How to Install Comodo Firewall

Published on January 2017 | Categories: Documents | Downloads: 32 | Comments: 0 | Views: 234
of 15
Download PDF   Embed   Report

Comments

Content

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

GIZMO'S FREEWARE IS RECRUITING
We are currently looking for people with skills and/or interest in the following areas: - Anonymous Surfing Service - Web Browser for iOS If this sounds like you then click here for more details

How to Install Comodo Firewall
Updated 10. May 2012 - 18:32 by Chiron

This guide was written for version 5.10, also known as 2012, of Comodo Internet Security (CIS). This guide will also work equally well for configuring Comodo Firewall, but the screenshots are from CIS.

Index
1. Overview Of HIPS Programs 2. Installing Comodo Internet Security 3. Configuration A) General Configuration B) Configure Antivirus C) Configure Firewall D) Configure Defense+ And Sandbox 4. Further Questions

1. Overview Of HIPS Programs

If you're concerned about your PC's security then using a Host Intrusion Prevention System (HIPS) is a great addition to your protection regime. A HIPS prevents unknown programs from altering any part of your system without permission. Therefore malware is automatically prevented from doing any damage.

In this way HIPS is superior to detection-based software, such as traditional antivirus applications, because it will stop any type of malware. It will even protect you against zero-day malware. A HIPS is able to do this because it automatically blocks any files that have not been verified as safe. It then asks you if you want to give them access to your computer. Of course the obvious downside to this approach is that just as there are many millions of malicious programs there are also millions of safe ones. Because HIPS vendors cannot instantly analyze every possible legitimate program it's quite possible that you may receive questions about some safe programs, as well as dangerous ones.

1 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

In response to this HIPS vendors have developed extensive whitelists. These are databases of known safe programs. If a program is known to be safe, or is produced by a trusted vendor, you won't have to answer any questions about it and the program will be allowed complete access to your computer. Thus the number of alerts you get for everyday applications is very small.

With the strength of a HIPS you may be wondering if you still need to run a traditional antivirus software alongside it. While you can theoretically do without one, assuming you know which programs to allow or block, my advice is to still use an antivirus. With a traditional AV in the loop most threats will be eliminated before the HIPS can even examine the suspect file. Thus if a signature for the particular malware already exists, which is not always the case, you will be protected from the possibility of making a bad decision. There are pros and cons to both HIPS and antiviruses but I find that they complement each other very nicely.

Comodo Firewall is one of the best known HIPS firewalls, and for good reason. In addition to providing rock solid protection it's also entirely free. If you like you can even download Comodo Internet Security, which comes with Comodo Antivirus. This is also completely free and very reliable.

2. Installing Comodo Internet Security

Before installing security software designed to protect your computer I find it's best to first ensure that your computer is clear of malware. I know it sounds like strange advice but this can prevent many problems further down the road. For this please follow the advice that I give in my article about How to Know If Your Computer Is Infected.

If your computer is clean then there is one thing I'd do. As described in that article you can submit the safe programs, that are unrecognized, on your computer to Comodo. Instructions for how to submit programs, or individual files that belong to programs, can be found in this topic of the Comodo forums. Make sure you read through the first post entirely. Only post download links for them if you are sure that the program is safe. Otherwise post links to the scanning results, as explained in the post. These submissions will be quickly analyzed by Comodo staff and, if appropriate, added to the whitelist. However, in order to submit programs you do need to have an account on the Comodo forums. If you don't already have one then it's very easy, and rewarding, to get one. There is an option to register on the top of any page on the Comodo forums. By doing this you will ensure that CIS will be very quiet on your computer. Once all the programs are trusted on your computer than the only time you will see an alert is the first time they try to connect to the internet or when they update. Thus CIS will become very quiet for you. After this is done you can proceed to download the installer. Here are the download locations for either Comodo Internet Security or Comodo Firewall. If, at a later time, you decide that you want to switch from one to the other than you can accomplish this by going to the start menu, finding Comodo, and selecting the option to "Add and Remove components".

