McAfee VirusScan Enterprise contains a firewall.
As far as I know, virusscan enterprise is only one module of the entire enterprise endpoint package of mcafee.
That package also contains another application called Host Instruction Protection. This one, rather than virusscan enterprise, is often considered as the firewall.
I have ever tried mcafee virusscan enterprise. I know that with virusscan enterprise we can make customized rules to control the access of executable files to the network ports. But in my opinion, I think those rules cannot be viewed as a full-featured firewall. Please correct me if I misunderstand here.
But I agree that OP's config might be a little redundant.
@qftest :
Well, we know that the windows firewall under the default settings has no outbound filter, which in fact can be implemented with the port rules of virusscan enterprise.
So, virusscan enterprise + windows firewall will be a more light-weighted combo, if you are experienced in making rules with virusscan enterprise.
-----------------------------------------------------------------------------------------------------------
Only using comodo is also a good choice in my opinion. Of course the
application control of mcafee virusscan enterprise is very powerful. However, some customized rules made with the
application control can be implemented more easily with comodo hips.
Yes, the hips of comodo might not be easy to use. But the application control of virusscan enterprise is more complicated. In particular, in virusscan enterprise, you can make a rule like:
Code:
Preventing any memebers in the set A except all the memebers in the set B to take any operations in a set C to the Object D
.
The problem (of the application control in virusscan enterprise) is that:
1. "D" can only contain exactly one element. Of course you can make a rule to prevent A.exe from writing to all text files by setting D as
However, if you want to prevent A.exe from writing to "D:\test1.txt" and "E:\test2.doc", then you need two rules.
2. You cannot make an exclusion from "D". Consider the case that there are 100 sub-folders under "D:\test\", which are called "D:\test\sub1", "D:\test\sub2", ... "D:\test\sub100". Now I hope to make a rule that prevents A.exe from writing to all sub folders except the first one. In such case, I am afraid that, we have to make 99 rules...
3. You can make path-based rules in virusscan enterprise. Digital sign and hash codes cannot be used.
4. The usage of wildcard is not unified. In some places you have to use "*\test\**" to represent "D:\test", while in some other places you have to use "?:\test\**"...
-----------------------------------------------------------------------------------------------------------
Please note that some features of spyshelter premium is also implemented in comodo, such as HIPS and anti-keylogger.
Compared with spyshelter, with comodo you can make more granular HIPS rules, and I hear comodo has a better support to the 64-bit OS.
So, I think using comodo along with spyshelter will not significantly improve the security. That is why I think your config is a little redundant.
As what is often mentioned in wilderssecurity, "less is more".