COMODO Internet Security : Grant application access memory

Status
Not open for further replies.

Jack

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 24, 2011
9,378
COMODO Internet Security : How to grant application access memory
Uploaded by Valentin N on malwaretipscom Channel on Dec 5, 2011



Enjoy!
 
Last edited:

HeffeD

Level 1
Feb 28, 2011
1,690
But that's not how you allow memory access to avoid the log entry, (bypass self protection) as the video suggests is the problem.

You'll need to go to Defense+ -> Computer Security Policy -> Defense+ Rules.

Click on the Comodo Internet Security group and click Edit, then Customize.

Now click the Protection Settings tab, not the Access Rights tab.

In Protection Settings, click Modify on the Interprocess Memory Accesses rule and add the application that you do not wish to receive an log entry if it is trying to access a CIS process in memory.
 

Valentin N

Level 2
Feb 25, 2011
1,314
HeffeD said:
But that's not how you allow memory access to avoid the log entry, (bypass self protection) as the video suggests is the problem.

You'll need to go to Defense+ -> Computer Security Policy -> Defense+ Rules.

Click on the Comodo Internet Security group and click Edit, then Customize.

Now click the Protection Settings tab, not the Access Rights tab.

In Protection Settings, click Modify on the Interprocess Memory Accesses rule and add the application that you do not wish to receive an log entry if it is trying to access a CIS process in memory.

Thanks for the feedback I will make new one.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top