App Review Comodo's killer.

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
@Andy Ful

rashmi

Level 14
Jan 15, 2024
667
She probably had in mind the contained/blocked applications.

If an Unrecognized application is not contained (like DLL), this restriction does not work.
I didn't mean it was CruelSister's claim, as she's already addressed it in this thread.
 
  • Like
Reactions: Andy Ful

Andy Ful

From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,702
I did not name my "conclusion" post the conclusion, so I do it now more clearly. :)

Suggestions for MT members who want to use CIS on their computers.
  1. It is OK to use the @cruelsister settings but be cautious when opening documents with macros or files from disk images, flash drives, and archives. Those files are common attack vectors for abusing Trusted applications and bypassing CIS protection.
  2. One can maximize the protection against abusing Trusted applications by:
    - using the 7-Zip trick for disk images and archives,
    - disabling execution from flash drives,
    - disabling macros in office applications,
    - tweaking Comodo's Script Analysis settings.

Administrators in organizations (small businesses) can consider
  • using SUA,
  • disabling macros in office documents,
  • tweaking Comodo's Script Analysis settings,
  • applying the @cruelsister settings (silent setup) with disabled cloud lookup and reduced Trusted Vendors list.
    Only selected signed (also self-signed) applications will be allowed when the vendors are included on the reduced Trusted Vendors list.
    Other applications will be contained. Such vendors like Microsoft and Comodo must be included on that list.
 
Last edited:

Nikola Milanovic

Level 4
Verified
Oct 17, 2023
178
I did not name my "conclusion" post the conclusion, so I do it now more clearly. :)

Suggestions for MT members who want to use CIS on their computers.
  1. It is OK to use the @cruelsister settings but be cautious when opening documents with macros or files from disk images, flash drives, and archives. Those files are common attack vectors for abusing Trusted applications and bypassing CIS protection.
  2. One can maximize the protection against abusing Trusted applications by:
    - using the 7-Zip trick for disk images and archives,
    - disabling execution from flash drives,
    - disabling macros in office applications,
    - tweaking Comodo's Script Analysis settings.

Administrators in organizations (small businesses) can consider
  • using SUA,
  • disabling macros in office documents,
  • tweaking Comodo's Script Analysis settings,
  • applying the @cruelsister settings (silent setup) with disabled cloud lookup and reduced Trusted Vendors list.
    Only selected signed (also self-signed) applications will be allowed when the vendors are included on the reduced Trusted Vendors list.
    Other applications will be contained. Such vendors like Microsoft and Comodo must be included on that list.
If u disable Cloud then how will Xcitium rate the files as Malicious or Safe?
Will it be Unknown forever?
 
  • Like
Reactions: simmerskool

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top