How to Install Comodo Firewall

15
How to Install Comodo Firewall Updated 10. May 2012 - 18:32 by Chiron This guide was written for version 5.10, also known as 2012, of Comodo Internet Security (CIS). This guide will also work equally well for configuring Comodo Firewall, but the screenshots are from CIS. Index Overview Of HIPS Programs 1. Installing Comodo Internet Security 2. Configuration A) General Configuration B) Configure Antivirus C) Configure Firewall D) Configure Defense+ And Sandbox 3. Further Questions 4. 1. Overview Of HIPS Programs If you're concerned about your PC's security then using a Host Intrusion Prevention System (HIPS) is a great addition to your protection regime. A HIPS prevents unknown programs from altering any part of your system without permission. Therefore malware is automatically prevented from doing any damage. In this way HIPS is superior to detection-based software, such as traditional antivirus applications, because it will stop any type of malware. It will even protect you against zero-day malware. A HIPS is able to do this because it automatically blocks any files that have not been verified as safe. It then asks you if you want to give them access to your computer. Of course the obvious downside to this approach is that just as there are many millions of malicious programs there are also millions of safe ones. Because HIPS vendors cannot instantly analyze every possible legitimate program it's quite possible that you may receive questions about some safe programs, as well as dangerous ones. GIZMO'S FREEWARE IS RECRUITING We are currently looking for people with skills and/or interest in the following areas: - Anonymous Surfing Service - Web Browser for iOS If this sounds like you then click here for more details How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm 1 of 15 5/12/2012 12:17 PM

Transcript of How to Install Comodo Firewall

How to Install Comodo FirewallUpdated 10. May 2012 - 18:32 by Chiron

This guide was written for version 5.10, also known as 2012, of ComodoInternet Security (CIS). This guide will also work equally well for configuringComodo Firewall, but the screenshots are from CIS.

Index

Overview Of HIPS Programs1.

Installing Comodo Internet Security2.

Configuration

A) General Configuration

B) Configure Antivirus

C) Configure Firewall

D) Configure Defense+ And Sandbox

3.

Further Questions4.

1. Overview Of HIPS Programs

If you're concerned about your PC's security then using a Host IntrusionPrevention System (HIPS) is a great addition to your protection regime. AHIPS prevents unknown programs from altering any part of your systemwithout permission. Therefore malware is automatically prevented from doingany damage.

In this way HIPS is superior to detection-based software, such as traditionalantivirus applications, because it will stop any type of malware. It willeven protect you against zero-day malware. A HIPS is able to do thisbecause it automatically blocks any files that have not been verified as safe. Itthen asks you if you want to give them access to your computer. Of course theobvious downside to this approach is that just as there are many millions ofmalicious programs there are also millions of safe ones. Because HIPS vendorscannot instantly analyze every possible legitimate program it's quite possiblethat you may receive questions about some safe programs, as well asdangerous ones.

GIZMO'S FREEWARE IS RECRUITINGWe are currently looking for people with skills and/orinterest in the following areas:

- Anonymous Surfing Service- Web Browser for iOS

If this sounds like you then click here for more details

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

1 of 15 5/12/2012 12:17 PM

In response to this HIPS vendors have developed extensive whitelists. Theseare databases of known safe programs. If a program is known to be safe, or isproduced by a trusted vendor, you won't have to answer any questions about itand the program will be allowed complete access to your computer. Thus thenumber of alerts you get for everyday applications is very small.

With the strength of a HIPS you may bewondering if you still need to run a traditionalantivirus software alongside it. While you cantheoretically do without one, assuming you knowwhich programs to allow or block, my advice isto still use an antivirus. With a traditional AV inthe loop most threats will be eliminated beforethe HIPS can even examine the suspect file. Thusif a signature for the particular malware alreadyexists, which is not always the case, you will be protected from the possibilityof making a bad decision. There are pros and cons to both HIPS and antivirusesbut I find that they complement each other very nicely.

Comodo Firewall is one of the best known HIPS firewalls, and for good reason.In addition to providing rock solid protection it's also entirely free. If you likeyou can even download Comodo Internet Security, which comes with ComodoAntivirus. This is also completely free and very reliable.

2. Installing Comodo Internet Security

Before installing security software designed to protect your computer I find it's best to first ensure that your computer is clearof malware. I know it sounds like strange advicebut this can prevent many problems furtherdown the road. For this please follow the advicethat I give in my article about How to Know IfYour Computer Is Infected.

