Displays events Action - Displays events according to
the events logged corresponding according to the response (or the response (or action taken) by
to a specific malware action taken) by the firewall Defense+
Destination IP address -
Displays only the events with a
specific target IP address
218
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Click View > Advanced Filter to open the ‘Advanced Filter’ configuration area.
Or
• Right click on any event and select 'Advanced Filter' option to open the corresponding configuration area.
The ‘Advanced Filter’ configuration area is displayed in the top half of the interface whilst the lower half displays the
Events, Alerts, Tasks or Configuration Changes that the user has selected from the upper left pane. If you wish to
view and filter event logs for other modules then simply click log name in the tree on the upper left hand pane.
The Advanced Log filter displays different fields and options depending on the log type chosen from the left hand
pane (Antivirus, Defense+, Firewall).
This section will deal with Advanced Event Filters related to ‘Antivirus Events’ and will also cover the custom
filtering that can be applied to the ‘Other Logs’ (namely ‘Alerts Displayed’, ‘Tasks’ Launched’ and ‘Configuration
Changes’).
You have 3 categories of filter that you can add. Each of these categories can be further refined by either
selecting or deselecting specific filter parameters or by the user typing a filter string in the field provided.
3. Click the ‘Add’ link when you have chosen the category upon which you wish to filter.
219
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Following are the options available in the 'Add' drop down menu:
i. Application: Selecting the 'Application' option displays a drop-down field and text entry field.
a) Select 'Contains' or 'Does Not Contain' option from the drop-down menu.
b) Enter the text or word that needs to be filtered.
The filtered entries are shown directly underneath.
ii. Flags: Selecting the 'Flags' option displays a drop down menu and a set of specific filter parameters
that can be selected or deselected.
c) Select 'Equal' or 'Not Equal' option from the drop down menu. ‘Not Equal’ will invert your selected
choice.
d) Now select the check-boxes of the specific filter parameters to refine your search. The parameter
available are:
220
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Sandboxed As
• Scanned Online and Found Safe
• Scanned Online and Found Malicious
• Access Memory
• Create Process
• Terminate Process
• Modify Key
• Modify File
• Direct Memory Access
• Direct Disk Access
• Direct Keyboard Access
• Direct Monitor Access
• Load Driver
• Send Message
• Install Hook
• Access COM Interface
• Execute Image
• DNS/RPC Client Access
• Change Defense+ Mode
• Shellcode Injection
• Block File
• Suspicious
• Hook
• Alert Suppressed
The filtered entries are shown directly underneath.
iii. Target: Selecting the 'Target' option displays a drop-down menu and text entry field.
a) Select 'Contains' or 'Does Not Contain' option from the drop-down menu.
b) Enter the text or word that needs to be filtered.
The filtered entries are shown directly underneath.
Note: More than one filters can be added in the ‘Advanced Filter’ pane. After adding one filter type, the option to
select the next filter type automatically appears. You can also remove a filter type by clicking the 'Remove' option
at the end of every filter option.
221
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Date Filter
Click here to know more about Date Filter functionality.
i. File Menu
1. Click 'File' Menu.
3. Click on anyone of 'Firewall Logs', 'Defense+ Logs', 'Antivirus Logs' and 'All', as required.
Firewall Logs - Exports the Firewall log that is currently being displayed in the right hand
•
side panel.
• Defense+ Logs - Exports the Defense+ log that is currently being displayed in the right
hand side panel .
• Antivirus Logs - Exports Antivirus log that is currently being displayed in the right hand
side panel.
• All - Exports ALL logs for ALL TIME for Firewall, Defense+ and Antivirus logs as a single
HTML file.
4. Select the location where the log has to be stored in the 'Save Firewall Log as' window and click
'Save'.
You can export a custom view that you created using the available Filters by right clicking and
selecting 'Export' from the context sensitive menu. Again, you are asked to provide a filename and
save location for the file.
Files added to the Trusted Files area are automatically given Defense+ trusted status. If an executable is unknown
to the Defense+ safe list then, ordinarily, it and all its active components generate Defense+ alerts when they run.
Of course, you could choose the 'Treat this as a Trusted Application' option at the alert but it is often more
convenient to classify entire directories of files as 'Trusted Files'.
By adding executables to this list (including sub folders containing many components) you can reduce the amount
of alerts that Defense+ generates whilst maintaining a higher level of Defense+ security. This is particularly useful
for developers that are creating new applications that, by their nature, are as yet unknown to the Comodo safe list.
Files can be transferred into this module by clicking the 'Move to' button in the 'Unrecognized Files' area.
222
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click the 'Add' button to manually imports files or processes into this area:
The 'Move to...' option allows you to transfer the selected files out of the 'Trusted Files' area into either the
Unrecognized Files or Blocked Files areas of Defense+:
• Select the entry and click 'Remove' button. The file is only removed from the list and not deleted from your
223
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
system.
To remove invalid entries (programs / files that are not present or uninstalled from your
computer) automatically
“Unrecognized Files” is specifically important while Defense+ is in 'Clean PC Mode'. In Clean PC Mode, the files in '
Unrecognized Files' are NOT considered clean. For more information, please check 'Clean PC Mode' on the
Defense+ settings page.
• Assess the pending files to determine whether or not they are to be trusted. If they are trustworthy, they
can be moved to 'Trusted Files' using the 'Move to' button. Similarly, files that are suspicious can be moved
to the 'Blocked Files' area.
• Use the 'Lookup...' feature to see if the master Comodo safe list contains more information.
• Send the file to Comodo for analysis by clicking the 'Submit' button which automatically begins the file
submission process.
• Manually add files to the pending list for look-ups or submitting to Comodo.
• Use the 'Purge' feature to scan the list for files that no longer exist on your system and remove them from
the 'Unrecognized Files' list.
• Delete a selected file from the system by clicking 'Delete File' button
224
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Unrecognized files – Displays a list of files identified as suspicious by Defense+ and the files added to this
area manually.
• Submitted Files - Displays a list of files that were submitted to Comodo for analysis.
225
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The 'Lookup...' button allows you to check for information on the files by consulting the master Comodo safe list,
Select the file(s) you want to check and click the 'Lookup...' button. This contacts Comodo servers to conduct a
search of Comodo's master safe list database to check if any information is available about the file in question. If
no information is available, you are presented with the option to submit them to Comodo for analysis:
226
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
After sending the file to Comodo, our technicians determine whether or not it represents a threat to your security. If
it is found to be trustworthy, it is added to the Comodo safe list. You can also directly submit the files to Comodo
from this area.
227
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
You will see a progress of file submission and on completion, the submission results will be displayed. You can see
the file under Submitted files tab.
You can manually add files to the 'Unrecognized Files' list by clicking the 'Add..' button and either browsing to their
location on your hard drive or selecting a running process:
The 'Move to...' option allows you to transfer the files out of the 'My Pending Files' area and into either the Trusted
228
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Files can also be transferred into this module by clicking the 'Move to...' button in the 'Trusted Files' area.
229
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
apply to applications, Predefined Security Policies, define protected Files and Folders, Registry Keys, COM
interfaces, files to be always sandboxed or blocked, define a list of Trusted Software Vendors etc.
To access the Computer Security Policy area, click Defense+ Tasks > Computer Security Policy.
• Predefined Policies
• Always Sandbox
• Blocked Files
230
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The first column, Application Name, displays a list of the applications on your system for which a security policy
has been deployed. If the application belongs to a file group, then all member applications assume the security
policy of the file group. The second column, Treat as, column displays the name of the security policy assigned to
the application or group of applications in column one.
General Navigation:
• Add... - Allows the user to Add a new Application to the list then create it's policy. See the section 'Creating
or Modifying a Defense+ Security Policy'.
• Edit... - Allows the user to modify the Defense+ security policy of the selected application. See the section
'Creating or Modifying a Defense+ Security Policy'.
Note: You cannot remove individual applications from a file group using this interface - you must use the 'My File
Groups' interface to do this.
• Purge - Runs a system check to verify that all the applications for which policies are listed are actually
installed on the host machine at the path specified. If not, the policy is removed, or 'purged', from the list.
Users can re-order the priority of policies by simply dragging and dropping the application name or file group name
in question. To alter the priority of applications that belong to a file group, you must use the 'My File Groups'
interface.
231
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
(1) Select the application or file group that you wish the policy to apply to.
(1) Select the application or file group that you wish the policy to apply to
If you wish to define a policy for a new application (i.e. one that is not already listed), click the 'Add...' button in the
main Computer Security Policy interface.
This brings up the 'Application System Activity' Control interface shown below.
Because you are defining the Defense+ security settings for a new application, you can notice that the 'Application
Path' box is blank. (If you were editing an existing policy instead, then this interface would show that policy's name
and path.)
You now have 3 methods available to choose the application for which you wish to create a policy - File Groups;
Running Processes and Browse.
1. File Groups - choosing this option allows you to create a Defense+ security policy for a category of pre-set
files or folders. For example, selecting 'Executables' would enable you to create a Defense+ policy for all
files with the extensions .exe .dll .sys .ocx .bat .pif .scr .cpl . Other such categories available include
'Windows System Applications' , 'Windows Updater Applications' , 'Start Up Folders' etc - each of which
232
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
provide a fast and convenient way to apply a generic policy to important files and folders.
To view the file types and folders that are affected by choosing one of these options, you need to visit the
'My File Groups' interface.
The 'My File Groups interface can be accessed either of the following methods:
• Navigate to Defense+ > Computer Security Policy > Protected Files and Folders then click the 'Groups...'
button.
2. Running Processes - as the name suggests, this option allows you to create and deploy a Defense+
policy for any process that is currently running on your PC.
You can choose an individual process (shown above) or the parent process of a set of running processes.
Click 'Select' to confirm your choice.
3. Browse... - this option is the easiest for most users and simply allows you to browse to the location of the
application for which you want to deploy the Defense+ security policy.
233
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
In the example below, we have decided to create a security policy for the Opera web browser.
Having selected the individual application, running process or file group, the next stage is to Configure the
rules for this application's policy.
There are two broad options available for selecting a policy that applies to an application - Use a Pre-defined Policy
or Use a Custom Policy.
1. Use a Predefined Policy - Selecting this option allows the user to quickly deploy a existing security policy
on to the target application. Choose the policy you wish to use from the drop down menu. In the example
below, we have chosen 'Limited Application'. The name of the predefined policy you choose is displayed in
the 'Treat As' column for that application in the Computer Security Policy interface.
