- Jul 3, 2015
- 8,153
1 If I remember correctly, CS says to set firewall not to show alerts, and to block automatically, and this works for all unrecognized processes -- in which sandboxed processes are by definition included. They were sandboxed because they are unrecognized.1. You will never get any alert from COMODO because the interpreters and sponsors are trusted. It's ridiculous that all the AVs treat interpreters and sponsors as trusted. When Microsoft explicitly advises that they be disabled if not needed. Obviously they're running amateur night.
2. The COMODO documentation states the only difference is in the alert and what is attributed.
3. CS' advice to block outbound firewall only applies to sandboxed processes. That means exploit\malicious code can still be downloaded outside of the sandbox on the real system and run, for example in a memory buffer. It will more or less use trusted Windows processes and the system is hacked.
4. Bitsadmin connecting out on the network is attributed as SYSTEM. You have to block SYSTEM.
Bitsadmin is deprecated by Microsoft. It shouldn't even be enabled on anyone's system.
5. There is only one way to protect systems - and that is to follow Microsoft's own advice - which is to disable what is not needed. 99.999 % of home users across the world do not need the usual suspects. Microsoft is irresponsible and negligent in shipping Windows with them enabled or even included at in Windows for the masses.
2 Embedded code detection, when it works, will work even for interpreters that are "trusted" processes. So there will be an alert or a block, depending on settings.
3 So let's say I am using native Windows SRP, and it is configured to block bitsadmin. Will it work? (let's assume for the sake of the question that the malware is not running elevated)
Last edited: