Did your test.exe run as a trusted app?
So it ran contained?
Then the test does not cover the containment rule.Not in the Firewall Security config (Autocontainment is disabled by default).
Yes. However, there is no reason to believe that with HIPS OFF, this rule will work differently in the sandbox and start to protect files in the virtualized %windir%.Then the test does not cover the containment rule.
There are more special rules which end on |.Yes. However, there is no reason to believe that with HIPS OFF, this rule will work differently in the sandbox and start to protect files in the virtualized %windir%.
Tamper with these special rules at own risk.
Of course, uninstalling COMODO make updates work again, but that is not a solution!But you said that removing Comodo allowed the updates to install so?
Why do you think so?The default Autocontainment settings in the Proactive Security config, with disabled HIPS and removed rule %windir%\*|, allow running my test.exe with Administrator or System privileges, but prevent running it with Trusted Installer privileges. So, the contained test.exe cannot get Trusted Installer privileges and cannot do any harm in the %windir% folder.
All of this suggests that in @cruelsister's settings (Proactive config with disabled HIPS), the rule %windir%\*| can be deleted. To be sure if there are no side effects, this should be discussed on the Comodo forum in the context of Windows Update failures.
Why do you think so?
To my knowledge CF setting uses "run restricted" containment level and the special rules ending with | are being used in that case.
Removing the special rule weakens CF settings.
Don't ignore the functionality of the | character in the rule which is meant for containment operation even with HIPS turned off.If I recall correctly, HIPS is OFF in @cruelsister's Comodo Firewall settings.
As you can see from my posts, the rule %windir%\*| works as intended only when HIPS is ON. Otherwise, it does not protect system executables in %windir% (which is a main reason for using it). This is expected behavior for a HIPS rule (when HIPS is disabled).
Deleting this rule seems to improve the Windows Updates when Microsoft Defender is enabled.
Bearing in mind the reports in this thread, using the %windir%\*| rule can cause problems with Windows Updates when Microsoft Defender is enabled. I do not insist on what to do. The problem (probably related to Windows 25H2) should be discussed with the Comodo staff. I did not encounter such problems with Windows Updates on Windows 23H2.
Don't ignore the functionality of the | character in the rule which is meant for containment operation even with HIPS turned off.
I would strongly recommend to not remove it from the standard rules that get installed by CIS.
net stop wuauserv
net stop cryptSvc
net stop bits
net stop msiserver
del C:\Windows\SoftwareDistribution.old
ren C:\Windows\SoftwareDistribution SoftwareDistribution.old
del C:\Windows\System32\catroot2.old
ren C:\Windows\System32\catroot2 catroot2.old
net start wuauserv
net start cryptSvc
net start bits
net start msiserver
netsh winsock reset
Issue came back on 1 machine out of 2. What was the other proposed solution? Removing windir under protected HIPS files?
I would strongly recommend to not remove it from the standard rules that get installed by CIS.