- Dec 29, 2014
- 1,716
Want to harden Comodo Firewall, particularly the Trusted Vendors list and then maybe go to Paranoid. If I go to paranoid, does the sandbox alert kick in for all not signed by a Trusted Vendor same as with Proactive? This would be acceptable to me. I'm not getting pop ups as it is, since I'm not installing a ton of software. However, if I trim the Trusted Vendors list, I would feel better about the sandboxing, and I can still get more prompts that way. Prefer being reminded security is doing its job at least once in awhile, so I could be satisfied with 2x or even 3x the number of pop ups I am seeing (maybe 3 a day), even more for a superior coverage. There are so many Trusted Vendors, I am concerned that someone could forge a certificate somehow or steal one or in some way get by the list.
Current basic settings
1. Proactive
2. Firewall-Enabled (I have filter loopback traffic checked. Don't remember if that's default)/Enable Trustconnect alerts (Unsecured Only)/Create rules for safe applications unchecked/all else unchecked
3. HIPS-Enabled (Safe Mode)/Monitoring Settings (Device Driver Installations/Process Execution/Protected Files and Folders/Protected Registry Keys/Computer Monitor/Keyboard (should I have more enabled here?). Added connected drives and Documents folders to "Protected Objects"
4. Sanbox-Do not virtualize access to the specified files and folders (checked/default locations-Shared Spaces and C:\Program Files\Shared Spaces)/Do not virtualize...the specified registry keys and values (unchecked)/Advanced-only Do NOT show privilege elevation alerts unchecked/Virtual Desktop password (unchecked)
5. File Rating-All checked but Do NOT show popup alerts. Trust files installed by trusted installers is good? All else defaults
Any simple way to edit the Trusted vendors list? Does Paranoid ignore signatures/Trusted? This is my problem with Comodo. I know the list is too large, and most of them are irrelevant to me anyway. I would like a simple much smaller Trust list, but I want to stick with developers that are well known for their clean practices and devotion to securing their product. I feel like all programs and program files should have protection mechanisms or be protected specifically via a security program. I think HIPS can monitor do this.
I sense that I could end up with possibly the most hardened possible setup for Proactive, but I am interested in learning Paranoid. Is using HIPS to via Protected Files and Protected Folders (or some other way) capable of monitoring for changes to .dll/.sys? Don't know if this is even practical/necessary/important.
Current basic settings
1. Proactive
2. Firewall-Enabled (I have filter loopback traffic checked. Don't remember if that's default)/Enable Trustconnect alerts (Unsecured Only)/Create rules for safe applications unchecked/all else unchecked
3. HIPS-Enabled (Safe Mode)/Monitoring Settings (Device Driver Installations/Process Execution/Protected Files and Folders/Protected Registry Keys/Computer Monitor/Keyboard (should I have more enabled here?). Added connected drives and Documents folders to "Protected Objects"
4. Sanbox-Do not virtualize access to the specified files and folders (checked/default locations-Shared Spaces and C:\Program Files\Shared Spaces)/Do not virtualize...the specified registry keys and values (unchecked)/Advanced-only Do NOT show privilege elevation alerts unchecked/Virtual Desktop password (unchecked)
5. File Rating-All checked but Do NOT show popup alerts. Trust files installed by trusted installers is good? All else defaults
Any simple way to edit the Trusted vendors list? Does Paranoid ignore signatures/Trusted? This is my problem with Comodo. I know the list is too large, and most of them are irrelevant to me anyway. I would like a simple much smaller Trust list, but I want to stick with developers that are well known for their clean practices and devotion to securing their product. I feel like all programs and program files should have protection mechanisms or be protected specifically via a security program. I think HIPS can monitor do this.
I sense that I could end up with possibly the most hardened possible setup for Proactive, but I am interested in learning Paranoid. Is using HIPS to via Protected Files and Protected Folders (or some other way) capable of monitoring for changes to .dll/.sys? Don't know if this is even practical/necessary/important.
Last edited: