Useful Tips

How to completely remove Comodo from a computer without utilities?


How to remove Comodo Internet Security Premium 11 antivirus completely from a computer. For a video review on how to properly remove the Comodo Internet Security Premium 11 antivirus from a computer without residual files, see here:

Join the group and you will be able to view images in full size

Uninstall Сomodo using Windows

Previously, there was a special utility with which you could remove Comodo from your computer in just a few clicks, including all system files and registry entries.
But after the release of Comodo 6 and above, which contains not only the antivirus program itself, but also a bunch of firewall + browser + geek body, the developers have not yet created a suitable uninstaller to eliminate the new Komodo. Therefore, everything will have to be done with your own hands.

Note: a detailed description of using UninstallerTool in
Comodo Removal Tool instructions.

Method 1. Suitable when the Komodo product is installed without errors.

1. Start -> Control Panel -> Uninstall a program.

2. Find Comodo Internet Security in the list and click Delete / Change.

3. A program installation / removal wizard will appear, following the instructions of which you can completely remove it from the Komodo computer.

4. Reboot the system - Everything is ready.

Method 2: if the removal of Comodo by means of Windows failed

Minute of the theory: if the error is removed by standard methods, or if another anti-virus product does not want to be installed, then you need to go by a more brutal method and manually remove Komodo from the computer.

1. Restart the computer in safe mode. To do this, while loading it, click F8 and select “Safe Mode”.

2. Start my computer or Total Commadner and find the folder with Komodo antivirus. By default, it is located at c: Program Files COMODO . We delete it completely.

3. Launch Ccleaner. First, we clean the computer in the "Cleanup" mode, and then in the "Registry" mode from temporary files, empty directories and various unnecessary entries in the registry.

4. Reboot the system.
Now Komodo antivirus is completely removed from the computer.

Note: in the near future developers should expect a new utility to clean the computer from the 6th version of the program.
Then the process of removing this software will generally be very fast and convenient.

Install COMODO Internet Security 10-12. Simplified setup and use instructions

Introductory article about COMODO Internet Security: distribution choice, installation options, configuration and use for beginners

COMODO Internet Security is a comprehensive security system, free for both home and commercial use, and in a fully functional version (with the exception of some online services).

It should be said that CIS allows a fairly flexible configuration, and therefore, according to the ease of use and the degree of security of a system with CIS installed, it is more accurate to judge a specific configuration, and not about the advantages / disadvantages of the product itself.

In this series of articles, the logic of the CIS is analyzed, the problems of this product are identified and recommendations for its effective use are given. All statements in the articles are conclusions from the personal experience of the author, do not pretend to be unconditional truth and are offered for critical reflection and discussion.

System preparation

The claimed system requirements of COMODO Internet Security are: Windows XP 32bit, Vista / Win7 / Win8 / Win8.1 / Win10 32 bit & 64 bit / 152 MB RAM / 400 MB space.

As in the case of installing any system programs, especially anti-virus, I recommend that you first back up the OS. Due to an unforeseen conflict, for example, with updating the OS, removing CIS can be a daunting task.

I note that incorrect operation or uninstallation of the CIS can be associated with the use of various "system optimizers", "registry cleaners", utilities for the "complete" removal of programs or their installation "with tracking". My humble recommendation is to stay away from such means and entrust the maintenance of the operating system to herself.

When you install CIS, the built-in Windows Firewall does not turn off automatically. Probably, these products do not conflict with each other, since the CIS does not give warnings in this regard. However, you can disable the Firewall manually: Win + R → wf.msc → Properties → in each profile select Firewall: Disable. However, you should not disable the service itself. Windows Firewall.

I recommend installing CIS only on a system guaranteed to be clean from malware.

The choice of distribution. Overview of components. Features of installation and uninstallation

The official Russian-language site of COMODO is (Warning - not!), However, it does not always provide a fairly complete and fresh set of distributions. I recommend taking distributions on the official forum or on the site

Component Firewall It is supplied by COMODO Internet Security distributions (online and offline, installation is optional) and COMODO Firewall (installation is required). The firewall also includes a Content Filter. In my opinion, a firewall with proactive defense is all that is needed.