During installation you will be given the choice to change your DNS servers to Comodo Secure DNS Servers. If you don't know what a DNS server does

2 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

then I would recommend you read this article on What DNS Servers Do. Personally, I would recommend switching to the Comodo Secure DNS Servers because it will automatically block any websites that Comodo knows to be dangerous. However, if you would prefer to use another DNS server, or just use the default one from your ISP, then you can deselect that option. Also, I would leave the option to “enable 'Cloud Based Behavior Analysis' of unrecognized programs” checked. This will upload all active unrecognized programs to Comodo for analysis. It will only do this if they have not already been uploaded from someone else's computer. These files will then either be added to the safelist or added to the definitions for the antivirus. This is done entirely on Comodo's end so that you don't have to do any work.

Other than that I advise that you select the small option near the bottom of the window that says "Customize Installer". This will give you the option to change some parts of the program before it is even installed. Assuming you're installing both the antivirus and firewall, and will be following the rest of my advice, then I would consider the option to install Comodo GeekBuddy. This is a free trial program with which Comodo technicians can remotely diagnose, but not fix, problems with your computer. This trial period will only start once you first use it. If you decide to purchase the product then the technicians can also remotely fix any problems with your computer. However, if this does not sound useful then you can choose to not install it. Also, if you do choose to install it you can always choose to uninstall it later. Personally I choose not to install it, but the choice is yours. You are also given the option to install the Comodo Dragon browser. If you do not wish to install this then deselect this option.

Some time after the installation is complete, assuming you installed CIS, it will begin scanning your computer. If you are sure that your computer is not infected you can cancel this can. You may also choose to disable User Account Control (UAC). Personally I do disable it. However, there are some reasons to leave it enabled if your computer has more than one user. One problem is that disabling this will turn off protected mode in Internet Explorer. It will also disable file/registry virtualization for Windows Vista and 7. In general, UAC controls who can run specified applications that require elevated Administrator privileges. For more information please read this article.

UAC can be very useful for computers that have more than one account. If this is the case then instead of disabling it you may prefer to use a program like TweakUAC to disable it on one account or switch it to 'quiet mode'. This program is reviewed in this article. My advice would be that if you only have one user account then disable it. However, as always, the choice is yours.

3. Configuration

Configuring Comodo Internet Security, or Comodo Firewall, actually isn't that difficult. The default configuration is quite robust. However, there are some changes that can be made to increase this protection even further.

A) General Configuration

First you should change the default configuration to Proactive Security. To do this

3 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

right click on the icon for CIS, in the taskbar, and select the option for "Configuration". Select "Proactive Security". It will prompt you to restart. Restart your computer. "Proactive Security" is the most secure configuration of Comodo Internet Security.

B) Configure Antivirus

Assuming you chose to install Comodo Internet Security you also installed the antivirus component. Open the program and go to the Antivirus tab. Click on “Scanner Settings” and select the tab for “Manual Scanning”. Under this tab I would recommend selecting the option to “Enable cloud scanning” and also to “Submit unknown files for analysis". Make sure that you click "OK". What this will do is always check files against the very latest definitions and send all unknown files to Comodo for analysis. This will not only help increase their databases of malware and safe files, which will help you and everyone else in the community, but your scans would also be more likely to catch the latest malware. The problem with this setting is that your scans will take longer to complete.

Also, for those who are sure that their computer is clean, there is a trick to get rid of the message telling you that you have to scan your computer. For this follow these steps. Go to the tab for “Exclusions” and select the button for “Add” and then “Browse Files”. In the box where it asks to “Add new item” just put a (*). Type this without parenthesis. This will tell it to exclude all files. Select Apply. After this make sure that you select "OK". This will save your settings. If you don't do this then all of your changes will be lost. Now run the full scan. After it has finished, which shouldn't take long, you need to go back to the “Exclusions” tab and remove that exclusion. It's very important that you remove this exclusion. If it is left in then the antivirus component will not warn you about any dangerous files. To remove it simply go back the the antivirus excusions tab, left click on the (*) exclusion, and click remove. Then select "OK".