Note: Predefined Policies, once chosen, cannot be modified directly from this interface - they can only be
modified and defined using the 'Predefined Policies' interface. If you require the ability to add or modify settings
for an specific application then you are effectively creating a new, custom policy and should choose the more
flexible Use Custom Policy option instead.
234
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Use a Custom Policy- designed for more experienced users, the 'Custom Policy' option enables full
control over the configuration specific security policy and the parameters of each rule within that policy. The
Custom Policy has two main configuration areas - Access Rights and Protection Settings.
In simplistic terms 'Access Rights' determine what the application can do to other processes and objects
whereas 'Protection Settings' determine what the application can have done to it by other processes.
i. Access Rights - The Process Access Rights interface allows you to determine what activities the
applications in your custom policy are allowed to execute. These activities are called 'Access Names'.
Click here to view a list of definitions of the Action Names listed above and the implications of choosing to
Ask, Allow or Block for each setting.
Exceptions to your choice of 'Ask', 'Allow' or 'Block' can be specified for the policy by clicking the 'Modify'
link on the right.:
Select the 'Allowed Applications' or 'Blocked Applications' tab depending on the type of exception you wish
to create.
235
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Clicking 'Add' allows you to choose which applications or file groups you wish this exception to apply to.
(click here for an explanation of available options)
In the example above, the default action for 'Run as an executable' is 'Ask'. This means Defense+
generates an alert asking your permission if 'Opera.exe' tried to run another program. Clicking 'Modify' then
adding 'oemig50.exe' to the 'Allowed Applications' tab creates an exception to this rule. Opera.exe is now
allowed to run 'oemig50 .exe' but an alert is generated if it tries to run any other application.
ii. Protection Settings - Protection Settings determine how protected the application or file group in your
policy is against activities by other processes. These protections are called 'Protection Types'.
236
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Select 'Yes' to enable monitoring and protect the application or file group against the process listed in the
'Protection Type' column. Select 'No' to disable such protection.
Click here to view a list of definitions of the 'Protection Types' listed above and the implications of activating
each setting.
Exceptions to your choice of 'Yes' or 'No' can be specified in the application's policy by clicking the
'Modify...' button on the right.
Note: This section is for advanced and experienced users. If you are a novice user to Comodo Internet Security,
we advise you first read the Computer Security Policy section in this help guide if you have not already done so.
Although each application's security policy could be defined from the ground up by individually configuring its
constituent rules, this practice may prove time consuming if it had to be performed for every single program on your
237
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
system. For this reason, Comodo Internet Security contains a selection of predefined policies according to broad
application categories. Each predefined policy has been specifically designed by Comodo to optimize the security
level of a certain type of application. Users can, of course, modify these predefined policies to suit their
environment and requirements.
• Navigate to: Defense+ Tasks > Computer Security Policy > Predefined Policies. There are four default
security policies listed under the Policy Name column.
2. Select the Policy Name in the list, right-click and choose 'Edit' or
3. Select the Policy Name and click the 'Edit...' button on the right.
From here, you can modify a policy's name and, if desired, make changes to its 'Access Rights' and 'Protection
Settings'. Any changes you make here are automatically rolled out to all applications currently under that policy.
• Click the 'Add...' button, type a name for the policy, click 'Customize' link and then follow the same
238
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
configuration procedure as outlined for creating a custom, application specific policy. Click here to view.
Once created, your policy is available for deployment onto specific application or file groups via the
Computer Security Policy section of Defense+.
To open the 'Always Sandbox' interface, Click Defense+ > Computer Security policy > Always Sandbox.
239
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Click 'Add...' from the 'Always Sandbox' interface. This will open the 'Add a Program to Sandbox' dialog.
2. Click 'Select' and browse to the file or currently running process that you wish to sandbox.
240
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
i. Untrusted - The application is not allowed to access any of the Operating system resources. The
application is not allowed to execute more than 10 processes at a time and is run with very limited
access rights. The restrictions on usage of system memory, operation with virtual file system and
241
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Note: Some of the applications that require user interaction may not work properly under this setting.
ii. Restricted - The application is allowed to access very few Operating system resources. The application
is not allowed to execute more than 10 processes at a time and is run with very limited access rights.
The restrictions on usage of system memory, operation with virtual file system and registry and
execution time defined in Advanced Settings are imposed.
Note: Some of the applications like computer games may not work properly under this setting.
iii. Limited - Only selected Operating System resources can be accessed by the application. The
application is not allowed to execute more than 10 processes at a time and is run with out Administrator
account privileges. The restrictions on usage of system memory, operation with virtual file system and
registry and execution time defined in Advanced Settings are imposed.
iv. Partially Limited - The application is allowed to access all the Operating system files and resources
like clipboard. Modification of protected files/registry keys is not allowed. Privileged operations like
loading drivers or debugging other applications are also not allowed. The restrictions on usage of
system memory, operation with virtual file system and registry and execution time defined in Advanced
Settings are imposed.
5. Choose 'Advanced Settings'
The Advanced Settings tab to configure the restrictions on system resource usage and access to other
files. Available options are:
i. Limit maximum memory consumption - You can define how much of the system memory can be
allocated for the application on execution by selecting this checkbox and entering the memory (in MB)
in the combo box beside it.
ii. Limit the program execution time - You can define how long the program can be allowed to run by
selecting this checkbox and entering the time (in seconds) in the combo box beside it.
iii. Enable file system virtualization -The sandboxed applications are not permitted to modify the files in
your 'real' file system. Enabling file system virtualization instructs the Sandbox to create a virtual file
system in your system. The application added to the sandbox writes any data only into the created
virtual file system, instead of affecting and potentially causing damage to your real file system. If you
disable this option, the application may not function correctly because it is not be to create the entries
that it needs too.
Note for advanced users: The virtual file system is created inside the Sandbox working folder (e.g.
c:\sandbox\<application name>) to execute the application within this file system.
The virtual file system is not created even on enabling this setting here, if file system virtualization is disabled in
Sandbox Settings.
iv. Enable registry virtualization - The sandboxed applications are not permitted to access and modify
the entries in your 'real' Window's Registry hives. Enabling registry virtualization instructs the Sandbox
to create a virtual registry hive in your system. The application added to the Sandbox writes any entries
pertaining to it only into the created registry hive, instead of affecting and potentially causing damage to
your real registry hives. If you disable this option, the application may not function correctly because it is
242
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
From this point onwards the application will be run in the sandbox. If you wish to remove it at a later date, simply
highlight it in the list and click 'Remove'. If you wanted to run an application in the sandbox on a 'one off' basis
instead, then please use 'Run a Program in the Sandbox' instead.
• To edit the restriction settings for an application included in the sandbox, select the application and click
'Edit'.
• To remove an application from the sandbox, select the application and select 'Remove'. Next time you
execute this application it will run outside of the sandbox (presuming it is not then detected as malicious or
automatically sandboxed as per the sandboxing process)
• To remove invalid entries (programs/files that are not present or uninstalled from your computer)
automatically, click 'Purge'.
• Navigate to: Defense+ Tasks > Computer Security Policy > Blocked Files.
243
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Click the 'Add' button. Click here for a description of the choices available when selecting a file.
244
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Alternatively, files can be transferred into the My blocked Files module using the 'Move to' button in the
'Unrecognized Files' and 'Trusted Files' areas.
1. Select the entry and click 'Edit' button. The 'Edit' dialog opens for changing the file path.
• Select the entry and click 'Remove' button. The file is only removed from the list and not deleted from your
system.
To permanently delete the individual file; file group or executable from your system
To remove invalid entries (programs / files that are not present or uninstalled from your
computer) automatically,
245
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
To access My Protected Files, navigate to: Defense+ Tasks > Computer Security Policy > Protected Files and
Folders.
1. Click the 'Add' button. Click here for a description of the choices available when selecting a file.
246
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Exceptions
Users can choose to selectively allow another application (or file group) to modify a protected file by affording the
appropriate Access Right in 'Computer Security Policy' . A simplistic example would be the imaginary file
'Accounts.ods'. You would want the Open Office Calc program to be able to modify this file as you are working on it,
but you would not want it to be accessed by a potential malicious program. You would first add the spreadsheet to
the 'Protected Files and Folders' area by clicking the 'Add' button then 'Browse...' to 'Accounts.ods'. Once added to
'My Protected Files', you would go into 'Computer Security Policy' and create an exception for 'scalc' so that it
alone could modify 'Accounts.ods'.
247
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Another example of where protected files should be given selective access is the Windows system directory at
'c:\windows\system32'. Files in this folder should be off-limits to modification by anything except certain, Trusted,
applications like Windows Updater Applications. In this case, you would add the directory c:\windows\system32\* to
the 'Protected Files and Folders' area (* = all files in this directory). Next go to 'Computer Security Policy', locate the
file group 'Windows Updater Applications' in the list and follow the same process outlined above to create an
exception for that group of executables.
The 'Groups...' button allows the user to access the 'File Groups' interface.
248
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
File groups are handy, predefined groupings of one or more file types. Creating a file group allows you to quickly
deploy a Computer Security Policy across multiple file types and applications.
• Edit the names of an Existing File Group or File by right-clicking and selecting the 'Edit' button.
• Add a file to an existing file group by selecting the File Group name from the list then clicking Add > Select
From >....'
Note: This area is for the creation and modification of file groups only. You are not able to modify the security
policy of any applications or files from here. To do that, you should use the Computer Security Policy interface or
the Predefined Policies Interface.
In order to access Protected Registry Keys interface, navigate to: Defense+ Tasks > Computer Security Policy >
Protected Registry Keys.
249
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
You can import additional registry keys that you wish to protect by clicking the 'Add' button:
The 'Registry Groups' option allows you to batch select and import predefined groups of important registry keys.
Comodo Internet Security provides a default selection of 'Automatic Startup' (keys), 'Comodo Keys', 'Internet
Explorer Keys' and 'Important Keys'.
The 'Registry Entries....' option opens the Windows registry editor within the Comodo Internet Security interface
and allow you to select individual keys.
You can add items manually by browsing the registry tree in the right hand pane. Drag & drop specific registry keys
into the 'Selected Items' pane. To add item manually enter its name in the field and press the '+' button.
250
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The 'Groups...' button allows the user to access the 'My Registry Groups' interface.
251
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Add keys to your new group by selecting the Registry Group name from the list then clicking 'Add > Select
From > Registry Key...'
• Add keys to a pre-existing group by selecting its name from the list then clicking 'Add > Select From >
Registry Key...'
