ITarian Help

Find the desired product help

IT Endpoint Manager

IT Endpoint Manager

Comodo Client Security for Windows - User Guide 12.10

English

Print Help Download Help
Introduction To Comodo Client Security > Start Comodo Client Security
  • Introduction To Comodo Client Security
    • Special Features
    • System Requirements
    • Install Comodo Client Security
    • Start Comodo Client Security
    • The Main Interface
      • The Home Screen
      • The Tasks Interface
      • The Widget
      • The System Tray Icon
    • Understand Security Alerts
    • Password Protection
  • General Tasks - Introduction
    • Scan And Clean Your Computer
      • Run A Quick Scan
      • Run A Full Computer Scan
      • Run A Rating Scan
      • Run A Custom Scan
        • Scan A Folder
        • Scan A File
        • Create, Schedule And Run A Custom Scan
      • Automatically Scan Unrecognized And Quarantined Files
    • Instantly Scan Files And Folders
    • Process Infected Files
    • Manage Virus Database Updates
    • Manage Blocked Autoruns
    • Manage Quarantined Items
  • Firewall Tasks - Introduction
    • Configure Internet Access Rights For Applications
    • Stealth Your Computer Ports
    • Manage Network Connections
    • Stop All Network Activities
    • View Active Internet Connections
  • Containment Tasks - Introduction
    • Run An Application In The Container
    • Reset The Container
    • Identify And Kill Unsafe Running Processes
    • Open Shared Space
    • The Virtual Desktop
      • Start The Virtual Desktop
      • The Main Interface
      • Run Browsers Inside The Virtual Desktop
      • Open Files And Run Applications Inside The Virtual Desktop
      • Pause And Resume The Virtual Desktop
      • Close The Virtual Desktop
    • Containment Statistics Analyzer
  • DLP Tasks - Introduction
    • Run Data Loss Prevention Scans
    • Manage DLP Quarantined Files
  • Advanced Tasks - Introduction
    • Create A Rescue Disk
      • Download And Burn Comodo Rescue Disk
    • Remove Deeply Hidden Malware
    • Manage CCS Tasks
    • View CCS Logs
      • Antivirus Logs
      • VirusScope Logs
      • Firewall Logs
      • HIPS Logs
      • Containment Logs
      • Website Filtering Logs
      • Device Control Logs
      • Autorun Event Logs
      • Alert Logs
      • CCS Tasks Logs
      • File List Changes Logs
      • Vendor List Changes Logs
      • Configuration Change Logs
      • Virtual Desktop Event Logs
      • Data Loss Prevention Event Logs
      • Search And Filter Logs
    • Submit Files For Analysis To Comodo
    • View Active Process List
  • CCS Advanced Settings
    • General Settings
      • Customize User Interface
      • Configure Virus Database Updates
      • Log Settings
      • Manage CCS Configurations
        • Comodo Preset Configurations
        • Personal Configurations
    • Antivirus Configurations
      • Real-time Scanner Settings
      • Scan Profiles
    • Firewall Configuration
      • General Firewall Settings
      • Application Rules
      • Global Rules
      • Firewall Rule Sets
      • Network Zones
        • Network Zones
        • Blocked Zones
      • Port Sets
    • HIPS Configuration
      • HIPS Settings
      • Active HIPS Rules
      • HIPS Rule Sets
      • HIPS Groups
        • Registry Groups
        • COM Groups
    • Protected Objects
      • Protected Objects - HIPS
        • Protected Files
        • Blocked Files
        • Protected Registry Keys
        • Protected COM Interfaces
      • Protected Objects - Containment
        • Protected Files And Folders
        • Protected Keys
    • Data Loss Prevention
      • DLP Monitoring Rules
      • DLP Discovery Rules
      • DLP Keyword Groups
    • Containment Settings
      • Containment Settings
      • Auto-Containment Rules
      • Virtual Desktop Settings
      • Containment - An Overview
      • Unknown Files - The Scanning Processes
    • File Rating Configuration
      • File Rating Settings
      • File Groups
      • Submitted Files
    • Advanced Protection
      • VirusScope Settings
      • Scan Exclusions
      • Device Control Settings
      • Script Analysis Settings
      • Miscellaneous Settings
    • Web Filter Settings
      • Website Filtering Rules
      • Website Categories
  • Appendix 1 - CCS How To... Tutorials
    • Enable / Disable AV, Firewall, Auto-Containment And VirusScope Easily
    • Set Up The Firewall For Maximum Security And Usability
    • Block Internet Access While Allowing Local Area Network (LAN) Access
    • Block / Allow Specific Websites To Specific Users
    • Set Up HIPS For Maximum Security And Usability
    • Create Rules To Auto-Contain Applications
    • Run An Instant Antivirus Scan On Selected Items
    • Create An Antivirus Scan Schedule
    • Run Untrusted Programs Inside The Container
    • Run Browsers Inside The Container
    • Restore Incorrectly Quarantined Item(s)
    • Submit Quarantined Items To Comodo Valkyrie For Analysis
    • Enable File Sharing Applications Like BitTorrent And Emule
    • Block Any Downloads Of A Specific File Type
    • Disable Auto-Containment On A Per-application Basis
    • Switch Off Automatic Antivirus Updates
    • Suppress CCS Alerts Temporarily
    • Control External Device Accessibility
  • Appendix 2 - Comodo Secure DNS Server
    • Router - Manually Enable Or Disable Comodo Secure DNS Service
    • Windows - Enable Comodo Secure DNS
  • About ITarian

