- Jan 6, 2017
- 835
Hello. I was wandering what is better if you donwload CIS 10. Leave it with default setting or enable the proactive defence?
Please provide comments and solutions that are helpful to the author of this topic.
Thanks for your reply but im talking about Comodo Internet Security and not for the standalone firewallUsing the Comodo Firewall (similar), it is effective to set on Proactive and then go into sandbox settings and set the "All Processes/unrecognized" rule to "Restricted". Then make sure Auto-sanboxing is enabled. The Trusted Vendors list is long but it's a good list. You won't get too many alerts.
thanks for this peek under the hoodCom interfaces, a common attack pathway.
great explanations.CFW has File Lookup Services (FLS), not Valkyrie.
COM interfaces protection is not limited to Auto-Sandbox (but average user finds such alerts confusing when Auto-Sandbox is not used). You also get better coverage with Proactive Security configuration. It's a good addition if you consider: more applications you install = wider attack surface.
so the extra COM protection of proactive config is useful in preventing exploits?Yes. You get a more secure posture if you are using Proactive Security configuration. It depends on which application is used. It's very very possible that you will get an alert for something that's not a process execution and a trusted application will be used (task scheduler, task kill and so on) in such a chain of events. There is a common misconception that you get new processes and similar stuff but you can avoid these by utilizing COM. It's not something to be ignored.
just trying to understand how this works.Yes. You get a more secure posture if you are using Proactive Security configuration. It depends on which application is used. It's very very possible that you will get an alert for something that's not a process execution and a trusted application will be used (task scheduler, task kill and so on) in such a chain of events. There is a common misconception that you get new processes and similar stuff but you can avoid these by utilizing COM. It's not something to be ignored.
Is "COM protection" referring directly to the choice of the HIPS setting for COM alerts? I haven't studied the "Firewall" config to be able to follow how Proactive is better, although I can understand it is.
Maybe it's too much, but I am curious if it would be helpful to rank the danger level of CF/CIS HIPS alerts? I'd love to see a really great breakdown of this and the contexts and risks of choices with CF. Like I'd love to be able to know when I have an option beyond what I am seeing now, such as Auto-sandbox is about to kick in.
Been thinking some about this, and the sky is the limit with Comodo for really outstanding alerts system. I hope there is work in this area, because I do like CF in its current state too.
In my previous post, I considered your scenario and explained why it's better to switch to Proactive Security configuration if action (intended word : action, not executable to avoid possible misconception) jumps out of Sandbox. Thus, you will not get alert because it's trusted and COM protection is a good addition. Also, more protected objects = lower probability to use such action to jump out of Sandbox.just trying to understand how this works.
The general rule of thumb with COMODO HIPS is that a trusted process will not produce alerts.
So how does task scheduler (as an example) produce COM-related alerts, when it is a trusted process?
If you'd get alerts for every action of sandboxed applications then yes, it would weaken. It's human error mostly because you cannot interpret every HIPS alert.So then HIPS approvals actually weaken Auto-sandbox (Restricted) protection, and A/S is not a complete override? I was thinking of A/S as a virtualization fallback add-on where only the sandbox rules apply. Fortunately, I haven't been creating many HIPS rules, since I really wasn't sure how to view this interaction.
How do you know all this staff??Yes. You get a more secure posture if you are using Proactive Security configuration. It depends on which application is used. It's very very possible that you will get an alert for something that's not a process execution and a trusted application will be used (task scheduler, task kill and so on) in such a chain of events. There is a common misconception that you get new processes and similar stuff but you can avoid these by utilizing COM. It's not something to be ignored.