Dragon, Virtual Dragon, and the Poodle Attack Mitigation

So we have been verifying our browsers do not support SSLv3 to mitigate the risks of the Poodle attacks. Firefox is OK, seems by default for our versions, though we are modifying the about:config to be sure (I understand v34 will remove all SSL support); IE had to modify options to turn off SSLv3; Chrome you can run a modified shortcut that starts Chrome with the “–ssl-version-min=tls1” option, and in fact that also works for Dragon.
BUT you can’t do this with the Virtual dragon. Launching Virtual Dragon with this startup command does not disable SSLv3. I have many users who run the virtual version of the browser. It there a way to run Virtual Dragon with SSL disabled??

When I run this it’s not vulnerable according to https://www.poodletest.com

“C:\Program Files\COMODO\COMODO Internet Security\virtkiosk.exe” -v “C:\Program Files (x86)\Comodo\Dragon\dragon.exe” --ssl-version-min=tls1

So you can’t disable ssl in Dragon?
I did end up just checking the browser with a couple of the poodle check sites and it is actually OK. Not sure why on the first system it was flagged as vulnerable.

Thanks for the reply.