Many superb points made above, and I would like to thank all who contributed to this topic (wish I could be more Artsy-Craftsy in video production, but alas…).
Anyway, a few points:
1). Please note that the all the malware used was new, and the only detection made by VirusScope/Cloud) was on the final sample. This is why I do NOT recommend using the full CIS application (with the on-demand AV scanner).
2). Far too many issues can occur with the mishandling of the HIPS module (even any HIPS in the most aggressive mode makes nasty Ophelia purr with infectious delight); with Containment enabled having HIPS at any level active is superfluous and thus not recommended.
3). Yes, although some legit applications that are not yet vetted by C will be plopped into the Unknown category, it is barely an inconvenience to make them trusted (either at a Containment popup (when not in Silent Mode) or via the main GUI. It is, however, far from inconvenient to have financial and other user data sent to Malware Command. I personally find this a beneficial tradeoff.
4). CF will maximize the freedom to do what one wants on the Net, protecting those who don’t know better as well as those who DO know better but happen to be on a video conference and didn’t mean to click on that link (not that I would know, of course…)
5). Setup is simple and can be done in seconds, and if the AV module is not used there really is no update issues as the main protection modules of containment and Firewall are essentially static.
6). For Grandma and little sniveling, whining vermin, my setup with the addition of password protecting the same will allow browsing independence with safety.