If your computer is clean then there is one thingI'd do. As described in that article you cansubmit the safe programs, that are unrecognized, on your computer toComodo. Instructions for how to submit programs, or individual files thatbelong to programs, can be found in this topic of the Comodo forums. Makesure you read through the first post entirely. Only post download links forthem if you are sure that the program is safe. Otherwise post links to thescanning results, as explained in the post. These submissions will be quicklyanalyzed by Comodo staff and, if appropriate, added to the whitelist. However,in order to submit programs you do need to have an account on the Comodoforums. If you don't already have one then it's very easy, and rewarding, toget one. There is an option to register on the top of any page on the Comodoforums. By doing this you will ensure that CIS will be very quiet on yourcomputer. Once all the programs are trusted on your computer than the onlytime you will see an alert is the first time they try to connect to the internet orwhen they update. Thus CIS will become very quiet for you. After this is doneyou can proceed to download the installer. Here are the download locations foreither Comodo Internet Security or Comodo Firewall. If, at a later time,you decide that you want to switch from one to the other than you canaccomplish this by going to the start menu, finding Comodo, and selecting theoption to "Add and Remove components".

During installation you will be given the choice to change your DNS serversto Comodo Secure DNS Servers. If you don't know what a DNS server does

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

2 of 15 5/12/2012 12:17 PM

then I would recommend you read this article on What DNS Servers Do.Personally, I would recommend switching to the Comodo Secure DNS Serversbecause it will automatically block any websites that Comodo knows to bedangerous. However, if you would prefer to use another DNS server, or justuse the default one from your ISP, then you can deselect that option. Also, Iwould leave the option to “enable 'Cloud Based Behavior Analysis' ofunrecognized programs” checked. This will upload all active unrecognizedprograms to Comodo for analysis. It will only do this if they have not alreadybeen uploaded from someone else's computer. These files will then either beadded to the safelist or added to the definitions for the antivirus. This is doneentirely on Comodo's end so that you don't have to do any work.

Other than that I advise that you select the smalloption near the bottom of the window that says"Customize Installer". This will give you the optionto change some parts of the program before it iseven installed. Assuming you're installing both theantivirus and firewall, and will be following the restof my advice, then I would consider the option toinstall Comodo GeekBuddy. This is a free trialprogram with which Comodo technicians canremotely diagnose, but not fix, problems with yourcomputer. This trial period will only start once you first use it. If you decide topurchase the product then the technicians can also remotely fix any problemswith your computer. However, if this does not sound useful then you canchoose to not install it. Also, if you do choose to install it you can alwayschoose to uninstall it later. Personally I choose not to install it, but the choice isyours. You are also given the option to install the Comodo Dragon browser. Ifyou do not wish to install this then deselect this option.

Some time after the installation is complete, assuming you installed CIS, it willbegin scanning your computer. If you are sure that your computer is notinfected you can cancel this can. You may also choose to disable User AccountControl (UAC). Personally I do disable it. However, there are some reasonsto leave it enabled if your computer has more than one user. One problem isthat disabling this will turn off protected mode in Internet Explorer. It will alsodisable file/registry virtualization for Windows Vista and 7. In general, UACcontrols who can run specified applications that require elevated Administratorprivileges. For more information please read this article.

UAC can be very useful for computers that have more than one account. If thisis the case then instead of disabling it you may prefer to use a programlike TweakUAC to disable it on one account or switch it to 'quiet mode'. Thisprogram is reviewed in this article. My advice would be that if you only haveone user account then disable it. However, as always, the choice is yours.

3. Configuration

Configuring Comodo Internet Security, or Comodo Firewall, actually isn't thatdifficult. The default configuration is quite robust. However, there are somechanges that can be made to increase this protection even further.

A) General Configuration

First you should change the defaultconfiguration to Proactive Security. To do this

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

3 of 15 5/12/2012 12:17 PM

right click on the icon for CIS, in the taskbar,and select the option for "Configuration".Select "Proactive Security". It will prompt youto restart. Restart your computer. "Proactive Security" is the most secureconfiguration of Comodo Internet Security.