C) Configure Firewall

There are also some changes that can be made to the Firewall component. Open the program and go to the Firewall tab. Click on "Stealth Ports Wizard" and select the option to "Block all incoming connections and make my ports stealth for everyone". In general this is the best choice but it may interfere with some programs. If you have problems getting a program to connect to the internet instead select the option to "Alert me to incoming connections and make my ports stealth on a per-case basis". This will configure the firewall to ask your permission any time there is an incoming connection that Comodo Internet Security doesn't already know to allow or block.

While still under the Firewall tab go to the "Firewall Behavior Settings". Select the tab for "General Settings" and select the option to "Enable IPv6 filtering". Also, if you are not using TrustConnect you can deselect the options to "Show Trustconnect alerts for unsecured wireless networks" and to "Show Trustconnect alerts for public networks". This way it will not warn you about it. TrustConnect is a very useful tool but not everyone is willing to pay for it. If you're one of those people, but still spend a lot of time connecting through unsecured wireless networks, then perhaps you would be interested in the free

4 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

version of TrustConnect. It can be found on this page and inserts ads for Comodo products at the top of your pages. Also, it does require creating an account, but it's definitely worth it.

Now open the tab for "Alert Settings". Unless you are using Internet Connection Sharing on your network, and this PC is the "gateway", you can safely uncheck the box that says "This computer is an internet connection gateway". You can read more about Internet Connection Sharing on this site but if you don't already know what it is the chances are very high that you don't have it enabled.

Now open the "Advanced" tab and check the box to "Do protocol analysis". If your computer is part of a network, such as a wireless network, you should also check the boxes to "Protect the ARP Cache" and "Block Gratuitous ARP Frames". If you are not part of a network then you do not gain any security by checking them. You can check the other two boxes if you like, but they may affect performance. As before, you need to select "OK" in order to save your settings. If you don't do this then all of your changes will be lost.

After configuring the firewall portion of Comodo Internet Security this is what your configuration may look like.

D) Configure Defense+ And Sandbox

Now open the tab for "Defense+" and go to "Defense+ Settings". Open the tab for "Execution Control Settings". I would recommend changing the option to "Treat unrecognized files as" from "Partially Limited" to "Untrusted". Each time a program is sandboxed you will get a popup that asks you if you want to never sandbox it again. If you select not to then it will be added to your trusted files list. Only allow a program if you are 100% sure that it is safe. You can check the files by following the methods described in How to Tell if a File is Malicious. Select "OK" to save your changes.

In order to be protected from all malware that I am aware of you need to make a few more change to your configuration. Please go to the "Defense+" tab and select "Computer Security Policy". Ignore the warning that pops up and

5 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

continue. Inside of this select the tab for "Protected Files and Folders" and hit the edit button. Select yes and left click where is says "Important Files/Folders". Click "Add" and then from the drop-down menu click "Select From". Then choose "Browse". In the box for "Add new item" just copy and paste in the following path "\Global??\FltMgrMsg". Be sure that when you do this you do not include the quotes. Click "Apply" and then click "yes". Now scroll down to where it says "3rd Party Protocol Drivers". Left click on "3rd Party Protocol Drivers", select Add, click "Select From", and then click "Browse". Now copy in "\Device\KsecDD", again ignoring the quotes. Click "Apply" and then click "yes". Once again click "Apply". Then, without closing the window, go to the "Blocked Files" tab. Click "Add" and then select "Browse". In the box for "Add new item" just copy and paste in "*.locked", once again ignoring the quotes. Click "Apply" and then click "yes". Now click "OK". This is very important. Without selecting "OK" all of the above changes will be lost.

