- Jul 3, 2015
- 8,153
what do you say about glasswire, to keep the user informed?I think, generally, an outbound firewall with alerts for most users is a good thing
what do you say about glasswire, to keep the user informed?I think, generally, an outbound firewall with alerts for most users is a good thing
what do you say about glasswire, to keep the user informed?
I agree with you.
I think, generally, an outbound firewall with alerts for most users is a good thing. It's very unfortunate that this is not an integral capability of Windows Firewall.
* * * * *
If you use COMODO Internet Security and set the firewall to block all outbound connections for Untrusted\Unknown processes (which means that they should be auto-sandboxed), then that is exactly what TinyWall does (without any sandboxing). The firewall behavior is identical for both products... with that firewall setting, COMODO does not generate any alerts and TinyWall does the same - always.
The advantage to COMODO is that you can set the firewall to generate alerts.
As for sandboxing, rollback or user profile isolation with the ability to delete the maliciously modified user profile and "regenerate" the complete clean, base-line user profile are more comprehensive and effective protection mechanisms.
But I do admit, this gets into "splitting hairs" territory...
May I ask, not too sure if this is "off topic." With AppGuard do you need exploit protection?
What vulnerable windows processes should I add?
Should I restrict access to C:\ProgramData\*
That`s right @hjlbx
if only Microsoft would give an option even to enable outbound filtering on their for advanced users but as always to much to ask for.
it does, (it just doesn't generate prompts) , you just have to do the rules manually.
could you please elaborate?Any product that relies only on vulnerable applications list is not safe. COM protection is more important. Hype.
What is COM protection?COM protection is more important