Component Antivirus comes with the online distributions of COMODO Antivirus and COMODO Internet Security (installation is required), as well as the offline distribution of CIS (installation is optional). It is not urgently needed if proactive defense is configured and used properly. However, it is impossible to exclude the appearance of a malicious program that would bypass proactive defense, but be neutralized by antivirus.

Component Internet Security Essentials supplied by online installers (installation is optional), as well as a separate distribution. According to the official guide, this tool protects against MITM attacks if a malicious program implements a fake root certificate in the system certificate store. Therefore, ISE is only necessary if a malware infection is expected to be affected. I also note that without ISE, the complex is able to check the list of root certificates.

Component Secure shopping it is supplied only by the CIS online installer, installation is optional, in case of refusal from it or when using the offline installer, you can subsequently add Secure Shopping through the CIS interface. This component allows you to launch the browser and other programs in a special environment that is protected from external influences. Like ISE, Secure Shopping only makes sense when making online purchases and other similar operations on an infected system.

Component Dragon web browser - This is a browser based on Chromium, supplied by all online installers, installation is optional, I recommend to refuse. If you want to try out the browser, you can always download and install it separately, as an option, in a portable form.

Component Comodo Cleaning Essentials - This is a set of anti-virus tools, it is not supplied by the listed distributions, but is installed additionally through the CIS interface. Of particular interest among these tools is the process manager. Killswitchwhich integrates with CIS. There is also a separate distribution for using CCE in portable form, but it does not provide integration with CIS.

Regardless of the choice of components, proactive protection tools are installed: HIPS, Auto-Containment, VirusScope and cloud file scanning.

Removing a complex or individual components is done through the “Programs and Components” applet of the system Control Panel. The components of Internet Security Essentials, Secure Shopping and Dragon Web Browser are installed as separate applications and are removed separately from the main complex. You can remove the antivirus or firewall individually from the CIS individually (by clicking Edit), turning it, respectively, into COMODO Firewall or COMODO Antivirus. Comodo Cleaning Essentials is removed along with the complex.

In case the complex cannot be uninstalled in the standard way (for example, after installing it incorrectly), the official Comodo Uninstaller utility has been released.

When installing CIS, you need to pay attention to the options.

On the component selection tab, you can refuse, in my opinion, everything except the firewall.

By default, the installation of Yandex services, Yahoo! or other undesirable software, or instead of the free version of CIS, a trial CIS Pro can be selected, which threatens to completely disable the protection in a month. Also during the installation process, the DNS servers specified in the network adapter settings are replaced with COMODO Secure DNS - in my opinion, it is better to refuse this by disabling the corresponding option. (In case of refusal from "Cloud Analysis" and "Sending information to COMODO", do not forget to check these options after changing the configuration.)

After installation, CIS will begin to update the antivirus and quickly scan. You can abort this procedure, but then CIS will resume it the next time you turn on the computer. Caution: by default, CIS deletes suspicious files into quarantine without asking. To prevent this from happening, you can open the settings window on the tab Antivirus → Antivirus Monitoring and disable the option Do not show alerts.

Despite the fact that the anti-virus database is updated automatically, you must restart the update manually to check for a new version or important program fixes.

I recommend that after installing the complex add to it the KillSwitch process manager contained in Comodo Cleaning Essentials. To install it online, click Tasks → Advanced Tasks → Clean Up Computer or Containment Tasks → View Activity. After installation is complete, you can simply close the running utility.

For the most effective protection, immediately after the update and quick check, open the settings window and on the tab Configuration enable option Proactive security, while we offer a reboot, we will refuse.

To avoid conflicts, disable Auto-Containment (the corresponding option on the tab Containment → Auto-Containment), as well as on the tab Enhanced Protection → VirusScope enable option Track only applications running in the Container.

If the resources are not on the verge of system requirements, disable the tab HIPS → Configuring HIPS option Adapt the mode of operation at low system resources. For convenience, increase Alert Time up to 999 seconds (it makes sense to do this also in configuring the firewall and antivirus).

Option Create rules for secure applications leave it disabled (its inclusion is a typical mistake by beginners).