• Edit the names of existing registry key Group or individual key by right-clicking and selecting the 'Edit'.
Comodo Internet Security automatically protects COM interfaces against against modification, corruption and
manipulation by malicious processes. The predefined COM Interface groups can be accessed by clicking the
'Groups...' button.
In order to access 'Protected COM Components' Interface, navigate to: Defense+ Tasks > Computer Security
Policy > Protected COM Interfaces.
252
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
You can import additional COM interfaces that you wish to protect by clicking the 'Add' button.
The 'COM Groups' option allows you to batch select and import predefined COM interfaces.
The 'COM Components....' option allows you to add individual COM components. You can add items manually by
browsing the components in the right hand pane. Drag & drop specific components into the 'Selected Items' pane.
To add manually add a component' enter its name in the field and press the '+' button.
253
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
254
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Add components to your new group by selecting the group name from the list then clicking 'Add > Select
From > COM components...'
• Add keys to a pre-existing COM group by selecting its name from the list then clicking 'Add > Select From
> COM components...'
• Edit the names of existing COM Group or individual component by right-clicking and selecting 'Edit'.
• IF the vendor is on the Trusted Software Vendor List AND the user has enabled 'Trust Applications that are
digitally signed by Trusted Software Vendors' THEN the application will be trusted and allowed to run.
• IF the vendor is not on the Trusted Software Vendor List OR the user has not enabled 'Trust Applications
that are digitally signed by Trusted Software Vendors' THEN the application will be sandboxed. If the
application in question is an installer then CIS will generate an elevated privilege alert.
Software publishers may be interested to know that they can have their signatures added, free of charge, to the
‘master’ Trusted Software Vendor List that ships to all users with CIS. Details about this can be found at the foot of
this page.
The 'Trusted Software Vendors' area can be opened by navigating to Defense+ Tasks > Computer Security Policy
> Trusted Software Vendors.
255
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Software Vendors – click here to find out about getting your software added to the list
Background
Many software vendors digitally sign their software with a code signing certificate. This practice helps end-users to
verify:
i. Content Source: The software they are downloading and are about to install really comes from the
publisher that signed it.
ii. Content Integrity: That the software they are downloading and are about to install has not be
modified or corrupted since it was signed.
In short, users benefit if software is digitally signed because they know who published the software and that the
code hasn't been tampered with - that are are downloading and installing the genuine software.
The 'Vendors' that digitally sign the software to attest to it's probity are the software publishers. These are the
company names you see listed in the first column in the graphic above.
However, companies can't just 'sign' their own software and expect it to be trusted. This is why each code signing
certificate is counter-signed by an organization called a 'Trusted Certificate Authority'. 'Comodo CA Limited' and
256
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
'Verisign' are two examples of a Trusted CA's and are authorized to counter-sign 3rd party software. This counter-
signature is critical to the trust process and a Trusted CA only counter-signs a vendor's certificate after it has
conducted detailed checks that the vendor is a legitimate company.
If a file is signed by a Trusted Software Vendor and the user has enabled 'Trust Applications that are digitally
signed by Trusted Software Vendors' then it will be automatically trusted by Comodo Internet Security (if you would
like to read more about code signing certificates, see http://www.instantssl.com/code-signing/).
One way of telling whether an executable file has been digitally signed is checking the properties of the .exe file in
question. For example, the main program executable for Comodo Internet Security is called 'cfp.exe' and has been
digitally signed.
• Click the tab 'Digital Signatures (if there is no such tab then the software has not been signed).
This displays the name of the CA that signed the software as shown below:
Click the 'Details' button to view digital signature information. Click 'View Certificate' to inspect the actual code
signing certificate. (see below)
257
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
It should be noted that the example above is a special case in that Comodo, as creator of 'cfp.exe', is both the
signer of the software and, as a trusted CA, it is also the counter-signer (see the 'Countersignatures' box). In the
vast majority of cases, the signer or the certificate (the vendor) and the counter-signer (the Trusted CA) are
different. See this example for more details.
• By reading the vendor's signature from an executable file on your local drive
Click the add button on the right hand side and select 'Read from a signed executable...'. Browse to the location of
the executable your local drive. In the example below, we are adding the executable 'YahooMessenger.exe'.
258
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
After clicking 'Open', Comodo Internet Security checks that the .exe file is signed by the vendor and counter-signed
by a Trusted CA. If so, the vendor (software signer) is added to the Trusted Vendor list (TVL):
In the example above, Comodo Internet Security was able to verify and trust the vendor signature on
259
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
YahooMessenger.exe because it had been counter-signed by the trusted CA 'Verisign'. The software signer 'Yahoo!
Inc' is now a Trusted Software Vendor and is added to the list. All future software that is signed by the vendor
'Yahoo! Inc' is automatically added to the Comodo Trusted Vendor list UNLESS you change this setting in
Defense+ Settings > General Settings.
Comodo Internet Security also allows you to add a trusted vendor by selecting from processes that are currently
running on your PC. To do this, click the 'Add...' button and select 'Read from a running process...':
Select the signed executable that you want to trust and click the 'Select' button. Comodo Internet Security performs
the same certificate check as described above.
If Comodo Internet Security cannot verify that the software certificate is signed by a Trusted CA then it does not
add the software vendor to the list of 'My Trusted Vendors' . In this case, you can see the following error message.
Note: The 'My Trusted Software Vendors' list displays two types of software vendors:
• User defined trusted software vendors - As the name suggests, these are added by the user via one of
260
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
the two methods outlined earlier. These vendors can be removed by the user by selecting and clicking the
'Remove' button.
• Comodo defined trusted software vendors - These are the vendors that Comodo, in it's capacity as a
Trusted CA, has independently validated as a legitimate company. Comodo certified vendors are hard
coded into CIS and cannot be removed by the user.
The vendors have to apply for inclusion in the Trusted Vendors list through the sign-up form at
http://internetsecurity.comodo.com/trustedvendor/signup.php and make sure that the software can be downloaded
by our technicians. Our technicians check whether:
• The software is signed with a valid code signing certificate from a trusted CA;
• The software does not contain any threats that harm a user's PC;
before adding it to the default Trusted Vendor list of the next release of CIS.
Column Descriptions
• Application - Displays the names of the applications which are currently running on your PC.
• User Name - The name of the user that started the process
• Sandbox Level – Displays the level of sandox setting selected for the program
261
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Show full path: Displays the location on your location of the the executable in addition to it's name.
• Show Sandboxed Only: Displays the details of the sandboxed programs only.
• Terminate & Block: Shuts down the currently selected process and places the executable into the
Blocked Files section of Defense+.
• Add to Trusted Files: The selected program is added to Trusted Files list.
• Online Lookup: The selected program is compared with the Comodo database of programs and results
declared whether it is safe or not.
262
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Click the 'Run a Program in the Sandbox' link in the Defense+ interface. The following dialog will open:
3. Browse to the application and click 'Open'. In the example above, opera.exe is chosen.
263
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
4. Click 'Run As' and select the restriction level you want to apply to the program from the menu.
• Untrusted - The application is not allowed to access any of the Operating system resources. The
application is not allowed to execute more than 10 processes at a time and is run with very limited access
rights.
Note: Some of the applications that require user interaction may not work properly under this setting.
• Restricted - The application is allowed to access very few operating system resources. The application is
not allowed to execute more than 10 processes at a time and is run with very limited access rights.
Note: Some of the applications like computer games may not work properly under this setting.
• Limited - Only selected operating system resources can be accessed by the application. The application is
not allowed to execute more than 10 processes at a time and is run with out Administrator account
privileges.
• Partially Limited - The application is allowed to access all the Operating system files and resources like
clipboard. Modification of protected files/registry keys is not allowed. Privileged operations like loading
drivers or debugging other applications are also not allowed.
The program is executed within the sandbox with the access restriction level that you selected. It will run in the
Sandbox on this occasion only.
Note for beginners: This page often refers to 'executables' (or 'executable files'). An 'executable' is a file that can
instruct your computer to perform a task or function. Every program, application and device you run on your
computer requires an executable file of some kind to start it. The most recognizable type of executable file is the
'.exe' file. (e.g., when you start Microsoft Word, the executable file 'winword.exe' instructs your computer to start
and run the Word application). Other types of executable files include those with extensions .cpl .dll, .drv, .inf,
.ocx, .pf, .scr, .sys.
Unfortunately, not all executables can be trusted. Some executables, broadly categorized as malware, can
instruct your computer to delete valuable data; steal your identity; corrupt system files; give control of your PC to a
hacker and much more. You may also have heard these referred to as Trojans, scripts and worms. Worse still,
264
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
these programs are explicitly designed to run without you knowing about them. Defense+ is designed to make
sure you DO know about them by blocking all unknown executables and alerting you whenever they try to run.
The Defense+ Settings area allows you to quickly configure the security level and behavior of Defense+ during
operation. This settings area can be accessed in the 'Defense+' interface and, more immediately, by clicking on
security level setting that is displayed (e.g. Safe Mode) in the Summary Screen (shown below).
Comodo Internet Security allows you to customize the behavior of Defense+ by adjusting a Security Level slider to
switch between preset security levels.
The choices available are: Paranoid Mode, Safe Mode, Clean PC Mode, Training Mode and Disabled. The
setting you choose here are also to be displayed on the CIS summary screen.
265
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Paranoid Mode: This is the highest security level setting and means that Defense+ monitors and controls
all executable files apart from those that you have deemed safe. Comodo Internet Security does not
attempt to learn the behavior of any applications - even those applications on the Comodo safe list and
only uses your configuration settings to filter critical system activity. Similarly, the Comodo Internet Security
does automatically create 'Allow' rules for any executables - although you still have the option to treat an
application as 'Trusted' at the Defense+ alert. Choosing this option generates the most amount of
Defense+ alerts and is recommended for advanced users that require complete awareness of activity on
their system.
• Safe Mode: While monitoring critical system activity, Defense+ automatically learns the activity of
executables and applications certified as 'Safe' by Comodo. It also automatically creates 'Allow' rules these
activities, if the checkbox 'Create rules for safe applications' is selected. For non-certified, unknown,
applications, you will receive an alert whenever that application attempts to run. Should you choose, you
can add that new application to the safe list by choosing 'Treat this application as a Trusted Application' at
the alert. This instructs the Defense+ not to generate an alert the next time it runs. If your machine is not
new or known to be free of malware and other threats as in 'Clean PC Mode' then 'Safe Mode' is
recommended setting for most users - combining the highest levels of security with an easy-to-manage
number of Defense+ alerts.