Note that instead of doing the above you can also choose to just go to the tab for "Protected Files and Folders". Then select "Add" and select "Browse". You can then copy in "C:\*", again ignoring the quotes, and select "Apply". Click "Yes" and then select "OK". This will actually protect every file on your C drive, although it will likely also cause an increased number of popups as well. It has been shown that the above steps are sufficient to protect against all malware I am currently aware of, but if you wish to be extra careful you can also protect your entire drive, although it will likely decrease the usability of CIS. The choice is yours.

There are also other options for how to treat unrecognized files. You can read more about these on this page of the online help files. To learn more about how Comodo's Sandbox works you can read this Introduction to the Comodo Sandbox. Also, if you do ever notice malicous behavior on your computer then restart the computer and the malicious processes should be gone upon reboot. That's the way the sandbox was designed to work.

4. Further Questions

Now Comodo Internet Security should be configured for maximum protection and maximum usability. At this point restart your computer and see if there are any problems. If you do have any questions then please peruse these FAQ's. If you still find your questions unanswered then you can search the Comodo Forums for a solution. If someone hasn't already created a post with the same problem please feel free to join the forum and create a post of your own. The community will do their best to help you with any problems that you may encounter.

If you believe this article deserves anything less than 5 stars please leave a comment below explaining how you think it can be improved or where you find fault. In fact I would appreciate any feedback, positive or negative, so that I can improve the article. Your opinions and advice are much appreciated.

If you found this article useful then perhaps you'd like to check out some my others.

6 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

How to Know If Your Computer Is Infected How to Clean An Infected Computer How to Stay Safe While Online How to Tell if a File is Malicious How to Protect Your Online Privacy How to Avoid Spam How to Report Spam How to Tell If A Website Is Dangerous

This software category is maintained by volunteer editor Chiron. Registered members can contact the editor with any comments or suggestions they might have by clicking here.

Average:
Average: 4.7 (214 votes)

Your rating:
Your rating: None

Article type: Tutorials / How-tos Printer-friendly version

COMMENTS
by Chiron on 10. May 2012 - 18:27 (93324) I've just updated my advice to protect against a new generation of ransomware. Please update your configuration as newly described in the Defense+ section. Let me know if you have any questions. Thanks.
1

reply

by Rafael Modesto (not verified) on 7. May 2012 - 22:32 (93187) Thanks a lot for your help and clearness with the comodo firewall installation. RM
1

reply

by Chiron on 8. May 2012 - 1:10 (93191) You're very welcome. Please let me know if you have any questions.
0

reply

by Chiron on 12. March 2012 - 22:34 (90302)

7 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

Comodo Internet Security version 5.10 has just been released: http://forums.comodo.com/news-announcements-feedback-cis/comodointernet...
22

reply

by Spook Murphy (not verified) on 24. February 2012 - 20:56 (89403) Thanks for the excellent write up. Proactive Security Challenge confirms Comodo is the only way to fly on the internet. http://www.matousec.com/projects/proactive-security-challenge /results.php Any other software is futile.
57

reply

by Chiron on 24. February 2012 - 23:07 (89412) Yes, that test does show Comodo Firewall to be much better than any of the tested competitors. However, be aware that the levels awarded in the test may not be quite as transparent as it would seem. An interesting article can be found here: https://www.techsupportalert.com/content/matousec-personalfirewall-test... That said, with the scoring method they use, a high score is still a high score. This takes nothing away from Comodo. It's still my number one pick in terms of which program can protect you from real threats on the internet. Manufactured tests like Matousec and AV-tests must always be taken with a grain of salt. It's people's real-life experience that's most useful and there's one thing I've noticed. My whole time on the Comodo forum I've never seen anyone who got infected without accidentally allowing malware through an alert or configuring it incorrectly. Now that's truly an accomplishment.
36

reply

by alexxx46 on 24. February 2012 - 19:30 (89396) I personally have a dislike of Comodo Firewall. Yes it is a good app as long as one uses it, but uninstalling it a couple of years ago turned out to be a real headache for me. It left tons of garbage in the registry.
51

reply

by Chiron on 24. February 2012 - 23:02 (89411) Yes, sometimes (like all security programs) traces of it can be left on your computer. If you ever feel like installing it again you can read my advice on how to reinstall it, or uninstall it if you stop at the correct step. This can be found here: http://forums.comodo.com/install-setup-configuration-help-cis/mosteffec...
35

reply

by umpio (not verified) on 23. February 2012 - 19:46 (89312) Thank you for this great article! Comodo's products are such good but