To protect user files, open the tab HIPS → Protected Objects → Protected Files and add any file to the list, and then edit the new record: instead of the path to the file, write *. * and click Ok. As a result, HIPS will consider all local files “protected” and warn when an unidentified program tries to change them.

Starting with the CIS version, the HIPS “Isolated Application” rule set has been renamed to “Application running in the Container”. In my opinion, this is an erroneous translation of the name “Contained Application”, since in reality the HIPS rules have nothing to do with the Container (virtual environment). To avoid confusion, I recommend renaming this set back to the "Isolated Application": open HIPS → Rule Sets → Application running in the Container and change the name.

Tab Antivirus → Antivirus Monitoring set the option Do not show alerts: Block threatsbecause antivirus alerts are too annoying.

Disable scheduled anti-virus scanning: Antivirus → Scan types → Full scan → Schedule → Do not schedule this task.

To get rid of advertising messages, turn off the tab General setup → Interface options Show notifications from COMODO Message Center and Show a greeting at startup.

To strengthen protection and reduce the number of alerts, we will tighten the global firewall rules: after closing the settings window, open Main window → Tasks → Firewall Tasks → Hide Ports and choose Block incoming connections.

To strengthen protection against potentially unwanted applications that are installed together with safe ones, it makes sense to disable the option Trust applications installed using trusted installers on the tab File Rating → Settings. However, this will increase the number of alerts.

Additional steps on a clean system

If the system is guaranteed to be clean of malware and their traces, it is advisable to “familiarize” the CIS with programs that are unknown to it. The easiest way to do this is to perform an anti-virus scan of the system drive through the context menu, and then on the tab File Rating → File List make all files trusted. The disadvantage of this method is that only Portable Executable files are detected, but not scripts, etc.

Another way is to familiarize CIS with the programs more “aimedly”. To do this, temporarily deactivate the protection:

  • enable option HIPS → Configure HIPS → Do Not Show Alerts: Allow Requests,
  • enable option Firewall → Firewall settings → Do not show alerts: allow requests,
  • on the tab Enhanced Protection → Scan Exclusions → Excluded Paths add a group of files “All applications”.

If you did not, as suggested above, turn off Auto-Containment and change the operating mode of VirusScope, then you will need to disable these components at least temporarily.

Then we restart the computer a couple of times and run the installed programs, especially little-known ones, as well as various components of these programs.

Will produce Rating Scan (Main window → Tasks → General Tasks → Scan) and make trusted found files and certificates.

After that, open the tab File Rating → File List, enable the display of all types of files (executable and non-executable), select all files and select the item in the context menu Change file rating to Trusted.

Then we will reboot again and return the protection to its previous state: disable the "Do not show alerts" options in the HIPS and firewall settings and remove the "All applications" group from the "Excluded paths".

How to respond to alerts

One of the first alerts is the choice of network status. You can simply answer as is, according to your location: at home, at work or in a public place. However, if the network is used only for access to the Internet, then the status of “Public Place” is suitable in all cases.

Responding to HIPS or Firewall Alerts Safe mode, it is advisable to disable the option Remember my choice. Otherwise, your rules will soon turn into a garbage dump, which will not be easy to clear. It is best to assign a safe program not rules, but only a trusted reputation - and then it will automatically be allowed any activity, and dubious ones - not to run.

If an alert appears about trying to run an unidentified program, preferably - without closing the notification - to inquire about it, for example, on VirusTotal (the absence of antivirus triggers does not guarantee security!):

  • if the program is doubtful, then select the option Block → Only block,
  • if the program is safe:
    • choose option Allow,
    • in the subsequent notification of its activity, select Edit as → Allowed application,
    • make the program trusted (File Rating → File List → Add).

I repeat: in the notification about launch unidentified program must choose options Allow or Only block. Applying a set of rules in this alert is a typical beginner mistake.

A set of rules is applied in an alert. about activity unidentified program: for safe Allowed or System application, for doubtful - Isolated.

If an antivirus or cloud scan works for a secure program, again the best solution is to add it to trusted ones. Adding it to antivirus exceptions is superfluous.

Let me remind you that by default (if you have not changed the configuration to Proactive Security) the antivirus, without asking, deletes suspicious files in quarantine. Another reason for quarantining files without asking may be Auto-Containment if you have not disabled or configured this component.

Dangerous functions

When Auto-Containment is running, unidentified programs are isolated and a notification is displayed with a button No longer isolate - I do not recommend clicking it, as this will lead to the creation of unnecessary and harmful rules.

In addition, you may receive an unidentified installer notification from Auto-Containment. If you check the option in it Trust this appthen a meaningless rule will also be created.

Another source of dangerous rules, which also clutter up the configuration, is the Application Unlock feature.

So, if HIPS, Auto-Containment, antivirus or cloud scanning blocks safe the program is just add it to trusted.

How not to do:

  • Remember the selection in HIPS alerts,
  • assign to conductor set HIPS rules
  • Unlock programs through Auto-Containment alerts,
  • Make applications trusted through Auto-Containment alerts.
  • use the "Unlock applications."

The information and recommendations provided should be enough for beginners to use COMODO Internet Security relatively efficiently. A more detailed analysis is in the following articles.

Method 1: Software Removal Applications

There are quite a few different programs that are designed to completely clean the system from installed applications. The most popular solutions of this kind are CCleaner, Revo Uninstaller and Uninstall Tool. По сути, каждое из них достойно отдельного внимания, так как все упомянутые программы хорошо справляются с поставленной задачей. Мы же рассмотрим процесс деинсталляции на примере бесплатной версии софта Revo Uninstaller.

    Run the program. В главном окне вы увидите список софта, который установлен на вашем компьютере или ноутбуке. В данном перечне вам требуется найти Comodo Internet Security. Выбираем антивирус и жмем в верхней области окна Revo Uninstaller кнопку Delete.

Now you will be asked if you want to just reinstall the application, or completely uninstall it. We choose the second option.

Before the program is uninstalled, you will be asked to indicate the reason for uninstalling. You can select the appropriate item in the next window or do not mark anything at all. To continue, click on the button "Forward".

As befits an antivirus, you will try your best to convince you in making a decision. Next, the application will offer to use the services of cloud anti-virus Comodo. Uncheck the corresponding line and press the button Delete.

After some time, you will see the uninstall result in a separate window. It reminds you that additional Comodo applications must be removed separately. We take this into account and press the button "To complete".

After that, you will see a request to reboot the system. If you used Revo Uninstaller software to uninstall, we recommend that you delay the restart. This is due to the fact that the software will immediately offer to clean the system and registry from all entries and files related to the antivirus. Further steps can be found in the next section on this subject.

Method 2: Standard Application Removal Tool

In order to uninstall Comodo, you can not install additional software. To do this, just use the standard Windows software removal tool.

    Open the window "Control Panel". To do this, press the key combination on the keyboard Windows and "R", after which we enter the value control in the field that opens. Confirm the entry by pressing on the keyboard "Enter".

We advise you to switch the display mode of the elements to "Small icons". Select the appropriate line in the drop-down menu.

Next you need to go to the section "Programs and components".

In the list that appears, select the Comodo antivirus and click on it with the right mouse button. In the context menu, click on a single line Delete / Change.

  • All further actions will be similar to those described in the first method. The program will do its best to dissuade you from uninstalling. Repeat steps 2-7 of the first method.
  • Upon completion of uninstalling the antivirus, a request to restart the system will also appear. In this case, we advise you to do this.

  • On this, this method will be completed.
  • Please note that all supporting components (Comodo Dragon, Secure Shopping, and Internet Security Essentials) are removed separately. This is done in the same way as with the antivirus itself. After the application is uninstalled, it is necessary to clean the system and registry of the remnants of Comodo software. This is what we will talk about later.

    Methods for cleaning the system from Comodo residual files

    Further actions must be performed in order not to accumulate garbage in the system. By themselves, such files and registry entries will not hurt you. Nevertheless, there are situations when they cause errors when installing other security software. In addition, such remnants take up space on your hard drive, albeit not much. You can completely remove the presence of Comodo antivirus in the following ways.