B) Configure Antivirus

Assuming you chose to install Comodo InternetSecurity you also installed the antiviruscomponent. Open the program and go to theAntivirus tab. Click on “Scanner Settings” andselect the tab for “Manual Scanning”. Under thistab I would recommend selecting the option to“Enable cloud scanning” and also to “Submitunknown files for analysis". Make sure that youclick "OK". What this will do is always check filesagainst the very latest definitions and send allunknown files to Comodo for analysis. This willnot only help increase their databases of malware and safe files, which will helpyou and everyone else in the community, but your scans would also be morelikely to catch the latest malware. The problem with this setting is that yourscans will take longer to complete.

Also, for those who are sure that their computer is clean, there is a trick to getrid of the message telling you that you have to scan your computer. For thisfollow these steps. Go to the tab for “Exclusions” and select the button for“Add” and then “Browse Files”. In the box where it asks to “Add new item” justput a (*). Type this without parenthesis. This will tell it to exclude all files.Select Apply. After this make sure that you select "OK". This will save yoursettings. If you don't do this then all of your changes will be lost. Now run thefull scan. After it has finished, which shouldn't take long, you need to go backto the “Exclusions” tab and remove that exclusion. It's very important that youremove this exclusion. If it is left in then the antivirus component will not warnyou about any dangerous files. To remove it simply go back the the antivirusexcusions tab, left click on the (*) exclusion, and click remove. Then select"OK".

C) Configure Firewall

There are also some changes that can be made to the Firewall component.Open the program and go to the Firewall tab. Click on "Stealth Ports Wizard"and select the option to "Block all incoming connections and make my portsstealth for everyone". In general this is the best choice but it may interferewith some programs. If you have problems getting a program to connect to theinternet instead select the option to "Alert me to incoming connections andmake my ports stealth on a per-case basis". This will configure the firewall toask your permission any time there is an incoming connection that ComodoInternet Security doesn't already know to allow or block.

While still under the Firewall tab go to the "Firewall Behavior Settings". Selectthe tab for "General Settings" and select the option to "Enable IPv6 filtering".Also, if you are not using TrustConnect you can deselect the options to "ShowTrustconnect alerts for unsecured wireless networks" and to "ShowTrustconnect alerts for public networks". This way it will not warn you about it.TrustConnect is a very useful tool but not everyone is willing to pay for it. Ifyou're one of those people, but still spend a lot of time connecting throughunsecured wireless networks, then perhaps you would be interested in the free

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

4 of 15 5/12/2012 12:17 PM

version of TrustConnect. It can be found on this page and inserts ads forComodo products at the top of your pages. Also, it does require creating anaccount, but it's definitely worth it.

Now open the tab for "Alert Settings". Unless you are using InternetConnection Sharing on your network, and this PC is the "gateway", you cansafely uncheck the box that says "This computer is an internet connectiongateway". You can read more about Internet Connection Sharing on thissite but if you don't already know what it is the chances are very high that youdon't have it enabled.

Now open the "Advanced" tab and check the box to "Do protocol analysis". Ifyour computer is part of a network, such as a wireless network, you shouldalso check the boxes to "Protect the ARP Cache" and "Block Gratuitous ARPFrames". If you are not part of a network then you do not gain any security bychecking them. You can check the other two boxes if you like, but they mayaffect performance. As before, you need to select "OK" in order to save yoursettings. If you don't do this then all of your changes will be lost.

After configuring the firewall portion of Comodo Internet Security this is whatyour configuration may look like.

D) Configure Defense+ And Sandbox

Now open the tab for "Defense+" and go to "Defense+ Settings". Open the tabfor "Execution Control Settings". I would recommend changing the option to"Treat unrecognized files as" from "Partially Limited" to "Untrusted". Each timea program is sandboxed you will get a popup that asks you if you want tonever sandbox it again. If you select not to then it will be added to your trustedfiles list. Only allow a program if you are 100% sure that it is safe. You cancheck the files by following the methods described in How to Tell if a File isMalicious. Select "OK" to save your changes.

In order to be protected from all malware that I am aware of you need to makea few more change to your configuration. Please go to the "Defense+" tab andselect "Computer Security Policy". Ignore the warning that pops up and

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

5 of 15 5/12/2012 12:17 PM

continue. Inside of this select the tab for "Protected Files and Folders" and hitthe edit button. Select yes and left click where is says "ImportantFiles/Folders". Click "Add" and then from the drop-down menu click "SelectFrom". Then choose "Browse". In the box for "Add new item" just copy andpaste in the following path "\Global??\FltMgrMsg". Be sure that when you dothis you do not include the quotes. Click "Apply" and then click "yes". Nowscroll down to where it says "3rd Party Protocol Drivers". Left click on "3rdParty Protocol Drivers", select Add, click "Select From", and then click"Browse". Now copy in "\Device\KsecDD", again ignoring the quotes. Click"Apply" and then click "yes". Once again click "Apply". Then, without closingthe window, go to the "Blocked Files" tab. Click "Add" and then select"Browse". In the box for "Add new item" just copy and paste in "*.locked",once again ignoring the quotes. Click "Apply" and then click "yes". Now click"OK". This is very important. Without selecting "OK" all of the above changeswill be lost.

Note that instead of doing the above you can also choose to just go to the tabfor "Protected Files and Folders". Then select "Add" and select "Browse". Youcan then copy in "C:\*", again ignoring the quotes, and select "Apply". Click"Yes" and then select "OK". This will actually protect every file on your C drive,although it will likely also cause an increased number of popups as well. It hasbeen shown that the above steps are sufficient to protect against all malware Iam currently aware of, but if you wish to be extra careful you can also protectyour entire drive, although it will likely decrease the usability of CIS. Thechoice is yours.

There are also other options for how to treat unrecognized files. You can readmore about these on this page of the online help files. To learn more abouthow Comodo's Sandbox works you can read this Introduction to theComodo Sandbox. Also, if you do ever notice malicous behavior on yourcomputer then restart the computer and the malicious processes should begone upon reboot. That's the way the sandbox was designed to work.

4. Further Questions

Now Comodo Internet Security should be configured for maximum protectionand maximum usability. At this point restart your computer and see if there areany problems. If you do have any questions then please peruse theseFAQ's. If you still find your questions unanswered then you can searchthe Comodo Forums for a solution. If someone hasn't already created a postwith the same problem please feel free to join the forum and create a post ofyour own. The community will do their best to help you with any problems thatyou may encounter.

If you believe this article deserves anything less than 5 stars please leave acomment below explaining how you think it can be improved or where you findfault. In fact I would appreciate any feedback, positive or negative, so that Ican improve the article. Your opinions and advice are much appreciated.

If you found this article useful then perhaps you'd like to check out some myothers.

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

6 of 15 5/12/2012 12:17 PM

Average:

Average: 4.7 (214 votes)

Your rating:

Your rating: None

How to Know If Your Computer Is Infected

How to Clean An Infected Computer

How to Stay Safe While Online

How to Tell if a File is Malicious

How to Protect Your Online Privacy

How to Avoid Spam

How to Report Spam

How to Tell If A Website Is Dangerous

This software category is maintained by volunteer editor Chiron. Registeredmembers can contact the editor with any comments or suggestions they mighthave by clicking here.

Article type: Tutorials / How-tos

Printer-friendly version

COMMENTS

by Chiron on 10. May 2012 - 18:27 (93324)

I've just updated my advice to protect against a new generation ofransomware. Please update your configuration as newly described in theDefense+ section.

Let me know if you have any questions.

Thanks.

reply

by Rafael Modesto (not verified) on 7. May 2012 - 22:32 (93187)

Thanks a lot for your help and clearness with the comodo firewallinstallation.

RM

reply

by Chiron on 8. May 2012 - 1:10 (93191)

You're very welcome.

Please let me know if you have any questions.

reply

by Chiron on 12. March 2012 - 22:34 (90302)

1

1

0

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

7 of 15 5/12/2012 12:17 PM

Comodo Internet Security version 5.10 has just been released:http://forums.comodo.com/news-announcements-feedback-cis/comodo-internet...

reply

by Spook Murphy (not verified) on 24. February 2012 - 20:56 (89403)

Thanks for the excellent write up.Proactive Security Challenge confirms Comodo is the only way to fly onthe internet.http://www.matousec.com/projects/proactive-security-challenge/results.php

Any other software is futile.

reply

by Chiron on 24. February 2012 - 23:07 (89412)

Yes, that test does show Comodo Firewall to be much better than anyof the tested competitors. However, be aware that the levels awardedin the test may not be quite as transparent as it would seem. Aninteresting article can be found here:https://www.techsupportalert.com/content/matousec-personal-firewall-test...

That said, with the scoring method they use, a high score is still ahigh score. This takes nothing away from Comodo. It's still mynumber one pick in terms of which program can protect you from realthreats on the internet. Manufactured tests like Matousec andAV-tests must always be taken with a grain of salt. It's people'sreal-life experience that's most useful and there's one thing I'venoticed.

