@Shadowra
Please test Comodo with the following setup. Start by testing this first. Then, you can move on to testing the previous request in quotes. Let me know if there are any issues. Thank you!
Product: CIS Beta 2024
Installation: CF Only (Untick AV)
SETTINGS
Configuration: Proactive Security
TASKS: FIREWALL TASKS - Click Stealth Ports - Click Block Incoming Connections
Firewall Settings: Tick “Do not show popup alerts” and set it to “Block Requests”
HIPS Settings: Disabled
Containment Settings: Untick the first & third options and tick the sixth option set to “Run inside the Container”
Auto-Containment: Double-click the last/bottom rule. Set “Action” to “Run Restricted”. OPTIONS - Check that “Set Restriction Level” is set to “Partially Limited”. Click OK
Auto-Containment: Click Add. Set “Action” to “Block”. Click Edit. File location: Click Browse-FileGroups-AllApplications. File rating: Select “Unrecognized”. File age: Select “Less Than 3 days”. Click OK. Click OK. Click OK. The created rule will be on the top. Tick it and Click “Move Down” until the rule is placed as the second-last rule, i.e., above the last/bottom rule.
Click OK
[This is a Restricted setup with (no containment). Most apps run well with the default "Partially Limited" restriction. Comodo’s primary security was Partially Limited before it had containment. I customized the setup a little. Overall, I’m interested to see how it performs against modern malware. The setup could provide excellent protection and usability when paired with an antivirus (Comodo AV is weak) in a real-world scenario.]
The setup’s core is…
1. Block unrecognized files that are less than 3 days old.
2. Run unrecognized files that are 3 days or older in a restricted, partially limited mode.
3. Block connection requests for unrecognized files.