    Method 1: Automatically clean the Revo Uninstaller

    By removing the antivirus using the above program, you should not immediately agree to restart the system. We mentioned this earlier. Here's what else to do:

      In the window that opens, click on the button "Scan".

    After a few minutes, the application will find in the registry all the entries that Comodo left behind. In the next window, click "Choose all". When all found registry values ​​are checked, click Deletelocated nearby. If for some reason you need to skip this step, you can simply click "Further".

    Before deleting, you will see a window in which you want to confirm the deletion of entries in the registry. To do this, click on the button "Yes".

    The next step is to erase the files and folders left on the disk. As before, you need to select all the elements found, and then click Delete.

    Those files and folders that cannot be deleted immediately will be erased the next time the system starts. This will be discussed in the window that appears. Close it by pressing the button OK.

  • On this, the process of cleaning the registry and residual elements will be completed. You just have to reboot the system.
  • Method 2: Use CCleaner

    We already mentioned this program when we spoke directly about the removal of the Comodo antivirus. But besides this, CCleaner is able to clean your registry and root directory of garbage. To do this, follow these steps:

      Run the program. You will find yourself in a section called "Cleaning". Mark the items in the subsections on the left side Windows Explorer and "System"then press the button "Analysis".

    After a few seconds, a list of found items appears. To remove them, press the button "Cleaning" in the lower right corner of the program window.

    Then a window will appear in which you need to confirm your actions. Press the button OK.

    As a result, you will see a message at the same place that the cleaning is completed.

    Now go to the section "Registry". We mark in it all the items for verification and press the button "Search for problems".

    The registry scanning process starts. At the end of it you will see all the errors and values ​​found. To correct the situation, click the button marked in the screenshot.

    Before cleaning, you will be prompted to backup files. Do it or not - you decide. In this case, we will abandon this function. Click the corresponding button.

    In the next window, click "Fix selected". This will automate operations without having to confirm actions for each value.

    When the correction of all elements is completed, a line appears in the same window. "Fixed".

  • You just have to close all the windows of the CCleaner program and restart the laptop / computer.
  • Method 3: Manually clean the registry and files

    This method is not the easiest. It is mainly used by advanced users. Its main advantage is the fact that to remove the residual values ​​of the registry and files you do not need to install additional software. As the name of the method implies, all actions are performed manually by the user. When you have already uninstalled Comodo antivirus, you must reboot the system and perform the following steps.

      Open the folder in which the antivirus was previously installed. By default, it is installed in the folder along the following path:

  • If you did not see the Comodo folders, then everything is fine. Otherwise, delete it yourself.
  • In addition, there are many hidden places where antivirus files remain. To detect them, you need to open the hard disk partition on which the program was installed. After that, start the search for the keyword Comodo. After some time, you will see all the search results. You need to delete all files and folders that are associated with the antivirus.

  • Now open the registry. To do this, press the key combination "Win" and "R". In the window that opens, enter the value regedit and click "Enter".
  • As a result, it will open Registry Editor. Press the key combination "Ctrl + F" in this window. After that, in the line that opens, you need to enter Comodo and then click the button Find Next.

    This will allow you to find registry entries that relate to the antivirus mentioned repeatedly. You just need to delete the found entries. Please note that this must be done carefully so as not to remove the excess. Just click on the found file with the right mouse button and select the line in the new menu Delete.

    You need to confirm your actions. To do this, click "Yes" in the window that appears. It will remind you of the possible consequences of actions.

  • In order to continue the search and find the next Comodo value, you just need to press on the keyboard "F3".
  • Similarly, you need to iterate over all registry values ​​until the search is complete.
  • Recall that you need to use this method carefully. If you mistakenly delete elements that are important to the system, this can disastrously affect its performance.

    That's all the information you need to know about the process of removing Comodo antivirus from your computer. Having completed these simple steps, you can easily cope with the task and you can proceed with the installation of other security software. We do not recommend leaving the system without antivirus protection, as modern malware develops and improves very quickly. If you want to remove another antivirus, then our special lesson on this subject may come in handy.

    Thank the author, share the article on social networks.