My whole time on the Comodo forum I've never seen anyone who gotinfected without accidentally allowing malware through an alert orconfiguring it incorrectly.

Now that's truly an accomplishment.

reply

by alexxx46 on 24. February 2012 - 19:30 (89396)

I personally have a dislike of Comodo Firewall. Yes it is a good app aslong as one uses it, but uninstalling it a couple of years ago turned out tobe a real headache for me. It left tons of garbage in the registry.

reply

by Chiron on 24. February 2012 - 23:02 (89411)

Yes, sometimes (like all security programs) traces of it can be left onyour computer. If you ever feel like installing it again you can readmy advice on how to reinstall it, or uninstall it if you stop at thecorrect step. This can be found here:http://forums.comodo.com/install-setup-configuration-help-cis/most-effec...

reply

by umpio (not verified) on 23. February 2012 - 19:46 (89312)

Thank you for this great article! Comodo's products are such good but

22

57

36

51

35

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

8 of 15 5/12/2012 12:17 PM

they really need guides like this! They have a very good help websitethemselves but most of the time I don't have a clue how should Iconfigure it.

The only thing that really bothered me is how the CIS handles trustedapplications and how it decides by itself which programs to trust by it'shuge vendor list. This kind of trust for program even though it's asecurity based is too much for me. After all the programs are the reasonfor all the viruses and malicious behavior. For this reason I wanted todisable the feature and if I would use it I only would want to add my owntrusted vendors that I know and that I'm 100% sure that they aretrustful.

I searched for the solution for this and found this.

delete the whole vendor list

Vendors can be deleted one by one but there is also a method to removethem all at once. The file "vendor.n" contains all the vendors. It's locatedin the CIS application folder under the "database" and it can be deletedor replaced by an empty text file. I'm not sure will it be fully replaced byfuture updates but I'll try to backup it when I have my own vendorsadded to it.

Other settings that I changed.

First, I set the firewall security level to "Custom policy". By this settingfirewall will alert every setting that is not in the Network Security Policy.

Second, I enabled the "create rules for safe applications". By this settingI believe the firewall will learn safe applications which are included in theTrusted Files list or Trusted Vendors list.

Third, because of the second option I also set the firewall alert level to"Very High" to prompt me of all the possible alerts.

Fourth, I disabled the "do not show popup alerts". The description for it:"This option allows you to configure whether or not to show firewall alertswhen malware is encountered." Why is it enabled by default and set to"Allow request"?

As of now the firewall is configure to the maximum protection but it willstill learn all the rules for safe applications which I have trusted bymyself.

For the defence+ I'm not sure which mode should I set it to. It also hasthe setting for create rules for safe applications. Therefore the paranoidmode would be my guess for maximum protection. But what if Iencounter an untrusted file? I could't know if it is really a malicious bywatching all the alerts of defence+. I guess the sandboxing and scanningthe file in the cloud would be the best methods to be used in thissituation.

reply

by Chiron on 23. February 2012 - 21:10 (89315)

Yep, there are tons of configurations you can make to ComodoFirewall. If I included even a brief overview of all of them this articlewould be unimaginably long and complicated. Thus I condensed myadvice into a very good starting point. The problem with a lot of thechanges you have made, which you will find out, is that you will getalerts for a lot of programs, even thought they are trusted byComodo.

My approach is a very good compromise between usability andsecurity, with extra emphasis put on usability. What I wouldrecommend is that you configure it the way I recommend, and thentweak it from there. For example, did you put yours in ProactiveSecurity? If you had some of the questions you asked me would havealready been changed by default.

38

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

9 of 15 5/12/2012 12:17 PM

Thank you.

reply

by umpio (not verified) on 24. February 2012 - 16:38 (89387)

It's true that Comodo's approach is to make as user friendlysecurity program as possible by hiding all the popups andmaintaining the Trusted Vendor list.

Could you provide some more info on how the trusted vendor listreally works out? Now I have the feeling that the list has only thenames of the vendors whom to trust. Couldn't it then be used asa security hole? What if I download a malicious program that hasbeen created by modifying the original which is certified andincluded in the Comodo's list? Wouldn't this program then bypassCIS? If not then there are no other reasons to remove thevendors than to get the full control of the firewall and this can bealso achieved by setting the firewall security level to "CustomPolicy".

