- Dec 21, 2017
- 478
I really like this sandbox feature in CF, but I am using KIS for realtime protection and I don't want to use firewall of CF!
Please provide comments and solutions that are helpful to the author of this topic.
Comodo doesn't have a stand alone containment/sandbox product but you could try installing CF and disabling the firewall element. General Firewall Settings, PC Firewall, Firewall Protection | Internet Security but you'll need to whitelist some of the KIS program folders as there's been some conflicts in the past but see if that works for you.I really like this sandbox feature in CF, but I am using KIS for realtime protection and I don't want to use firewall of CF!
I understand that your comments prioritize the intent of the questioner.Agree with what the others say here, KIS on it's own with AppControth enabled negates the need to use Comodo's containment. I was just providing a possible solution if you decided to try and have both installed.
Yes, you can easily do this if you want. One of the strengths of CF is that it is extremely configurable. If you really ONLY want the sandbox:I really like this sandbox feature in CF, but I am using KIS for realtime protection and I don't want to use firewall of CF!
What virus scope does?? is it like a real time protection that may interfere with KIS?Yes, you can easily do this if you want. One of the strengths of CF is that it is extremely configurable. If you really ONLY want the sandbox:
1). Install CF
2). the sandbox will be enabled by default
3). Right click the Comodo Taskbar icon, choose Firewall, click Disable, and then choose Permanently.
4). Do the same for the HIPS (for this one you will have to click on "Advanced View"), and Virusscope.
5). By default CF has Cloud lookup. To disable this also open the GUI, then Settings>File Ratings>File Rating Settings>uncheck Cloud lookup.
Now you have CF with only Containment.
Easy, Easy.
There shouldn't be any interference as the AV modules (VirusScope/Cloud Lookup) get along fine with another AV on board. these modules are more of an on access defense (more like WVSX) rather than a constant real time monitoring (like WD) activity.. Actually I have test systems with CF + WVSX +WD all ensbled, and more often than not when a malware file is run CF will act first (deleting it) prior to a WV action, prior to a WD action.
That's an uPnP port. Just check your unreconized files in the File List in CF before allowing.View attachment 265158
Anyone know how to respond o this? Is this okay to allow?