888 - 351 - 5980 Chat now

Thank you

for downloading
Comodo Internet Security 10

If your download does not start automatically, please click here


Comodo Internet Security 10

Comodo Antivirus - Installation

Note - Before initiating the installation procedure, please ensure that you have uninstalled any
other antivirus and firewall products that are already on your computer.

After downloading the required Comodo Internet Security setup file to your local hard drive,
double click on it Comodo Antivirus icon to start the installation wizard.

step 1 Choosing The Installation Language
Select Language

From the dropdown menu, select the language in which you want Comodo Internet Security to be installed. Then click 'OK'.

step 2 Installation Configuration Process

Now the installation configuration screen will be displayed.

Comodo Internet Security Premium Installer
Customize Installation:

Clicking on 'Customize Installation' allows you to choose advanced options. This will allow you choose the specific CIS components that you wish to install; the specific location/path where CIS has to be installed, as well as other advanced CIS configuration settings.

News and Notifications

Comodo Internet Security Premium is offered free of cost for lifetime usage. If you wish to receive news about Comodo products then enter your email address in the space provided. This is an optional feature.

Cloud Based Behavior Analysis

If you check (enable) this option, then any file that is identified as unrecognized is sent for behavior analysis to the Comodo Instant Malware Analysis (CIMA) server. Here, each file is executed in a virtual environment, and tested to determine whether it contains any malicious code (malware). The results are sent back to your computer in approximately 15 minutes. Comodo recommends this setting to be enabled. To know details of the privacy policy click on the 'Privacy Policy' link.

Sharing Program Usage Data

Comodo collects usage details from millions of CIS users (anonymously and with their consent) to analyze their usage patterns and use the data for enhancing security products. The CIS installation will collect details on how you use the application and periodically send the data to Comodo servers through a secure and encrypted channel. As this data is sent anonymously, your privacy remains protected. This data will be useful to the engineers and developers at Comodo to identify the areas that need to be developed further for delivering the best Internet Security product. If you do not want your usage details to be sent to Comodo then disable this option. Comodo recommends users to leave this setting enabled. This setting can be changed at anytime after installation from Advanced Settings > General Settings > Log Settings interface.

DNS Settings Configuration

In the next screen, you can choose to configure your DNS Settings and Browser Home page.

DNS Settings
Browser Homepage

Leaving this setting enabled will:

Customize Installation:

Clicking on 'Customize Installation' allows you to choose advanced options. This will allow you choose the specific CIS components that you wish to install; the specific location/path where CIS has to be installed, as well as other advanced CIS configuration settings.

End User License Agreements

Before proceeding with the installation read the complete User License Agreement by clicking the 'License Agreement' link of Comodo Internet Security.

User License Agreement

After reading the agreement, click the 'Back' button to return to the installation configuration screen.

Once back at the main installer screen, if you wish to configure advanced options, click 'Customize Installation'. Otherwise, click 'Agree and Install' to commence installation.

Customizing Installation

Clicking the 'Customize Installation' link opens an advanced options interface that enables you to choose which elements you would like to install, configure security popup alerts and choose the installation path. In order to obtain maximum protection, Comodo recommends that you uninstall any third party personal Firewall and Antivirus in your system and select all the components to get the full benefit of the product. Select Components to Install (Click to go back to Step 2)

Installation Options

Click the 'Installation Options' tab to select the components to be installed.

Customize Setting
Configuration Options
AV Configuration Options
Choosing Installation Location

Click the 'Files Locations' tab to choose the installation path.

Files Locations

This screen allows users to specify the location and folder in the hard drive for installing Comodo Internet Security. The default path is C:\Program Files\COMODO\COMODO Internet Security. For installing the application in any location other than the default location, click 'Browse' and choose a different location.

After customizing your installation, click the 'Back' button to return to the installation configuration screen.

step 3 Installation Progress

The installation progress will be displayed…


xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx%%%%%%

AV Installation Progress

…and on completion, the successfully completed dialog will be displayed.

Installation Completed
Network Configuration

If your computer is connected to a home or work network, then you are prompted to configure it at the 'Network Detected!' dialog. At the top of the dialog, the connectivity mode will be displayed, whether wired or wireless.

Network Settings
First Scan

The application initiates the first Quick Scan on your computer. CIS automatically updates the virus database before the Quick Scan commences.

Install Signature

If you wish to perform some other task then you can send this task to the background by pressing the 'Send to Background' button, and retrieve it in the 'Task Manager' interface. Refer to the section 'Manage CIS Tasks' for more details.

CIS performs a Quick Scan of system memory, autorun entries, hidden services, boot sectors and other critical areas.

AV Quick Scan

If you do not want the scan to continue at this time, click the 'Stop' button.

After the scanning process is complete, and any threats are found, an alert screen will be displayed. The alert will display the number of threats/infections discovered by the scanning process and provide you the options for cleaning.

Quick Scan Result
Expert Support

If any threats are detected, they will be displayed and you can choose to take appropriate action from any of the drop-down fields in the screen and click 'Apply Selected Actions' button. Refer to the section 'Processing Infected Files ' for more details.

steps 4 Restarting Your System

In order for the installation to take effect, your computer needs to be restarted.

Restart Message
steps 5 After Restarting Your System

After restarting, a 'thankyou' screen will appear. This contains a summary of the components you chose to install as well as some friendly advice.

Comodo Internet Premium

This screen will appear every time you start your system. If you do not want the screen to be displayed on every start up, select the check box 'Do not show this window again' before closing the window.

If your computer is connected to a home or work network, then you are prompted to configure it at the 'Network Detected!' dialog. At the top of the dialog, the connectivity mode will be displayed, whether wired or wireless.

oin Network

The main interface will be displayed

Risk Virus Signature