And yes, I activated the Proactive Security just as you describedand followed by the other recommendations. But e.g. the "do notshow popup alerts" was still enabled by default.

About the lots of alerts, it really doesn't bother me. This what Iwanted in the first place! And I don't think that they areoverwhelming as I get them only for the first time because theoption "create rules for trusted applications" will handle all thetrusted files. I also tested defence+ in "Clean PC Mode" whichmeans that only new files are considered as untrusted and thusalerted to the user.

The point was that there are other possible approaches toconfigure CIS even for the paranoids! :) I wanted to get all thecontrol of it and it can be indeed achieved.

reply

by Chiron on 24. February 2012 - 19:24 (89395)

If a file has been modified then the certification will be invalidand it will no longer be trusted. The certification guaranteeswho made the file and that it has not been modified.

The only thing I'd be worried about with the TVL is a companythat used to be reputable, and is therefore in the TVL, and isnow creating malware. That does happen sometimes. That'swhy there's this topic:http://forums.comodo.com/av-false-positivenegative-detection-reporting/r...

However, just about all of these are companies that are nowputting out what would be created adware, which is onlybarely malicious. I'm not too concerned about it. However, Ido have a proposed solution, which is discussed here:http://forums.comodo.com/wishlist-cis/idea-to-prevent-trusted-malware-fr...

I hope this helps you to better understand the pros and consof the TVL. I truly believe that the pros vastly outweigh thecons, but of course it's up to you to decide what's best foryou.

reply

by Hande (not verified) on 12. February 2012 - 21:22 (88739)

38

39

34

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

10 of 15 5/12/2012 12:17 PM

Hi!

Thanks, good article. Only thing i had to rollback was adding\Device\KsecDD to Defense+ > Protected files and folders settings. Itgave massive negative results on Comodo Leak test -utility, reportinglot's of failed security test items. If i left that custom setting undone,there was 340/340 fully passed results with leak test.

If adding \Device\KsecDD as protected service is real issue or not, i cannot say. It seems strange, that is affeting Leaktest so much, since itseems valid measure for additional protection. I'm running ComodoFirewall+Avast and Windows 7 64-bit.

reply

by Chiron on 12. February 2012 - 21:55 (88740)

I would certainly add that to your settings. Without it you arevulnerable to certain variants of malware that, if you do not reenableit, can encrypt all files on your computer which are not explicitlyadded to the protected files list. It's important to add that protection.

Personally, I don't pay much attention to the leak test. It's alsonotoriously difficult to test with the sandbox and, also, I've neverheard of anyone getting infected with the settings I recommend here.

In conclusion, it's a very good idea for you to add \Device\KsecDD toDefense+ to your Protected files and folders settings.

reply

by Hande (not verified) on 12. February 2012 - 22:38 (88742)

Thanks and true, makes a lot of sense having that \Device\KsecDD -setting included for not letting malware attack byunauthorized encrypting (which would be a biggie). Agree, mostprobably Comodo Leak test result not to be trusted here (manypeople seem to have issues with it) In general, Comodo Leak testmight have many issues on valid testing results, if you are notrunning specific "default" configuration with Comodo firewall +defense.

reply

by Michael E (not verified) on 8. February 2012 - 20:32 (88533)

Thanks very much - I appreciated all your effort.

reply

by Chiron on 11. February 2012 - 23:00 (88702)

You're very welcome.

Please let me know if you have any questions.

reply

by Konstantin (not verified) on 25. January 2012 - 15:05 (87759)

Thank you very much for this up-to-date and well writen guide! Withoutit I wouldn't be using Comodo, because I was unsure if I set it right.

reply

38

37

60

37

50

38

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

11 of 15 5/12/2012 12:17 PM

by Konstantin (not verified) on 25. January 2012 - 19:48 (87772)

Also a quick question. Why didn't you check rootkit scan in manualscan?

reply

by Chiron on 26. January 2012 - 15:34 (87835)

One reason is that I still find their rootkit scanner to have a fewtoo many false positives.

Also, that said, it doesn't add any depth to the scan if you havealready followed the methods I describe here:http://www.techsupportalert.com/content/how-know-if-your-computer-infect...in order to know if your computer is infected. If you've assuredthat your computer isn't infected, and you have CIS installed theway I suggest, then you won't get infected with a rootkit anyway,unless you allow a dangerous alert.

