1. The driver can be opened only by processes with Admin rights.
2. If malware has Admin rights, then the Game Over.
3. Core isolation protects only kernel structures from malware that has Admin rights.
Again, I'm not against core isolation. But MS does not let individual developers to sign drivers.
Again, only Fort Firewall requires core isolation disabling, because I've no company.
All other firewalls with own driver (ESET, ZoneAlarm, Comodo Fw, NetLimiter etc) has no problem with core isolation, because their drivers are signed by MS.
It's a organizational, not technical or inherent, problem for Fort Firewall.
So it's very strange that you write about "core isolation disabling of other firewall" in the description of your program.