8 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

they really need guides like this! They have a very good help website themselves but most of the time I don't have a clue how should I configure it. The only thing that really bothered me is how the CIS handles trusted applications and how it decides by itself which programs to trust by it's huge vendor list. This kind of trust for program even though it's a security based is too much for me. After all the programs are the reason for all the viruses and malicious behavior. For this reason I wanted to disable the feature and if I would use it I only would want to add my own trusted vendors that I know and that I'm 100% sure that they are trustful. I searched for the solution for this and found this. delete the whole vendor list Vendors can be deleted one by one but there is also a method to remove them all at once. The file "vendor.n" contains all the vendors. It's located in the CIS application folder under the "database" and it can be deleted or replaced by an empty text file. I'm not sure will it be fully replaced by future updates but I'll try to backup it when I have my own vendors added to it. Other settings that I changed. First, I set the firewall security level to "Custom policy". By this setting firewall will alert every setting that is not in the Network Security Policy. Second, I enabled the "create rules for safe applications". By this setting I believe the firewall will learn safe applications which are included in the Trusted Files list or Trusted Vendors list. Third, because of the second option I also set the firewall alert level to "Very High" to prompt me of all the possible alerts. Fourth, I disabled the "do not show popup alerts". The description for it: "This option allows you to configure whether or not to show firewall alerts when malware is encountered." Why is it enabled by default and set to "Allow request"? As of now the firewall is configure to the maximum protection but it will still learn all the rules for safe applications which I have trusted by myself. For the defence+ I'm not sure which mode should I set it to. It also has the setting for create rules for safe applications. Therefore the paranoid mode would be my guess for maximum protection. But what if I encounter an untrusted file? I could't know if it is really a malicious by watching all the alerts of defence+. I guess the sandboxing and scanning the file in the cloud would be the best methods to be used in this situation.
38

reply

by Chiron on 23. February 2012 - 21:10 (89315) Yep, there are tons of configurations you can make to Comodo Firewall. If I included even a brief overview of all of them this article would be unimaginably long and complicated. Thus I condensed my advice into a very good starting point. The problem with a lot of the changes you have made, which you will find out, is that you will get alerts for a lot of programs, even thought they are trusted by Comodo. My approach is a very good compromise between usability and security, with extra emphasis put on usability. What I would recommend is that you configure it the way I recommend, and then tweak it from there. For example, did you put yours in Proactive Security? If you had some of the questions you asked me would have already been changed by default.

9 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

Thank you.
38

reply

by umpio (not verified) on 24. February 2012 - 16:38 (89387) It's true that Comodo's approach is to make as user friendly security program as possible by hiding all the popups and maintaining the Trusted Vendor list. Could you provide some more info on how the trusted vendor list really works out? Now I have the feeling that the list has only the names of the vendors whom to trust. Couldn't it then be used as a security hole? What if I download a malicious program that has been created by modifying the original which is certified and included in the Comodo's list? Wouldn't this program then bypass CIS? If not then there are no other reasons to remove the vendors than to get the full control of the firewall and this can be also achieved by setting the firewall security level to "Custom Policy". And yes, I activated the Proactive Security just as you described and followed by the other recommendations. But e.g. the "do not show popup alerts" was still enabled by default. About the lots of alerts, it really doesn't bother me. This what I wanted in the first place! And I don't think that they are overwhelming as I get them only for the first time because the option "create rules for trusted applications" will handle all the trusted files. I also tested defence+ in "Clean PC Mode" which means that only new files are considered as untrusted and thus alerted to the user. The point was that there are other possible approaches to configure CIS even for the paranoids! :) I wanted to get all the control of it and it can be indeed achieved.
39