• Clean PC Mode: From the time you set the slider to 'Clean PC Mode', Defense+ learns the activities of the
applications currently installed on the computer while all new executables introduced to the system are
monitored and controlled. This patent-pending mode of operation is the recommended option on a new
266
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
computer or one that the user knows to be clean of malware and other threats. From this point onwards
Defense+ alerts the user whenever a new, unrecognized application is being installed. In this mode, the
files in 'My Pending Files' are excluded from being considered as clean and are monitored and controlled.
• Training Mode: Defense+ monitors and learn the activity of any and all executables and create automatic
'Allow' rules until the security level is adjusted. You do not receive any Defense+ alerts in 'Training Mode'. If
you choose the 'Training Mode' setting, we advise that you are 100% sure that all applications and
executables installed on your computer are safe to run.
Tip: This mode can be used as the “Gaming Mode”. It is handy to use this setting temporarily when you are
running an (unknown but trusted) application or Games for the first time. This suppresses all Defense+ alerts
while Comodo Internet Security learns the components of the application that need to run on your machine and
automatically create 'Allow' rules for them. Afterwards, you can switch back to 'Train with Safe Mode' mode).
• Disabled: Disables Defense+ protection. All executables and applications are allowed to run irrespective of
your configuration settings. Comodo strongly advise against this setting unless you are confident that you
have an alternative intrusion defense system installed on your computer.
Checkbox Options
• Keep an alert on screen for maximum (n) seconds - Determines how long Comodo Internet Security
shows a Defense+ alert without any user intervention. By default, the timeout is set at 120 seconds. You
may adjust this setting to your own preference.
• Trust applications digitally signed by Trusted Software Vendors - Leaving this option checked means
software which is signed by a Trusted Certificate Authority is automatically treated as safe. Comodo
recommend leaving this option enabled. For more details, see Trusted Software Vendors.
• Block all unknown requests if the application is closed - Checking this box blocks all unknown
requests (those not included in your Computer Security Policy) if Comodo Internet Security is not
running/has been shut down.
• Deactivate Defense+ permanently (Requires a system restart) - Shuts down the Defense+ Host
Intrusion element of Comodo Internet Security PERMANENTLY. The firewall and antivirus are not affected
and continues to protect your computer even if you deactivate Defense+. Comodo does not recommend
users close Defense+ unless they are sure they have alternative Intrusion Prevention Systems installed.
• Create rules for safe applications - Automatically creates rules for safe applications in Computer Security
Policy.
• The application is from a vendor included in the Trusted Software Vendors list.
• The application is included in the extensive and constantly updated Comodo safelist.
By default, CIS does not automatically create ‘allow’ rules for safe applications. This helps saving the resource
usage, simplifies the rules interface by reducing the number of 'Allowed' rules in it, reduces the number of pop-up
alerts and is beneficial to beginners who find difficulties in setting up the rules.
Enabling this checkbox instructs CIS to begin learning the behavior of safe applications so that it can automatically
267
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
generate the 'Allow' rules. These rules are listed in the Computer Security Policy interface. The Advanced users
can edit / modify the rules as they wish.
Background Note: Prior to version 4.x , CIS would automatically add an allow rule for ‘safe’ files to the rules
interface. This allowed advanced users to have granular control over rules but could also lead to a cluttered rules
interface. The constant addition of these ‘allow’ rules and the corresponding requirement to learn the behavior of
applications that are already considered ‘safe’ also took a toll on system resources. In version 4.x, ‘allow’ rules for
applications considered ‘safe’ are not automatically created – simplifying the rules interface and cutting resource
overhead with no loss in security. Advanced users can re-enable this setting if they require the ability to edit rules
for safe applications (or, informally, if they preferred the way rules were created in CIS version 3.x)
Comodo Internet Security calculates the hash of an executable at the point it attempts to load into memory. It then
compares this hash with the list of known / recognized applications that are on the Comodo safe list. If the hash
matches the one on record for the executable, then the application is safe. If no matching hash is found on the
safelist, then the executable is 'unrecognized' and you receive an alert.
This area allows you to quickly determine how proactive the monitor should be and which types of files it should
check.
• Enabled - This setting instructs Defense+ to intercept the all the files before they are loaded into memory
and also Intercepts prefetching/caching attempts for the executable files.
268
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Check Boxes
Treat unrecognized files as – This has five options and the unrecognized files will be run as per the option
selected.
• Partially Limited - The application is allowed to access all the Operating system files and resources like
clipboard. Modification of protected files/registry keys is not allowed. Privileged operations like loading
drivers or debugging other applications are also not allowed.
• Limited - Only selected operating system resources can be accessed by the application. The application is
not allowed to execute more than 10 processes at a time and is run with out Administrator account
privileges.
• Restricted - The application is allowed to access very few operating system resources. The application is
not allowed to execute more than 10 processes at a time and is run with very limited access rights.
Note: Some of the applications like computer games may not work properly under this setting.
• Untrusted - The application is not allowed to access any of the Operating system resources. The
application is not allowed to execute more than 10 processes at a time and is run with very limited access
rights.
269
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Note: Some of the applications that require user interaction may not work properly under this setting.
Do heuristic command-line analysis for certain applications - Selecting this option instructs Comodo Internet
Security to perform heuristic analysis of programs that are capable of executing code such as visual basic scripts
and java applications. Example programs that are affected by enabling this option are wscript.exe, cmd.exe,
java.exe and javaw.exe. For example, the program wscipt.exe can be made to execute visual basic scripts (.vbs file
extension) via a command similar to “wscipt.exe c:\tests\test.vbs”. If this option is selected, CIS detects
c:\tests\test.vbs from the command-line and applies all security checks based on this file. If test.vbs attempts to
connect to the internet, for example, the alert will state ‘test.vbs’ is attempting to connect to the internet.
If this option is disabled, the alert would only state ‘‘wscript.exe’ is trying to connect to the Internet’.
Background note: ‘Heuristics’ describes the method of analyzing a file to ascertain whether it contains codes
typical of a virus. Heuristics is about detecting virus-like behavior or attributes rather than looking for a precise
virus signature that matches a signature on the virus blacklist. This helps to identify previously unknown (new)
viruses.
Perform cloud based behavior analysis of unrecognized files – When checked, any file that is marked as
unrecognized and is sent to the Comodo Instant Malware Analysis (CIMA) server for behavior analysis. Each file is
executed in a virtual environment on Comodo servers and tested to determine whether it contains any malicious
code. The results will be sent back to your computer in around 15 minutes. Comodo recommends users leave this
setting enabled.
270
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
More details. The behavior analysis system is a cloud based service that is used to help determine whether an
unknown file is safe or malicious. Once submitted to the system, the unknown executable will be automatically run
in a virtual environment and all activities, host state changes and network activity will be recorded. The list of
behaviors recorded during this analysis can include information about processes spawned, files and registry keys
modified, network activity, and other changes. If these behaviors are found to be malicious then the signature of the
executable is automatically added to the antivirus black list. If no malicious behavior is recorded then the file is
placed into 'Unrecognized Files' (for execution within the sandbox) and will be submitted to our technicians for
further checks. The behavior analysis system takes around 15 minutes to report its results back to CIS. If the
executable is deemed a threat then it will be automatically quarantined or deleted. This threat report is also used to
update the global black list databases and therefore benefit all CIS users.
Automatically scan unrecognized files in the cloud – Selecting this option will automatically submit
unrecognized files to our File Lookup Server to check whether or not they are on the master Comodo white list or
black-list (White list = files that are known to be safe. Black list = files that are known to be malware) and the files
are rated accordingly. The important features of the cloud based scanning are:
• Cloud based Whitelisting: Safe files and trusted vendors and trusted publishers can be easily identified;
• Cloud based Anti virus: Malicious files can be detected even if the users do not have an up-to-date local
antivirus database or a local antivirus database at all;
• Cloud Based Behaviour Analysis: Zero-day malware can be instantly detected by Comodo’s cloud based
behavior analysis system, CIMA.
The cloud scanning, complemented by automatic sandboxing and application isolation technologies, is very
extremely fast and powerful in preventing PC infection even without a traditional antivirus signature database while
keeping the user interaction at minimal levels.
Detect Shellcode injections (i.e. Buffer overflow protection) - Enabling this setting turns-on the Buffer over flow
protection.
A buffer overflow is an anomalous condition where a process/executable attempts to store data beyond the
boundaries of a fixed-length buffer. The result is that the extra data overwrites adjacent memory locations. The
overwritten data may include other buffers, variables and program flow data and may cause a process to crash or
produce incorrect results. They can be triggered by inputs specifically designed to execute malicious code or to
make the program operate in an unintended way. As such, buffer overflows cause many software vulnerabilities
and form the basis of many exploits.
Turning-on buffer overflow protection instructs the Comodo Internet Security to raise pop-up alerts in every event of
a possible buffer overflow attack. You can allow or deny the requested activity raised by the process under
execution depending on the reliability of the software and its vendor. Click here for more details on the alerts.
To exclude some of the file types from being monitored under Detect Shellcode injections.
271
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Click 'Add' to include file groups or processes to the Exclusions list. Click here for an outline of the options
available when adding file types.
4. Click 'Purge' to remove invalid entries (programs that are not present or uninstalled from your computer)
automatically.
272
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Check Boxes
Enable file system virtualization - The sandboxed applications are not permitted to modify the files in your 'real'
file system. Enabling file system virtualization instructs the Sandbox to create a virtual file system in your system.
The sandboxed applications write any data only into the created virtual file system, instead of affecting and
potentially causing damage to your real file system. If you disable this option, the sandboxed applications may not
function correctly because they are not able to create the entries that they need too.
Note for advanced users: The virtual file system is created inside the Sandbox working folder (e.g. c:\sandbox\)
to execute the applications within this file system.
If you disable this option here, the virtual file system is not created even if you have enabled file system
virtualization for individual applications within the Sandbox.
273
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Enable registry virtualization -The sandboxed applications are not permitted to access and modify the entries in
your 'real' Window's Registry hives. Enabling registry virtualization instructs the Sandbox to create a virtual registry
hive in your system. The sandboxed applications write any entries pertaining to them only into the created registry
hive, instead of affecting and potentially causing damage to your real registry hives. If you disable this option, the
sandboxed applications may not function correctly because they are not able to create the entries that they need
too.
