COMODO Internet Security 5.x Thread

Discussion in 'other anti-malware software' started by Mops21, Jul 4, 2011.

Thread Status:
Not open for further replies.
  1. guest

    guest Guest

    CIS does not differenciate internet files from unrecognized files, everying is trusted, malware or unknown.
    With the option always sandbox you can choose different levels for different applications

    http://help.comodo.com/topic-72-1-170-1735-Always-Sandbox.html
     
  2. NormanN

    NormanN Registered Member

    Joined:
    Jan 14, 2011
    Posts:
    67
    I think we're saying the same thing, it's the terms that we're missing on:) My browser is running sand boxed as 'Limited' (works fine) - but anything that isn't 'known' or 'recognized' or 'trusted' (by me or Comodo) gets run as 'Restricted' (probably gets broken). That's all I was trying to say.

    NN
     
  3. guest

    guest Guest

    Yes, I didn't understand you the first time.
     
  4. guest

    guest Guest

  5. jmonge

    jmonge Registered Member

    Joined:
    Mar 20, 2008
    Posts:
    13,744
    Location:
    Canada
    :thumb: thanks for the links
     
  6. Kernelwars

    Kernelwars Registered Member

    Joined:
    Aug 12, 2010
    Posts:
    2,155
    Location:
    TX
    thanks raiden :thumb:
     
  7. guest

    guest Guest

  8. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
  9. guest

    guest Guest

  10. zakazak

    zakazak Registered Member

    Joined:
    Sep 20, 2010
    Posts:
    529
    has anyone of you tried the comodo leak test? I "tweaked" my CIS to its best settings (also by using the leak test setup guide) and can't get a higher score than 190/340 :S
     
  11. guest

    guest Guest

    I don't think that the leak test is valid anymore, anyway if you want to test it you should turn off the sandbox.
    Take into account that if the leak test it sandboxed it will think that is able to modify things but really is only modifying something virtual.
     
  12. Hungry Man

    Hungry Man Registered Member

    Joined:
    May 11, 2011
    Posts:
    9,146
    Yep I've had CIS "fail" on multiple tests because they think that they can do things when they're just messing with a sandboxed area.
     
  13. zakazak

    zakazak Registered Member

    Joined:
    Sep 20, 2010
    Posts:
    529
    Mhh actually running the leak test in the comdo sandbox gave me better results :p

    @edit: okay i just disabled the sandbox and got 340/340.. thanks guys. before i said "dont isolate again" but it seems like it still got sandboxed by comodo :S
     
  14. khanyash

    khanyash Registered Member

    Joined:
    Apr 4, 2011
    Posts:
    2,429
    I read a lot about leaktest with CIS, here & Comodo forum.

    I think I am the lucky one with the leaktest. I get 340/340 with sandbox enabled & disabled both. This is on Win XP SP3 32 Bits.

    Thanxx
    Naren
     
  15. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
  16. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,649
    Location:
    Paris
    As CIS should be set to "Proactive Security" for optimal protection these changes really don't affect us.

    From the final paragraph:

    "The new alert reduction installation option has no effect on new CIS installations set to proactive configuration".
     
  17. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I've tried it with v5.5. It seems to work fine. The guide needs to be rewritten for v5.x though because the CIS user interface has changed from the time the guide was written.

    The guide shows how to configure CIS v4.1 to allow execution from only privileged locations, such as \windows and \program files. If an executable not in the privileged locations attempts to run, the executable is either blocked, or the user is prompted, depending on which option in the guide was followed.

    There is one problem though: CIS v5.x cannot control DLL execution, whereas v4.x can.

    I'd like to gauge interest in having the guide updated for CIS v5.x, so please let your voice be heard if you're genuinely interested. Also, if you're interested, do you plan to use CIS purely as an anti-executable?
     
  18. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    I am interested in seeing a updated guide MrBrian. I hope you decide to rewrite..
     
  19. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Thanks for your input 1chaoticadult :). I see you're using AppLocker already. Are you considering not using AppLocker anymore?

    I see that CIS v5.x has the option to block untrusted files. Is there a way to have CIS automatically consider all files within a given folder as trusted (including new files created within the given folder in the future)?
     
  20. Zyrtec

    Zyrtec Registered Member

    Joined:
    Mar 4, 2008
    Posts:
    534
    Location:
    USA
    Hey,

    This question goes to MrBrian as he has shown a lot of knowledge of how to setup D+ to act as an anti-executable...

    I am running only the firewall part of CIS [with D+] alongside with my AV which is ESET NOD32 v4.2.71 on Windows 7 Pro SP-1.

    I am curious about how can I setup D+ to make it protect the folders shown below from non-legitimate programs executing there.
    Usually, many Fake AVs and rootkits love executing on these locations.

    How do I setup rules on D+ to protect these folders?

    Win XP
    C:\Documents and Settings\*\Local Settings\Application Data\*.exe
    C:\Documents and Settings\*\Local Settings\Application Data\*.sys



    Win 7

    C:\Documents and Settings\*\Application Data\*.exe
    C:\Documents and Settings\*\Application Data\*.sys



    Thanks in advance for your replies.


    Kind regards,


    Carlos
     
  21. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    In my guide you'll see mention of a file group named Global Blacklist. Follow at least those steps that mention Global Blacklist. In step 20, you specify which folders you want blocked. The location of the Global Blacklist policy should be moved relatively near the top in the Computer Security Policy list, because policy order matters.

    Test if it works by putting an .exe in one of the folders you listed, and see if it's blocked when you try to run it.
     
    Last edited: Sep 24, 2011
  22. Zyrtec

    Zyrtec Registered Member

    Joined:
    Mar 4, 2008
    Posts:
    534
    Location:
    USA
    Thanks for your prompt response.

    I will try your suggestions. Although, they seem to be written for CIS 4.1 and I'm actually running the most recent version of the Firewall/D+ [version 5.5].

    Would those settings still work for 5.5?

    Thanks.


    Carlos
     
  23. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    You're welcome Carlos :).

    The techniques mentioned in the guide still work for v5.5, but the location of various user interface items has changed since v4.1, so it may be difficult to follow. You won't get DLL execution control in v5.x, whereas you can in v4.x, so my guide for CIS v4.x with DLL execution control is more secure than v5.x.
     
  24. 1chaoticadult

    1chaoticadult Registered Member

    Joined:
    Oct 28, 2010
    Posts:
    2,342
    Location:
    USA
    No I like AppLocker and prefer using it, I just think it would be interesting to have this guide as I might setup someone else's pc I know with this setup.
     
  25. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    I also use AppLocker, though I've considered using CIS as an anti-executable in addition to or perhaps instead of AppLocker because AppLocker can be circumvented by design.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.