The genuine cis.exe file is a software component of Comodo Internet Security by Comodo.
Comodo Internet Security is a group of security programs that protect computers against malware, viruses, spyware, trojans and computer worms. Cis.exe runs core processes required for the proper functioning of Comodo Internet Security. This is not an essential process for Windows and can be disabled if known to create problems. Comodo Internet Security (CIS) is available for the Windows, Mac OS X, and Linux. The program is distributed under the freemium model through three editions: Complete, Pro and the core free edition. All editions contain an antivirus, anti-rootkit and anti-spyware program, a sandbox, a personal firewall, and Defence+ (a host-based intrusion prevention system). The Comodo Group, Inc. is a group of American companies that design and develop computer software and provide SSL digital certificates, specializing particularly on computer and internet security. Comodo was founded by Melih Abdulhayoğlu in 1998 in the United Kingdom before relocating to the United States in 2004. The Comodo group is currently based in Clifton, New Jersey, USA.
CIS stands for COMODO Internet Security
The .exe extension on a filename indicates an executable file. Executable files may, in some cases, harm your computer. Therefore, please read below to decide for yourself whether the cis.exe on your computer is a Trojan that you should remove, or whether it is a file belonging to the Windows operating system or to a trusted application.
The process known as COMODO Internet Security belongs to software COMODO Firewall or COMODO Internet Security Premium or COMODO Internet Security or COMODO Internet Security Complete (version 2013) by COMODO (www.comodo.com).
Description: Cis.exe is not essential for the Windows OS and causes relatively few problems. Cis.exe is located in a subfolder of "C:\Program Files".
Known file sizes on Windows 10/8/7/XP are 9,612,472 bytes (16% of all occurrences), 8,788,696 bytes and 16 more variants.
The file is digitally signed. The file is not a Windows core file. The program has no visible window. Cis.exe is able to monitor applications, record keyboard and mouse inputs and manipulate other programs. Therefore the technical security rating is 23% dangerous.
Recommended: Identify cis.exe related errors
Important: Some malware camouflages itself as cis.exe, particularly when located in the C:\Windows or C:\Windows\System32 folder. Therefore, you should check the cis.exe process on your PC to see if it is a threat. We recommend Security Task Manager for verifying your computer's security. This was one of the Top Download Picks of The Washington Post and PC World.
A clean and tidy computer is the key requirement for avoiding problems with cis. This means running a scan for malware, cleaning your hard drive using 1cleanmgr and 2sfc /scannow, 3uninstalling programs that you no longer need, checking for Autostart programs (using 4msconfig) and enabling Windows' 5Automatic Update. Always remember to perform periodic backups, or at least to set restore points.
Should you experience an actual problem, try to recall the last thing you did, or the last thing you installed before the problem appeared for the first time. Use the 6resmon command to identify the processes that are causing your problem. Even for serious problems, rather than reinstalling Windows, you are better off repairing of your installation or, for Windows 8 and later versions, executing the 7DISM.exe /Online /Cleanup-image /Restorehealth command. This allows you to repair the operating system without losing data.
To help you analyze the cis.exe process on your computer, the following programs have proven to be helpful: ASecurity Task Manager displays all running Windows tasks, including embedded hidden processes, such as keyboard and browser monitoring or Autostart entries. A unique security risk rating indicates the likelihood of the process being potential spyware, malware or a Trojan. BMalwarebytes Anti-Malware detects and removes sleeping spyware, adware, Trojans, keyloggers, malware and trackers from your hard drive.