The table below explains the precedence of the file system virtualization and registry virtualization settings made
through this interface and those through Computer Security Policy > Always Sandbox > Add > Always Sandbox >
Advanced Settings.
Yes No No
No Yes No
No No No
Automatically detect the installers / updaters and run them outside the Sandbox - On execution of an
Installer or an Updater, the application is run outside the Sandbox. Select this option only if you are going to run
installers / updaters from trusted vendors.
Automatically trust the files from the trusted installers - Files that are generated by trusted installers are also
trusted. This means that they will not be sandboxed.
Show notifications for automatically sandboxed processes - By default, CIS will display an alert whenever it
runs an unknown application in the sandbox. Use this control to enable or disable these alerts.
274
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Additional information:
• See 'Sandbox Alerts' for a explanation of the options available at a Sandbox alert
• See 'Unknown Files: The Sand-boxing and Scanning Processes' to understand the decision making
process behind why CIS chooses to sandbox certain applications.
• If you disable monitoring of an activity, entity or object using this interface it completely switches off
monitoring of that activity on a global basis - effectively creating a universal 'Allow' rule for that activity .
This 'Allow' setting over-rules any policy specific 'Block' or 'Ask' setting for that activity that you may have
selected using the 'Access Rights' and 'Protection Settings' interface.
Activities To Monitor:
• Interprocess Memory Access - Malware programs use memory space modification to inject malicious
code for numerous types of attacks, including recording your keyboard strokes; modifying the behavior of
275
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
the invaded application; stealing confidential data by sending confidential information from one process to
another process etc. One of the most serious aspects of memory-space breaches is the ability of the
offending malware to take the identity of the invaded process, or 'impersonate' the application under attack.
This makes life harder for traditional virus scanning software and intrusion-detection systems. Leave this
box checked and Defense+ alerts you when an application attempts to modify the memory space allocated
to another application.
• Device Driver Installations - Device drivers are small programs that allow applications and/or operating
systems to interact with a hardware device on your computer. Hardware devices include your disk drives,
graphics card, wireless and LAN network cards, CPU, mouse, USB devices, monitor, DVD player etc..
Even the installation of a perfectly well-intentioned device driver can lead to system instability if it conflicts
with other drivers on your system. The installation of a malicious driver could, obviously, cause irreparable
damage to your computer or even pass control of that device to a hacker. Leaving this box checked means
Defense+ alerts you every time a device driver is installed on your machine by an untrusted application.
• Processes' Terminations - A process is a running instance of a program. (for example, the Comodo
Internet Security process is called 'cfp.exe'. Press 'Ctrl+Alt+Delete' and click on 'Processes' to see the full
list that are running on your system). Terminating a process, obviously, terminates the program. Viruses
and Trojan horses often try to shut down the processes of any security software you have been running in
order to bypass it. With this setting enabled, Defense+ monitors and alerts you to all attempts by an
untrusted application to close down another application.
• Windows Messages - This setting means Comodo Internet Security monitors and detects if one
application attempts to send special Windows Messages to modify the behavior of another application (e.g.
by using the WM_PASTE command).
• DNS Client Service - This setting alerts you if an application attempts to access the 'Windows DNS
service' - possibly in order to launch a DNS recursion attack. A DNS recursion attack is a type of
Distributed Denial of Service attack whereby an malicious entity sends several thousand spoofed requests
to a DNS server. The requests are spoofed in that they appear to come from the target or 'victim' server but
in fact come from different sources - often a network of 'zombie' pc's which are sending out these requests
without the owners knowledge. The DNS servers are tricked into sending all their replies to the victim
server - overwhelming it with requests and causing it to crash. Leaving this setting enabled prevents
malware from using the DNS Client Service to launch such an attack.
Background Note: DNS stands for Domain Name System. It is the part of the Internet infrastructure that
translates a familiar domain name, such as 'example.com' to an IP address like 123.456.789.04. This is essential
because the Internet routes messages to their destinations on the basis of this destination IP address, not the
domain name. Whenever you type a domain name, your Internet browser contacts a DNS server and makes a
276
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
'DNS Query'. In simplistic terms, this query is 'What is the IP address of example.com?'. Once the IP address has
been located, the DNS server replies to your computer, telling it to connect to the IP in question.
• Protected COM Interfaces enables monitoring of COM interfaces you specified here.
• Protected Registry Keys enables monitoring of Registry keys you specified here.
• Protected Files/Folders enables monitoring of files and folders you specified here.
Determines whether or not Comodo Internet Security should monitor access to system critical objects on your
computer.. Using direct access methods, malicious applications can obtain data from a storage devices, modify or
infect other executable software, record keystrokes and more. Comodo advises the average user to leave these
settings enabled:
• Physical Memory: Monitors your computer's memory for direct access by an applications and processes.
Malicious programs attempt to access physical memory to run a wide range of exploits - the most famous
being the 'Buffer Overflow' exploit. Buffer overruns occur when an interface designed to store a certain
amount of data at a specific address in memory allows a malicious process to supply too much data to that
address., This overwrites its internal structures and can be used by malware to force the system to execute
its code.
• Computer Monitor: Comodo Internet Security raises an alert every time a process tries to directly access
your computer monitor. Although legitimate applications sometimes require this access, there is also an
emerging category of spyware-programs that use such access to monitor users' activities. (for example, to
take screen shots of your current desktop; to record your browsing activities etc)
• Disks: Monitors your local disk drives for direct access by running processes. This helps guard against
malicious software that need this access to, for example, obtain data stored on the drives, destroy files on
a hard disk, format the drive or corrupt the file system by writing junk data.
• Keyboard: Monitors your keyboard for access attempts. Malicious software, known as 'key loggers', can
record every stroke you make on your keyboard and can be used to steal your passwords, credit card
numbers and other personal data. With this setting checked, Comodo Internet Security alerts you every
time an application attempts to establish direct access to your keyboard.
5 More Options-Introduction
277
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
It can be accessed at all times by clicking on the 'More' link from the navigation panel.
Click the links below to see detailed explanations of each area in this section.
• Preferences: Allows the user to configure general Comodo Internet Security settings (password protection,
update options, language, theme and so on.)
• Manage My Configurations: Allows the user to manage, import and export their Comodo Internet Security
configuration profile.
278
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
5.1 Preferences
The Preferences menu in More section allows you to configure various options related to the operation of Comodo
Internet Security.
• General
• Language
• Parental Control
• Themes
• Connection
• Update
279
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Automatically Check for the program updates - This option determines whether or not Comodo Internet
Security should automatically contact Comodo servers for updates. With this option selected, Comodo
Internet Security automatically checks for updates every 24 hours AND every time you start your computer.
If updates are found, they are automatically downloaded and installed. We recommend that users leave
this setting enabled to maintain the highest levels of protection. Users who choose to disable automatic
updates can download them manually by clicking 'Check for Updates' in the 'More...' section.
• Show the balloon messages - These are the notifications that appear in the bottom right hand corner of
your screen - just above the tray icons. Usually these messages like ' Comodo Firewall is learning ' or
'Defense+ is learning ' and are generated when these modules are learning the activity of previously
unknown components of trusted applications. Clear this check box if you do not want to see these
messages.
• Show the traffic animation in tray - By default, the Comodo Internet Security's 'Shield' tray icon displays
a small animation whenever traffic moves to or from your computer.
If the traffic is outbound, you can see green arrows moving upwards on the right hand side of the shield.
Similarly, for inbound traffic you can see red arrows moving down the left hand side. This provides a very
useful indicator of the real-time movement of data in and out of your computer. Clear this check box If you
would rather not see this animation.
• Automatically Detect New Private Networks - Selecting this check box means that the firewall
automatically detects any new networks that the computer is connected to. Comodo recommends users to
leave this option at its default, enabled setting.
• Enable Comodo Message Center - Comodo Internet Security displays Comodo Message Center window
periodically if this option is selected.
The Comodo Message Center window contains information about Security Alerts and News related to
Comodo Internet Security and latest critical security updates. Clicking the 'Learn More' link takes you to the
Comodo Forums website at http://forums.comodo.com. Registration is free and you'll benefit from the
expert contributions of developers and fellow users alike.
280
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
In order for your choice to take effect, you must restart the Comodo Internet Security application. You can do this
by either:
• Closing the application by right clicking on the shield tray icon and selecting 'Exit 'and then restarting it by
navigating through Start > Programs > COMODO > Comodo Internet Security or by double-clicking the
desktop icon. The application is in your choice of language the next time you restart the application.
• Enable password protection for settings - Selecting this option activates password protection for all
important configuration sections and wizards within the interface. If you choose this option, you must first
specify and confirm a password by clicking the 'Change Password... ' button. You are asked for this
password every time you try to access important configuration areas (for example, all sections in the
Antivirus Tasks, Firewall Tasks and Defense+ Tasks areas require this password before allowing you to
view or modify their settings)
281
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
This setting is of particular value to parents, network administrators and administrators of shared
computers to prevent other users from modifying critical settings and exposing the machine to threats.
• Suppress Antivirus alerts when password protection is enabled - If selected, no Antivirus Alerts are
displayed when password protection is enabled. Parents and network admins may want to enable this
setting if they do not want users to be made aware when an Antivirus alert has been triggered. For
example, a virus program may be attempting to copy itself and infect user's computer without permission or
knowledge of the user. Usually, the Antivirus would generate an alert and ask the user how to proceed. If
that user is a child or an inexperienced user then they may unwittingly click 'allow' just to 'get rid' of the
alert and/or gain access to the website in question - thus exposing the machine to attack. Selecting this
option blocks the activity of the virus but does not generate an alert.
• Suppress Firewall alerts when password protection is enabled - If selected, no Firewall Alerts are
displayed when password protection is enabled. Parents and network admins may want to enable this
setting if they do not want users to be made aware when a Firewall alert has been triggered. For example,
a trojan horse program may be attempting to download itself or transmit private information to a third party.
Usually, the firewall would generate an alert and ask the user how to proceed. If that user is a child or an
inexperienced user then they may unwittingly click 'allow' just to 'get rid' of the alert and/or gain access to
the website in question - thus exposing the machine to attack. Selecting this option blocks the connection
but does not generate an alert.
• Suppress Defense+ alerts when password protection is enabled - If selected, no Defense+ Alerts are
displayed when password protection is enabled. Parents and network admins may want to enable this
setting if they do not want users to be made aware when a Defense+ alert has been triggered. For
example, a malware program may be attempting to modify, terminate or delete a critical registry key in
order to launch an attack on your machine. Usually, the Defense+ intrusion detection system would
generate an alert and ask the user how to proceed. If that user is a child or an inexperienced user then
they may unwittingly click 'allow' just to 'get rid' of the alert - thus exposing the machine to attack. Selecting
this option blocks the activity of the suspected malware but does not generate an alert.
