- Oct 17, 2023
- 167
@Vitali Ortzi if you are ready then Swithc from Xcitium Internet Security Premium to Xcitium Client Security 13
Not too bad it's like 5% when you consider the size of the market wich is 26.50 billionThey get 750 Million dollars and even Billion dollars on their enterprise and business products as they are pretty good
So are you ready to switch to Xcitium Client Security 13?Not too bad it's like 5% when you consider the size of the market wich is 26.50 billion
if I were a business probably not fullySo are you ready to switch to Xcitium Client Security 13?
i alredy have machines with Xcitium Client Security and everything is fineif I were a business probably not fully
As a consumer it's too expansive for single licenses and is niche as it has too many false positives for many users but some can actually use it like my mom who doesn't install software frequently (using cruel sister comodo and configured defender there )
For myself only as a layer since there are wild malware with dll hijacking that can bypass It
Like the ransomware shown on this fourm
I'm using comodo (weaker version ) and everything is fine tooi alredy have machines with Xcitium Client Security and everything is fine
Xcitium Client Security has also Valkyrie.Auto.Malware@1 rating and Valkyrie.Manual.Malware@1 the ratings from ValkyrieI'm using comodo (weaker version ) and everything is fine too
That's not a good way to measure unless you have thousands of devices with variations and targeted attacks too (for enterprises)
Valkyrie has too many false positives too although it can reduce it a lot over just purely blocking unknownXcitium Client Security has also Valkyrie.Auto.Malware@1 rating and Valkyrie.Manual.Malware@1 the ratings from Valkyrie
when i submit malware to Valkyrie i get verdicts from Valkyrie Automatic Analysis most of the time from Static Analysis and Dynamic AnalysisValkyrie has too many false positives too although it can reduce it a lot over just purely blocking unknown
With the "all applications" policy, Comodo will run files present in the file groups as fully virtual. For example, I had to add AntDM.exe for Ant Download Manager in the "file downloaders" group; otherwise, Comodo couldn't detect the file origin for the files downloaded. The file details showed the file origin as "unknown" for the downloaded files.The 7zFM is already included there via the rule *\7z*.exe . However, I want to fully virtualize only one archiver application set as the default archiver to open archives and disk images.
I do not know, maybe it is possible to fully virtualize all archives included in the File Archiver group and set one of them as the default archiver. Then, the Windows built-in archiver will be the only possibility to pack/open archives and disk images without containment.
I had a 1-day limit for unrecognized apps, a file origin for removable media/internet, and a whitelist policy for WinRAR. I was just using File Explorer when I got a Comodo Firewall message; it crashed. Everything was fine except the test policies vanished and the unrecognized apps policy was back to default.Did you export the test Comodo settings?
@Andy Ful Is it possible for you to test CyberLock? How would their AI/Whitelist Cloud rate or analyze your signed POC?
With the "all applications" policy, Comodo will run files present in the file groups as fully virtual. For example, I had to add AntDM.exe for Ant Download Manager in the "file downloaders" group; otherwise, Comodo couldn't detect the file origin for the files downloaded. The file details showed the file origin as "unknown" for the downloaded files.
no. they didnt. as far as i can tell, they improved only for a couple of days when someone from comodo was signing files from malwarebazaar but after a few days all was back to normal as cis continued to be the worst in detecting malwares in manual scans. but it continues to be the best when prevention is the goal.Comodo/Xcitium has improved its signatures you can ask @vitao
The guy is still feeding the Malware databaseno. they didnt. as far as i can tell, they improved only for a couple of days when someone from comodo was signing files from malwarebazaar but after a few days all was back to normal as cis continued to be the worst in detecting malwares in manual scans. but it continues to be the best when prevention is the goal.
For UniGetUI installer/updater users, simply adding "ignore" rules for the WindowsApps and UniGetUI folders should work with the default containment rules. A *.tmp file rule set to "ignore" in containment might also not be necessary.I realized the advantage of using the less than 1-day time limit + UniGetUI installer/updater.
First it is necessary to install UniGetUI from Microsoft Store. Next we should add the "Ignore" Actions to avoid Comodo's blocks.
View attachment 287182
The TmpFiles is the containment group for ignored file extensions. I added only the *.tmp file extension to this group.
With these settings, both the application installations/updates via UniGetUI and the execution of those applications are not blocked by Comodo. This follows from:
- The installed UniGetUI preserves the original file creation time (always beyond the 1-day limit).
- Most applications installed via UniGetUI also preserve the original creation time (always beyond the 1-day limit).
- UniGetUI executes the application installers in two folders (see the screenshot above) that are 'Ignored' so Comodo does not contain the installation.
- If the application uses *.tmp executables (which have a fresh creation time), they are also "Ignored."
well, i did an "fast test" here... same old same old...The guy is still feeding the Malware database
For UniGetUI installer/updater users, simply adding "ignore" rules for the WindowsApps and UniGetUI folders should work with the default containment rules. A *.tmp file rule set to "ignore" in containment might also not be necessary.