ITarian Help

Find the desired product help

IT Endpoint Manager

IT Endpoint Manager

Comodo Client Security for Linux - Quick Start Guide

English

Print Help Download Help
Comodo Client Security For Linux - Quick Start Guide > Start CCS
  • Comodo Client Security For Linux - Quick Start Guide
    • Installation
    • Start CCS
    • The Main Interface
    • Scan And Clean Your Computer
    • Run An Instant Antivirus Scan On Selected Items
    • More Help
  • About ITarian

Start CCS


  • After installation, Comodo Client Security (CCS) will load at computer start-up.
  • Real-time protection and on-access scanning is automatically enabled, so you are protected immediately after the restart.
  • Important - We recommend admins configure CCS via an Endpoint Manager profile rather than locally.
  • Log into 'Endpoint Manager' > Click 'Configuration Templates' > 'Profiles' > open a Linux profile > Click the 'Antivirus' tab.
  • However, you can also configure the application at a local machine should you wish. The rest of this guide explains how to configure and use the application locally.

    You can access the management interface in the following ways:

    • Applications Menu - Click 'Applications' to view CCS product group icons
    • Double-click Comodo Client Security icon to to start the application.


    • Desktop - Double-click the shield icon in the dock area to start Comodo Client - Security
    • Dock icon - Double-click the CCS icon in the dock area

    CCS opens at the summary screen by default:




    • Click 'Do it now' to run your first full computer scan.

    Before running the scan, CCS will first check for AV database updates. If updates are available they will be downloaded and installed.




    The scan will commence after the update:



     

    The progress dialog shows the profile name, the location that is currently being scanned, the start time and duration of the scan, the total number of objects scanned so far, and the number of threats found.


    Results are shown at the end of the scan:




    • Click the 'Results' button to see detailed file information.
    • The results window lists all threats discovered by the scan. You can remove selected threats or choose to ignore them:


    See Scan and Clean Your Computer for more details.


    Comodo Help
    • IT Platform:
    • Help
    • Scripts
    • Wiki
    • Forum
    • Developer
    • RMM
    • Patch Management
    • Service Desk
    • ITSM
    • Managed Service Provider
    • Managed Detection and Response
    • Ticketing System
    • Helpdesk
    • ITIL

    Copyright 2025 Itarian