reply

by Chiron on 24. February 2012 - 19:24 (89395) If a file has been modified then the certification will be invalid and it will no longer be trusted. The certification guarantees who made the file and that it has not been modified. The only thing I'd be worried about with the TVL is a company that used to be reputable, and is therefore in the TVL, and is now creating malware. That does happen sometimes. That's why there's this topic: http://forums.comodo.com/av-false-positivenegativedetection-reporting/r... However, just about all of these are companies that are now putting out what would be created adware, which is only barely malicious. I'm not too concerned about it. However, I do have a proposed solution, which is discussed here: http://forums.comodo.com/wishlist-cis/idea-to-preventtrusted-malware-fr... I hope this helps you to better understand the pros and cons of the TVL. I truly believe that the pros vastly outweigh the cons, but of course it's up to you to decide what's best for you.
34

reply

by Hande (not verified) on 12. February 2012 - 21:22 (88739)

10 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

Hi! Thanks, good article. Only thing i had to rollback was adding \Device\KsecDD to Defense+ > Protected files and folders settings. It gave massive negative results on Comodo Leak test -utility, reporting lot's of failed security test items. If i left that custom setting undone, there was 340/340 fully passed results with leak test. If adding \Device\KsecDD as protected service is real issue or not, i can not say. It seems strange, that is affeting Leaktest so much, since it seems valid measure for additional protection. I'm running Comodo Firewall+Avast and Windows 7 64-bit.
38

reply

by Chiron on 12. February 2012 - 21:55 (88740) I would certainly add that to your settings. Without it you are vulnerable to certain variants of malware that, if you do not reenable it, can encrypt all files on your computer which are not explicitly added to the protected files list. It's important to add that protection. Personally, I don't pay much attention to the leak test. It's also notoriously difficult to test with the sandbox and, also, I've never heard of anyone getting infected with the settings I recommend here. In conclusion, it's a very good idea for you to add \Device\KsecDD to Defense+ to your Protected files and folders settings.
37

reply

by Hande (not verified) on 12. February 2012 - 22:38 (88742) Thanks and true, makes a lot of sense having that \Device \KsecDD -setting included for not letting malware attack by unauthorized encrypting (which would be a biggie). Agree, most probably Comodo Leak test result not to be trusted here (many people seem to have issues with it) In general, Comodo Leak test might have many issues on valid testing results, if you are not running specific "default" configuration with Comodo firewall + defense.
60

reply

by Michael E (not verified) on 8. February 2012 - 20:32 (88533) Thanks very much - I appreciated all your effort.
37

reply

by Chiron on 11. February 2012 - 23:00 (88702) You're very welcome. Please let me know if you have any questions.
50

reply

by Konstantin (not verified) on 25. January 2012 - 15:05 (87759) Thank you very much for this up-to-date and well writen guide! Without it I wouldn't be using Comodo, because I was unsure if I set it right.
38

reply

11 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

by Konstantin (not verified) on 25. January 2012 - 19:48 (87772) Also a quick question. Why didn't you check rootkit scan in manual scan?
39

reply

by Chiron on 26. January 2012 - 15:34 (87835) One reason is that I still find their rootkit scanner to have a few too many false positives. Also, that said, it doesn't add any depth to the scan if you have already followed the methods I describe here: http://www.techsupportalert.com/content/how-know-if-yourcomputer-infect... in order to know if your computer is infected. If you've assured that your computer isn't infected, and you have CIS installed the way I suggest, then you won't get infected with a rootkit anyway, unless you allow a dangerous alert. Thus I don't see a reason to devote scanning resources to scanning for rootkits. Please let me know if you have any other questions. Thanks.
40