5.1.4 Themes
The Themes tab allows you to customize the look and feel of Comodo Internet Security according to your
preferences. Use the drop-down menu to switch between installed themes.
282
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Select 'Use http proxy' if you want Comodo Internet Security to use the Proxy Server. Enter the proxy
server IP address or name in the 'Server' text box and enter the port number in the 'Port' text box.
• If your Proxy Server needs authentication, Select 'Proxy server requires authorization'. Type your Login
ID in the 'Login' text box and enter the password in the 'Password' text box.
• If you want Comodo Internet Security to acquire the proxy settings from your Internet Explorer, just click
'Import proxy settings from IE' link.
283
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• If you want to download the updates always from the Comodo servers, you can leave the setting as it is.
• If you are connected to a local network and the CIS program updates are available at an HTTP Server or at
any of the other computers in your network running Comodo Offline Updater, you can add the computers
as hosts in this area.
Note:: Comodo Offline Updater allows users to configure a local HTTP server to download and provision updates
to networked machines. Advanced users can download the utility from http://enterprise.comodo.com/security-
solutions/endpoint-security/endpoint-security-manager/free-trial.php
• To add a host click 'Add' and enter the url or IP address of the host in the next row that appears.
• Select the host by using the Move Up and Move Down buttons.
CIS will automatically check the host specified here and download the updates from the host even
when you are offline.
284
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click the links below to find out more details on each configuration:
Important Note: Any changes you have made to the Comodo Internet Security settings since installation are
recorded in this, active profile.
The detailed descriptions of the default security levels provided by the three preset choices are given below:
COMODO - Internet Security - This configuration is activated by default, when both Antivirus and Firewall
components are installed, i.e. the complete installation. Firewall is always set to Safe mode. But according to the
malware scanning results performed during the setup process, if no malware is found, Defense+ is set to Clean PC
mode. Otherwise, the default is Safe mode. In this mode,
If you wish to switch to Internet Security option, you can select the option using My Configurations interface.
COMODO - Proactive Security - This configuration turns CIS into the ultimate protection machine. All possible
protections are activated and all critical COM interfaces and files are protected. During the setup, if only Comodo
Firewall installation option is selected, the next screen allows users to select this configuration as default CIS
configuration. If selected, Firewall is always set to Safe mode. But according to the malware scanning results
performed during the setup process, if no malware is found, Defense+ is set to Clean PC mode. Otherwise, the
default is Safe mode.
If you wish to switch to Proactive Security option, you can select the option using My Configurations interface.
COMODO - Firewall Security - This configuration is activated when the user chooses to install Firewall only and
selects optimum protection settings for Defense+ . Firewall is always set to Safe mode. But according to the
malware scanning results performed during the setup process, if no malware is found, Defense+ is set to Clean PC
mode. Otherwise, the default is Safe mode.
• Image Execution Control checks only applications that are not started manually by the user.
285
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Defense+ is tuned to prevent infection of the system and detect Internet access request leaks even if it is
infected.
If you wish to switch to Firewall Security option, you can select the option using My Configurations interface.
If this is the first time you have accessed this interface you can see the three preset choices:
286
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Type a file name for the profile (e.g. 'My CIS Profile') and save to the location of your choice.
Importing a configuration profile allows you to store any profile within Comodo Internet Security. Any profiles you
import do not become active until you select them for use.
To import a profile
287
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
3. In the 'Import As' dialog that appears, assign a name for the profile you wish to import and click 'OK'.
288
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Once imported, the configuration profile is available for deployment by selecting it.
289
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Select the profile and click 'Remove' button. A confirmation dialog appears.
2. Click 'Yes' if you are sure to delete. The selected profile is removed from the list and a confirmation dialog
appears.
290
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
5.3 Diagnostics
Comodo Internet Security has it's own integrity checker. This checker scans your system to make sure that the
application is installed correctly. It checks your computer's:
• File System - To check that all of Comodo's system files are present and have been correctly installed.
• Registry - To check that all of Comodo's registry keys are present and in the correctly installed.
• Checks for the presence of software that is known to have compatibility issues with Comodo Internet
Security.
The results of the scan are shown in the following pop-up window. If your installation does not have any
errors the following dialog is displayed.
If the diagnostics utility has found some errors in the installation, the following dialog is displayed.
291
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click 'Yes'. The diagnostics utility automatically fixes the problems and prompts you to restart the computer.
• Click 'Start'.
292
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
The 'Update Details' link will lead you to the web page that provides release notes for the latest version of the
application.
293
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Note: If you want to download and install the updates later, click the 'Cancel' button.
After the installation process is completed, Click 'OK'. You are then asked to restart the system.
• Click 'Yes' to reboot the system now or 'No' to reboot at a later time.
• Click the Browse Support Forums link to be taken straight to the website at http://forums.comodo.com.
Registration is free and you'll benefit from the expert contributions of developers and fellow users alike.
294
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
5.6 Help
Clicking the Help link in the More section opens the online help guide hosted at http://help.comodo.com/. Each
area has its own dedicated page containing detailed descriptions of the application's functionality.
You can also print or download the help guide in pdf format from the webpage.
5.7 About
Click the 'About' option in the 'More' Screen to view the 'About' information dialog.
295
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
You can view information about the Version Number of Comodo Internet Security that is installed on your computer
and the unique serial number of your installation. The serial number is used to identify your installation and is
necessary for support purposes.
6 Live PC Support
Comodo Internet Security Pro and Complete customers receive Live PC
Support - the quickest, most comprehensive way of getting help with your
computer problems. Simply clicking the 'Live Support' button will open a chat
window with a Comodo security expert where you can ask questions or request
that a service be performed on your computer. Services include items such as
virus removal and PC troubleshooting and are executed by our expert accessing
your computer through a remote desktop connection. Those wishing to test the
service should take advantage of the 30 day free trial.
Please visit http://www.livepcsupport.com for full product details. Please visit http://personalfirewall.comodo.com to
sign up for Comodo Internet Security - Pro.
• Overview of Services
296
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Our experts are available 24 hours per day to perform any service or answer any support question
• Unlimited incidents on up to 3 home or work PC's. Each Comodo Internet Security Pro or Complete
license allows you to call upon the Live PC Support services listed below as many times as you need them.
• Initiate an Online Chat session anytime. If you request it, our technicians will use the chat window to
remotely connect to your machine and solve your problem.
• Virus Diagnosis / Removal - Your PC is thoroughly checked for viruses and spyware. If any are
discovered then they are expertly removed and your computer restored to it's pre-viral state.
• PC Tune Up - Expert evaluation of issues affecting your computer's performance. Fine Tuning key areas
and improving speed and stability.
• Internet Login Protection - Activating your computer's basic security settings to prevent loss of sensitive
data and identity theft.
• Email Account Set Up - Setting up your Internet-based email account - any provider, any account. Great
for new computers and novice email users.
• Software Installation - Installing your Comodo products and customizing configuration for maximum
security protection and efficiency.
• Printer Set Up and Troubleshooting - Installing or updating software and printer drivers, checking ink
levels and configuring your printer to work on a wireless or wired network.
• Green PC - Optimizing your power management setting based on how you use your computer. Go green
and save money on your electric bill.
Note 1: In all cases, you must have your subscription ID ready. Your subscription ID can be found in your Comodo
Internet Security Pro order confirmation email and for the CIS Complete version, the subscription ID is printed on
the DVD itself or printed on an insert included in the box packaging.
Note 2: The services listed above describe only the LivePCSupport component of Pro and Complete package.
Click here to see full Pro and Complete package details.
297
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Launch the LivePCSupport client directly from the Windows Start Menu – Click All Programs > COMODO >
LivePCSupport > Comodo LivePCSupport.
• Virus Infection - Select if you need assistance in removing viruses, malware etc. from your system.
• Other - Select if you need assistance in removing registry errors, privacy issues, junk files, and other
Windows/System related problems.
You will be connected to the technician skilled in the specific area. Clicking any of the options will open the
registration screen.
298
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
...and enter your Subscriber ID in the 'Subscriber ID:' text box and click 'Next'.
299
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Within seconds, a Comodo Support Technician responds in a chat window and ask you to describe the problem.
Type your question in the text box and press Enter key.
The qualified Comodo security technician will help you with any questions you may have. If necessary, they may
access your computer through a remote desktop connection to implement the changes and fixes necessary to
solve your problem and get your PC working perfectly.
Or
300
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
4. Click 'Remove'.
5. Click 'Yes'. The uninstall progress is indicated. You must restart your system for the uninstallation to take
effect.
6. Click 'Yes' for completing the uninstallation process and restarting your system.
For technical product questions please visit: https://support.comodo.com/ (Comodo’s Customer Service
management system requires you to establish a free service account. Your service account provides access to
Comodo’s extensive Knowledge base, Customer Forums, and Live Chat support and offers the ability to submit
support requests into our service management system.)
7 TrustConnect Overview
Comodo TrustConnect is a secure Internet proxy service that creates an
encrypted session when users are accessing the Internet over public wireless
connections. Since these wireless sessions can be relatively easily intercepted,
they present a significant data vulnerability gap for businesses and consumers
alike.
TrustConnect is designed to eliminate these types of data hijacks by preventing criminals from attacking or
scanning your system from the local network that you are using to connect to the Internet. It also encrypts all of
301
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
your traffic destined for the Internet (including Web site addresses, instant messaging conversations, personal
information, plain text usernames and passwords and other important information). After connecting to the service,
the TrustConnect software indicates that traffic is being encrypted as it leaves your system. Data thieves and
hackers cannot 'sniff' or intercept your data - they can't even determine where your information is coming from
because, as you are connecting to the Internet through a SSL secured VPN connection to the TrustConnect
servers, your requests appear to come from our IP address. Ordinarily, cyber criminals could easily intercept these
broadcasts.
Setting up Comodo TrustConnect is easy, as it works on most operating systems (Windows, Mac OS X) as well as
with most firewall applications. Typical setup takes less than three minutes. TrustConnect clients are available for
Windows, Mac OS, Linux and iPhone mobile devices and can be downloaded by logging into your account at
https://accounts.comodo.com/account/login . Your Comodo Internet Security Suite Pro/Complete confirmation email
contains confirmation of your the username that you set up during intial sign up and a subscription ID for the
service. Once logged in, click the TrustConnect tab to add subscriptions, change billing and contact information,
and review the ongoing status of your service. Your Comodo Internet Security Suite Pro/Complete TrustConnect
account has a 10 GB/month data transfer limit.