Start Comodo Client Security

  

After installation, Comodo Client Security automatically starts whenever you start Windows.


CCS has two modes:

  • Normal Mode - Allows you to access the entire CCS interface.
  • Virtual Desktop Only Mode - You can only open the Virtual Desktop and Virtual Desktop settings.

The mode available to you depends on the Endpoint Manager (EM) profile active on the device.


Normal Mode


There are 5 different ways to open CCS if it is in normal mode:

  • Windows Start Menu
  • Windows Desktop
  • Widget
  • System Tray Icon
  • Windows Defender

Start Menu

  • Click Start and select All Apps > Comodo > Comodo Client Security

(Please note the start menu varies slightly for different Windows versions.)


 


Windows Desktop

  • Double-click the desktop shortcut to start Comodo Client Security. The shortcut is only visible if 'Show Desktop Shortcut' is enabled in the Endpoint Manager profile active on the endpoint.


     


    Widget

    • Click the information bar in the widget to start CCS. The shortcut is only visible if 'Show Widget' is enabled in the Endpoint Manager profile active on the endpoint.




    The widget also contains other useful data and features. See 'The Widget' for more details.


    CCS Tray Icon 

    • Double-click the shield icon to start the main interface.



    You can also right-click on the tray icon and select 'Open...'.

     

    Windows Defender

    • Double-click on the Windows Defender icon to open the application
    OR
    • Right-click on the tray icon and select 'Open...'.



       
    • Click the 'Virus & threat protection' tile
    • Click the 'Open COMODO Antivirus' to open the Comodo Client Security interface:




    Virtual Desktop Only mode

    • This mode means you can only open the Virtual Desktop and access Virtual Desktop settings. You cannot access any other areas of the CCS interface.
    • Endpoint Manager admins - You can enable or disable this setting in the ‘UI Settings’ section of a profile.
      • See https://help.itarian.com/topic-459-1-1005-14932-Communication-Client-and-Comodo-Client---Security-Application-UI-Settings.html if you want to read more on this.

        In 'Virtual Desktop Only' mode:

        • The system tray icon and the desktop widget are hidden
        • The CCS desktop shortcut and Windows start menu entry lead to the following menu:



          • Run Virtual Desktop - Opens the virtual desktop. See The Virtual Desktop for more help on this.
          • Open Virtual Desktop Settings - Opens the virtual desktop settings area in CCS. See Virtual Desktop Settings for help with these settings.

          End-users cannot access any other area of CCS.


          What is an Endpoint Manager Profile?

          • Endpoint Manager (EM) is a product which allows admins to manage Comodo Client Security on network endpoints.
          • An EM profile is a template which contains all the security settings and privileges that the admin wants to implement on the endpoint.
          • Admins can allow local changes to CCS by activating 'Enable local user to override profile configuration'. See https://help.itarian.com/topic-459-1-1005-14934-Client-Access-Control.html for help with this.


          Comodo Help
          • IT Platform:
          • Help
          • Scripts
          • Wiki
          • Forum
          • Developer
          • RMM
          • Patch Management
          • Service Desk
          • ITSM
          • Managed Service Provider
          • Managed Detection and Response
          • Ticketing System
          • Helpdesk
          • ITIL

          Copyright 2025 Itarian