Thus I don't see a reason to devote scanning resources toscanning for rootkits.

Please let me know if you have any other questions.

Thanks.

reply

by Konstantin (not verified) on 26. January 2012 -19:20 (87843)

Thank you for your reply! I indeed installed Comodo usingmethods described in your guide to ensure my PC isn'tinfected. Concerning other questions, your guide is so goodthat I don't have any left. Thank you very much for your help!

reply

by sean029323 (not verified) on 3. January 2012 - 2:22 (86445)

Is checking 'Enable adaptive mode under low system resources' inDefense+ necessary? By default it was checked on my system butComodo help lists it as disabled by default. Comodo help also lists awarning about it reducing performance. Do you suggest I keep itenabled?

reply

by Chiron on 3. January 2012 - 20:23 (86490)

This feature was meant to supply additional protection, especially forcomputers running 64 bit operating systems. It's automaticallychecked if you select the "Proactive Security" configuration.

My advice is that if you're not seeing any problems with yourcomputer then leave it enabled.

reply

by sean029323 (not verified) on 3. January 2012 -22:39 (86496)

Thanks for your help

39

40

41

81

66

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

12 of 15 5/12/2012 12:17 PM

reply

by Chiron on 4. January 2012 - 3:38 (86511)

You're very welcome.

Please let me know if you have any other questions.

reply

by Canonymous (not verified) on 20. December 2011 - 18:15 (85469)

Hi there:

Sorry for being off-topic. But I really appreciate your help, if any is given.I've given try-outs to Comodo Internet Security on several occasions,using different versions, of course. However, I've never adopted thisinternet security tool as an item of defense arsenal, since I think it's a bigfrustrating pain in the bollos not being able to restore ALL and every itemof a configuration so painstakingly done to the best of my humblesecurity knowledge. Whenever I restore a backuped general settings - beit the Internet Security one or whatever - the program sure doesn't dothis FULLY: several items of my personalized configuration are lost or notcompletely restored at all.

Did anyone of you guys out there also experience this whenever you triedto restore - after reformatting your hard drive, for example - your CISsettings? Also, CIS never seem to remember the whole of its settingsthoroughly - it keeps prompting me now and again for a decision actionregarding this or that program, when in fact I had already givenpermission for it to operate/not to operate in this or that respect.

Is there any solution to this "problem"? This is one that seems to persistsince long past versions... Being such a complex suite of tools as it is, itsdevs should give great attention to this.

Thanks in advance for your help.

MCHAL

reply

by Chiron on 20. December 2011 - 19:04 (85473)

I'm not entirely sure about this, since I generally just re-install andlose all my settings. This is by choice.

You will get more help if you post it here:http://forums.comodo.com/install-setup-configuration-help-cis-b137.0/in the Comodo forums.

Thanks.

reply

49

57

54

56

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

13 of 15 5/12/2012 12:17 PM

by Canonymous (not verified) on 20. December 2011 -19:33 (85484)

Hi,

Thanks for your help.

I've already posted this same support request there.

Regards.

reply

by tja23 (not verified) on 20. December 2011 - 9:52 (85397)

Chiron: An additional setting on the new 5.9 D+ General Settings (atbottom): Enable enhanced protection mode.

Reference:http://forums.comodo.com/defense-sandbox-faq-cis/enhanced-protection-mode-what-is-it-v5-t77464.0.html

Enhanced protection mode, what is it? [v.5]« on: October 15, 2011, 04:19:06 AM »

The previous way that CIS hooked into 64bit OS could be defeated bysome malware. Enhanced protection mode resolves this. To select usethe tick box in D+ ~ D+ settings ~ General settings and reboot.[...]64 Bit systemsYou should only switch enhanced mode off on 64 bit systems if it iscausing problems. Your system will be more vulnerable to malware if youswitch it off.

reply

by Chiron on 20. December 2011 - 16:00 (85446)

If you follow my advice it should be turned on. Switching to proactivesecurity enables it. Actually, that's why the reboot is required.

reply

1 2 3 4 5 next › last »

POST NEW COMMENT

Your name: *Anonymous

E-mail: *

The content of this field is kept private and will not be shown publicly.

Comment: *

53

57

53

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

14 of 15 5/12/2012 12:17 PM

All comments Replies to my comment

Notify me when new comments are posted

PREVIEW SAVE

How to Install Comodo Firewall http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

15 of 15 5/12/2012 12:17 PM