Comodo Internet Security Pro/Complete customers also receive the $99 value ‘Total Security and Support’
LivePCSupport package. Please visit http://www.livepcsupport.com for full product details. Please visit
http://personalfirewall.comodo.com to sign up for Comodo Internet Security Pro.
• Windows XP
• Mac OS X
• FreeBSD, OpenBSD
Setting up TrustConnect
• Microsoft Windows
• MAC OS X
• Linux
• Please run the CIS Pro or CIS Complete installer and select ‘Install TrustConnect’ at the options menu
302
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Installation of TrustConnect is dealt with in Section 1.3.3.4 Installing TrustConnect of this guide.
• Via the Windows 'Start' menu. Click 'Start > Programs > Comodo > Trust Connect > Trust Connect'
By default, your TrustConnect client automatically selects the best TrustConnect access server from the servers
distributed all over the world depending on your location, distance between you and the servers and their load. You
can change the server you want to connect to, through Advanced Options explained at the foot of this page.
After starting TrustConnect you should enter your TrustConnect Service Login and Service Password at the client
login box.
Note: This is not the same password as your Comodo Account password. It is a unique, random password that
was generated during account creation to authenticate you to the TrustConnect servers. If required, you can
change this password to something more memorable by using the 'Change Service Password' button on the right.
303
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Click 'OK' to confirm and connect. After successful authentication of your user-name and password, the tray icon
turns green to indicate that you are successfully connected to TrustConnect:
Advanced Options
Comodo TrustConnect allows you to select the TrustConnect access server you want to connect to, through its
advanced options. You can set TrustConnect to automatically select the best server, set a default server or choose
to select the server manually every time.
To access the Advanced options panel, right click on the TrustConnect Tray icon and select 'Advanced Options'.
304
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Select the option and click the Select button for your settings to take effect.
Automatically select the best server - Instructs TrustConnect to select the best access server with optimal load
and distance to connect to. Your TrustConnect client automatically finds a server nearest to your location and with
optimal connection load. This is the default option and is recommended for all users.
I want to connect to server in: Allows you to choose a server and to set it as default, so that every time you start
TrustConnect service, you are connected to the selected server irrespective of your location. The drop-down box
displays a list of TrustConnect access servers located at different places, all over the world. Each server is
indicated with its location (country, state), distance from your current location and the load of the server in
percentage.
305
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Select the server which you want to set as default and click the 'Select' button.
Note: It is always recommended to choose a server nearest to your location for quicker access.
A connection to the selected server is established every time you establish a connection to TrustConnect. You can
change this setting anytime you want, by accessing the Advanced Options in TrustConnect.
Let me choose each time I connect - Allows you to select a different server each time you establishing a
connection with TrustConnect.
Every time you start TrustConnect service, you are prompted to select the server which you wish to connect. On
establishing a connection to TrustConnect, a 'Select access server' dialog appears.
The drop-down box displays a list of TrustConnect access servers located at different places, all over the world.
Each server is indicated with its location (country, state), distance from your current location and the load of the
server in percentage.
• Select the server to which you want to connect and click the 'Select' button. A connection with the selected
access server is established.
Note: It is always recommended to choose a server nearest to your location for quicker access.
306
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Install the client. Double click the .dmg file you downloaded in the step above to start the installation
process. Once setup is complete, a 'Tunnelblick' icon should appear on your desktop. More details about
the Tunnelblick application and its usage is available at the project website located at
http://code.google.com/p/tunnelblick .
3. Download the correct client configuration file for your TrustConnect package:
4. Rename the file you just downloaded from either 'client.conf' or 'free_client.conf' to 'openvpn.conf'
6. Copy the renamed configuration file and the root CA certificate into the following directory:
~/Library/Application/Support/Tunnelblick/Configurations
307
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
1. Download the TrustConnect OpenVPN client for Linux. Click here to download the client directly.
If you are using a Linux distribution which supports RPM packages (SuSE, Fedora, Redhat, etc.), it's best
to install using this mechanism. You can build your own binary RPM file:
rpmbuild -tb openvpn-[version].tar.gz
Once you have the RPM file, you can install it with:
rpm -ivh openvpn-[details].rpm
If you are using Debian, Gentoo, or a non RPM based Linux distribution, use your distribution specific
packaging mechanism such as 'apt-get' on Debian or 'emerge' on Gentoo. It is also possible to install
OpenVPN on Linux using the universal ./configure method.
For more details, visit the official OpenVPN 2.0 'How To' page
1. Download the correct client configuration file for your TrustConnect package:
3. Copy root CA certificate and configuration file into OpenVPN configuration directory, for example into
/etc/openvpn/.
308
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
https://accounts.comodo.com/download/trustconnect/tcclient-1.0-1.noarch.rpm
Note: The TrustConnect RedHat Client is not available for users of the free service. Users of the free service
should download and install the OpenVPN client as detailed earlier in this document.
https://accounts.comodo.com/download/trustconnect/tcclient_1.0-1_all.deb
# dpkg -i PATH/TO/DEB/tcclient_1.0-1_all.deb
Usage:
Run trustconnect client: "Aplications Menu" -> "Internet" -> "TrustConnect Client"
Note: The TrustConnect Ubuntu Client is not available for users of the free service. Users of the free service
should download and install the OpenVPN client as detailed earlier in this document.
309
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
3. Click the 'Save' button and go back to VPN main page (Setting > General > Network > VPN).
310
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
All our Internet (HTTP & HTTPS) connections are via a proxy server. How do I connect using TrustConnect in this
situation?
What is a Sniffer?
311
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
What is the difference between the free service and the paid license service?
Is the TrustConnect license for only one computer, or can I install it on others in my home network?
Windows Configuration
What is the "TAP-Win32 Adapter" that appears in my "Network Connections"?
I'm sure I've done everything correctly but I still cannot connect to the server.
I can connect to the server, but cannot get access to any site. IPCONFIG /ALL shows IP 0.0.0.0 for the TAP
adapter. What's wrong?
All adapters are located in correct place, but I still cannot connect to the server.
Common Questions
How do I set up TrustConnect and Log on to the TrustConnect Server?
1. Firstly, log into your Comodo Account at https://accounts.comodo.com with the user name and password
that you created during the TrustConnect or CIS Pro/Complete enrollment process.
3. Download, install and configure the appropriate TrustConnect client software for your operating system. All
necessary software and instructions are available on the right hand side of the 'TrustConnect' area of your
312
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Windows
MAC OS X
Linux / OpenVPN
The following example shows how to connect using the Windows client:
Click Start > Programs > Comodo > Trust Connect > Trust Connect
Or, if TrustConnect is already running, right click on the tray icon and select 'Connect':
5. At the login box you should enter your TrustConnect Service Login and Service Password.
Note: This is not the same password as your Comodo Account password. It is a unique, random password that
was generated during account creation to authenticate you to the TrustConnect servers. If required, you can
change this password to something more memorable by using the 'Change Service Password' button on the right.
313
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Make sure that you are entering the TrustConnect Service login details and NOT your Comodo Account Manager
login details.
As a TrustConnect customer (or CIS Pro/Complete customer which includes TrustConnect service) you have two
sets of login details:
Your Comodo Account Login Details. This user name and password enables you to log into your
314
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
account at https://accounts.comodo.com to view and configure account details. You created this on the sign
– up form when you enrolled for TrustConnect or CIS Pro/Complete.
Your TrustConnect Service Login Details. This user-name and password is used to connect to the TrustConnect
server and should be entered at the client login box.
• Your service login and password are listed. You can change this password at any time by clicking the
'Change Service Password' button.
TrustConnect is successfully tested on Windows 2000, Windows XP, Windows Vista, Linux and Mac Os X. It
supports mobile devices like iPod/iPhone as well.
To start using TrustConnect you must first download and install the appropriate TrustConnect client software for
your operating system. Client software for supported operating systems is available for download in the
TrustConnect area of your account. Alternatively, use the following links:
Windows
MAC OS X
Linux / OpenVPN
All our Internet (HTTP & HTTPS) connections are via a proxy server. How do I connect using TrustConnect
in this situation?
• Add the following text --allow_proxy 1 into the 'Target' field, so it looks like this:
315
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Select 'Manual Configuration' and enter your proxy settings, for example:
If you are logging onto the Internet using Wi-Fi public hotspots, then all of your information is in a readable, plain
text format that cyber criminals can sniff. In addition, many hotels have sniffable wired networks. When you're
traveling, all of your information can be seen, including confidential company and personal information.
What is a Sniffer?
Typically, a computer only receives traffic aimed at its TCP/IP address. Sniffer software allows a computer to record
traffic headed to (and from) every computer on the local network.
• TRIAL – Unlimited 7 day trial which includes all the functionality that is available in the paid service.
• FREE – 'Free for life' service that includes certain service restrictions. For more details, see 'What’s the
Difference between the Free Service and the Paid License Service?'.
• Corporate Monthly - $25.00 per month, 5 user accounts, 500 GB total traffic
• Corporate Annual - $200.00 per year, 5 user accounts, 500 GB total traffic
316
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Login to your Comodo account at https://accounts.comodo.com with your user-name and password
• Click the 'TrustConnect' tab on the top navigation bar (or select 'TrustConnect' from the 'Service' menu
button
• Click 'Buy extra traffic' on the right hand side then sign up for the plan that fits your requirements
What’s the Difference between the Free Service and the Paid License Service?
• Location services are not available to free users (i.e. users are not able to select which server they connect
to in ‘Advanced Options’)
• Free service does not allow certain protocols to be used. These include FTP, SMTP, NNTP and NTP
Note: POP3 and IMAP protocols ARE allowed, so you can check online mail accounts like Gmail or Yahoo mail.
Instant Messengers such as MSN and ICQ can also be used.
• The proprietary TrustConnect client for RedHat and Ubuntu Linux distributions is not available for free
users. Users are, of course, free to use the OpenVPN client to configure the service.
If you've already signed up for a free account and want to upgrade to the full service:
• Login to your Comodo account at https://accounts.comodo.com with your user-name and password
• Click the 'TrustConnect' tab on the top navigation bar (or select 'TrustConnect' from the 'Service' menu
button
• Click 'Change Plan' then sign up for a subscription plan that fits your requirements
Not at all. Some networks, even if they are physically hard-wired and not wireless, do not have secure connections.