reply

by Konstantin (not verified) on 26. January 2012 19:20 (87843) Thank you for your reply! I indeed installed Comodo using methods described in your guide to ensure my PC isn't infected. Concerning other questions, your guide is so good that I don't have any left. Thank you very much for your help!
41

reply

by sean029323 (not verified) on 3. January 2012 - 2:22 (86445) Is checking 'Enable adaptive mode under low system resources' in Defense+ necessary? By default it was checked on my system but Comodo help lists it as disabled by default. Comodo help also lists a warning about it reducing performance. Do you suggest I keep it enabled?
81

reply

by Chiron on 3. January 2012 - 20:23 (86490) This feature was meant to supply additional protection, especially for computers running 64 bit operating systems. It's automatically checked if you select the "Proactive Security" configuration. My advice is that if you're not seeing any problems with your computer then leave it enabled.
66

reply

by sean029323 (not verified) on 3. January 2012 22:39 (86496) Thanks for your help

12 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

49

reply

by Chiron on 4. January 2012 - 3:38 (86511) You're very welcome. Please let me know if you have any other questions.
57

reply

by Canonymous (not verified) on 20. December 2011 - 18:15 (85469) Hi there: Sorry for being off-topic. But I really appreciate your help, if any is given. I've given try-outs to Comodo Internet Security on several occasions, using different versions, of course. However, I've never adopted this internet security tool as an item of defense arsenal, since I think it's a big frustrating pain in the bollos not being able to restore ALL and every item of a configuration so painstakingly done to the best of my humble security knowledge. Whenever I restore a backuped general settings - be it the Internet Security one or whatever - the program sure doesn't do this FULLY: several items of my personalized configuration are lost or not completely restored at all. Did anyone of you guys out there also experience this whenever you tried to restore - after reformatting your hard drive, for example - your CIS settings? Also, CIS never seem to remember the whole of its settings thoroughly - it keeps prompting me now and again for a decision action regarding this or that program, when in fact I had already given permission for it to operate/not to operate in this or that respect. Is there any solution to this "problem"? This is one that seems to persist since long past versions... Being such a complex suite of tools as it is, its devs should give great attention to this. Thanks in advance for your help. MCHAL
54

reply

by Chiron on 20. December 2011 - 19:04 (85473) I'm not entirely sure about this, since I generally just re-install and lose all my settings. This is by choice. You will get more help if you post it here: http://forums.comodo.com/install-setup-configuration-help-cisb137.0/ in the Comodo forums. Thanks.
56

reply

13 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

by Canonymous (not verified) on 20. December 2011 19:33 (85484) Hi, Thanks for your help. I've already posted this same support request there. Regards.
53

reply

by tja23 (not verified) on 20. December 2011 - 9:52 (85397) Chiron: An additional setting on the new 5.9 D+ General Settings (at bottom): Enable enhanced protection mode. Reference: http://forums.comodo.com/defense-sandbox-faq-cis/enhancedprotection-mode-what-is-it-v5-t77464.0.html Enhanced protection mode, what is it? [v.5] « on: October 15, 2011, 04:19:06 AM » The previous way that CIS hooked into 64bit OS could be defeated by some malware. Enhanced protection mode resolves this. To select use the tick box in D+ ~ D+ settings ~ General settings and reboot. [...] 64 Bit systems You should only switch enhanced mode off on 64 bit systems if it is causing problems. Your system will be more vulnerable to malware if you switch it off.
57

reply

by Chiron on 20. December 2011 - 16:00 (85446) If you follow my advice it should be turned on. Switching to proactive security enables it. Actually, that's why the reboot is required.
53

reply

1

2

3

4

5

next ›

last »

POST NEW COMMENT
Your name: * Anonymous E-mail: *
The content of this field is kept private and will not be shown publicly.

Comment: *

14 of 15

5/12/2012 12:17 PM

How to Install Comodo Firewall

http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

Notify me when new comments are posted All comments
PREVIEW SAVE

Replies to my comment

15 of 15

5/12/2012 12:17 PM

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close