@ErzCrz post #339 is correct, especially the last sentence of the first paragraph. If, for example, you use Custom firewall ruleset and you decided to create two rules for svchost.exe,:
Allow Out TCP to Remote Port 443
Allow Out UDP to Remote Port 53
It will only be allowed to connect out to these two specific ports and those protocols and
absolutely nothing else. The exact same principles apply to any other process, whether it be a Comodo Trusted process or not. The key is to use "Custom Ruleset".
EDIT
of course any IPv6 attempts will be allowed because of the related bug.
It's not the protocol.
It's not the port.
It's the IP!
At Comodo, any "safe"/"trusted" file, sandboxed or not, restricted or not, containerized or not etc... regardless the protocol, and regardless the port... Comodo will always allow that file to have comms to tons of IPs.
That problem at Comodo has no solution because "safe"/"trusted" files, for example in the case of svchost, it is impossible to customize by IP (hundreds of files use svchost for comms, with thousands of different IPs).
At Comodo, the same problem happens with all the files considered "safe"/"trusted", which includes Windows Services and a long list of other files (not just svchost).
Therefore, at Comodo any virus/malware using, for example, svchost, will have comms to tons of IPs, regardless the protocol and the port. At Comodo, a virus/malware using svchost for comms, it can use any protocol and any port, because the virus/malware only cares about the IP... and at Comodo the svchost is free to connect to tons of IPs. Comodo can't stop comms for a virus/malware using svchost (or any other "safe"/"trusted" file).
As a simple illustration, when Comodo is used, Firefox is forced to use svchost for comms. Both, Firefox and svchost are whitelisted by Comodo (both are considered "safe"/"trusted"). Therefore Firefox has free comms through svchost to tons of IPs (just limited by protocol/port). Comodo doesn't filter Firefox IP comms (through svchost). Now, instead Firefox, let's place a virus/malware, and the same logic applies, if the virus/malware uses svchost for comms, it'll have access to tons of IPs (really it doesn't matter protocol/port, what matters is just the IP).
Always good to remember that svchost using DNS resolver (customized IP) doesn't stop comms to other IPs.
This is not a bug. This a design flaw problem, mainly because Comodo never evolved in the last 20 years.
Comodo Firewall is a placebo.