You can use Comodo TrustConnect even from a wired connection if you need to encrypt your session or hide your
destination. If you'd like another layer of protection, Comodo TrustConnect can provide it.
No. Cyber criminals can break WEP encryption with easy-to-acquire tools that are available on the Internet.
Computers without firewalls are even more vulnerable to attack. Comodo TrustConnect helps make your
connection secure even on your home-based Wi-Fi connection.
Is the TrustConnect license for only one computer, or can I install it on others in my home network?
You may install TrustConnect client software on any amount of PCs you wish, but you are allowed to connect to
TrustConnect service with one of them at a time. For example, you may install TrustConnect on work PC and on
your own laptop and connect to TrustConnect from work computer or from laptop, but not simultaneously.
The license agreement can be read here: https://accounts.comodo.com/trustconnect/management/eula
All TrustConnect connections are made over 128 bit SSL encrypted connections so typical speeds are between 1.5
317
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
– 3.0 Mbps.
Once your 7 day trial period is over you are automatically switched over to the full monthly or annual plan that you
enrolled for.
If you would like to cancel your TrustConnect account at any time, please send your request to
trustconnectcancel@comodo.com Please remember to include your account user-name (login), email address and
order number and a brief reason for cancellation.
All connections to TrustConnect are over 128-bit SSL encryption. Additionally, a private VPN session key is re-
created every hour.
Yes. If your computer is connected to the Internet through a NAT-enabled router, you shouldn't have any problems
connecting to the TrustConnect service.
The "TAP-Win32 Adapter" is virtual network card that is created by the TrustConnect client during installation. This
adapter is required in order to establish a secure tunnel to the TrustConnect Server.
I'm sure I've done everything correctly but I still cannot connect to the server.
Make sure that you have been correctly entering your Service Login/Password. If it is incorrect you should visit
https://accounts.comodo.com/trustconnect/management and check your Service Login.
I can connect to the server, but cannot get access to any site. IPCONFIG /ALL shows IP 0.0.0.0 for the TAP
adapter. What is wrong?
318
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• The 'Start the service' link is now available. Click on it to run the DHCP Client.
319
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Yes. TrustConnect ensures secure wireless connectivity to the Internet but does not secure all your computers
ports (it is not designed for this purpose). You still need an effective firewall to protect your ports when surfing the
‘net. Comodo recommends users install Comodo Internet Security which contains an award winning packet filtering
personal firewall and is completely free for home and business users.
All adapters are located in correct place, but I still cannot connect to the server.
You need to check the box against "Run this program as an administrator":
OR run the application under the Windows Vista "Run As Admin" option.
You may use the following addresses when configuring the IPod / IPhone client:
- us1.vpn.comodo.com (commercial subscription)
320
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
Background Note: Every device on the Internet is uniquely identified by a 32-bit number (IPv4) or a 128-bit
number (Ipv6). While this is perfectly satisfactory for computers, humans are far more comfortable remembering
names rather than a string of numbers. The Domain Name System (DNS) provides the translation between those
names and numbers. Virtually every piece of software, device, and service on the Internet utilizes DNS to
communicate with one another. DNS also makes this information available across the entire span of the Internet,
allowing users to find information remotely.
Comodo Secure DNS is a broadly distributed Recursive DNS service that gives you full control to determine how
your clients interact with the Internet. It requires no hardware or software and provides reliable, faster, smarter and
safer Internet experience.
• Reliable – Comodo Secure DNS Directory Services Platform currently spans across five continents around
the world. This allows us to offer you the most reliable fully redundant DNS service anywhere. Each node
has multiple servers, and is connected by several Tier 1 carriers to the Internet.
• Faster – Our strategically placed nodes are located at the most optimal intersections of the Internet. Unlike
most DNS providers, Comodo Secure DNS Directory Services Platform uses Anycast routing technology –
which means that no matter where you are located in the world, your DNS requests are answered by the
closest available Comodo Secure DNS set of servers. Combine this with our huge cache and we can get
the answers you seek faster and more reliably than anyone else. Furthemore, our "name cache
invalidation" solution signals the Comodo Secure DNS recursive servers anytime one of our authoritative
customers or partners updates a DNS record, fundamentally eliminating the concept of a TTL.
• Smarter – Comodo's highly structured search and guide pages get you where you want to be, when you
inadvertently attempt to go to a site that doesn’t exist.
• Safer – As a leading provider of computer security solutions, Comodo is keenly aware of the dangers that
plague the Internet today. Secure DNS helps users keep safe online with its malware domain filtering
feature. Secure DNS references a real-time block list (RBL) of harmful websites (i.e. phishing sites,
malware sites, spyware sites, excessive advertising sites, etc.) and will warn you whenever you attempt to
access a site containing potentially threatening content. Additionally, our 'name cache invalidation' solution
signals the Comodo Secure DNS recursive servers whenever a DNS record is updated - fundamentally
eliminating the concept of a TTL. Directing your requests through highly secure servers can also reduce
your exposure to the DNS Cache Poisoning attacks that may affect everybody else using your ISP.
To start Comodo Secure DNS service the DNS settings of your computer has to be modified to point to our server's
321
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
IP addresses. Comodo Internet Security automatically modifies the DNS settings of your system during its
installation to get the services. You can also modify the DNS settings of your system manually, if you haven't
selected the option during installation. You can also revert to the previous settings if you want, at anytime.
Click the following links to get the instructions for manually modifying the DNS settings on your router or on your
computer.
• Router
• Windows XP
• Windows Vista
To enable the Comodo Secure DNS service, modify the DNS server IP address settings to Comodo Secure DNS
server IP addresses. The IP address are:
Important Note: If you have chosen to install CIS in a language other than English then the DNS Server
addresses to be entered are:
Primary DNS : 156.154.70.25
1. Login to your router. To log in and configure your router, you can open it up in your web browser. If you
don't know the IP address for your router, don't worry, it is typically one of the following:
http://192.168.0.1
http://192.168.1.1
http://192.168.10.1
If you have forgotten your router's username and/or password, the most common username is "admin" and
the password is either blank, "admin", or "password". If none of those work, you can often reset the
password to the manufacturer default by pressing a button on the router itself, or in some cases access
without a password if you try to access your router quickly after you've cycled the power to it.
322
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
2. Find the DNS Server Settings. Look for "DNS" next to a field which allows two or three sets of numbers
(these fields may be empty).
3. Select the check box Use these DNS Servers, type the Comodo Secure DNS Server settings as your DNS
server settings and click 'Save'/'Apply'.
Primary DNS server address for Comodo Secure DNS is: 156.154.70.22
Secondary DNS server address for Comodo Secure DNS is: 156.154.71.22
Important Note: If you have chosen to install CIS in a language other than English then the DNS Server
addresses to be entered are:
Primary DNS Server : 156.154.70.25
When you are done, the above example would look like this.
• Deselecting the check box 'Use these DNS servers' address automatically'. This means that you use the
DNS server provided by your ISP. This is the option that most home users should choose if they wish to
disable the service.
or
323
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
To enable the Comodo Secure DNS service, modify the DNS server IP address settings to Comodo Secure DNS
server IP addresses. The IP address are:
Important Note: If you have chosen to install CIS in a language other than English then the DNS Server
addresses to be entered are:
Preferred DNS : 156.154.70.25
324
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
325
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
3. Right click on your connection from the Network Connections window and click 'Properties'.
326
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
327
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
5. Click the radio button Use the following DNS server addresses and type in Comodo Secure DNS
addresses in the Preferred DNS server and Alternate DNS server fields.
Please note down your current DNS settings before switching to Comodo Secure DNS, in case you want to
return to your old settings for any reason.
Preferred DNS server address for Comodo Secure DNS is: 156.154.70.22
Alternate DNS server address for Comodo Secure DNS is: 156.154.71.22
Important Note: If you have chosen to install CIS in a language other than English then the DNS Server
addresses to be entered are:
Preferred DNS : 156.154.70.25
328
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Selecting 'Obtain DNS server address automatically'. This means that you use the DNS server provided by
your ISP. This is the option that most home users should choose if they wish to disable the service.
or
329
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
To enable the Comodo Secure DNS service, modify the DNS server IP address settings to Comodo Secure DNS
server IP addresses. The IP address are:
Important Note: If you have chosen to install CIS in a language other than English then the DNS Server
addresses to be entered are:
330
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
331
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
332
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
333
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
5. Vista may ask for your permission to make changes. If so, click the 'Continue' button.
6. Select 'Internet Protocol Version 4 (TCP/IPv4)', then click the 'Properties' button.
334
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
7. Click the radio button 'Use the following DNS server addresses' and type in Comodo Secure DNS
addresses in the Preferred DNS server and Alternate DNS server fields.
Please note down your current DNS settings before switching to Comodo Secure DNS, in case you want to
return to your old settings for any reason.
Preferred DNS server address for Comodo Secure DNS is: 156.154.70.22
Alternate DNS server address for Comodo Secure DNS is: 156.154.71.22
Important Note: If you have chosen to install CIS in a language other than English then the DNS Server
addresses to be entered are:
Preferred DNS : 156.154.70.25
335
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
• Selecting 'Obtain DNS server address automatically'. This means that you use the DNS server provided by
your ISP. This is the option that most home users should choose if they wish to disable the service.
or
336
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
337
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com
About Comodo
The Comodo companies are leading global providers of Security, Identity and Trust Assurance services on the
Internet. Comodo CA offers a comprehensive array of PKI Digital Certificates and Management Services, Identity
and Content Authentication (Two-Factor - Multi-Factor) software, and Network Vulnerability Scanning and PCI
compliance solutions. In addition, with over 10,000,000 installations of its threat prevention products, Comodo
Security Solutions maintains an extensive suite of endpoint security software and services for businesses and
consumers.
Continual innovation, a core competence in PKI and a commitment to reversing the growth of Internet-crime
distinguish the Comodo companies as vital players in the Internet's ongoing development. Comodo, with offices in
the US, UK, China, India, Romania and the Ukraine, secures and authenticates the online transactions and
communications for over 200,000 business customers and millions of consumers, providing the intelligent security,
authentication and assurance services necessary for trust in on-line transactions.
Email: Sales@comodo.com
338
Comodo Internet Security 2011 User Guide | © 2010 Comodo Security Solutions Inc. | All rights reserved.
www.comodo.com