Yash Khan Config... (Laptop)

  • Thread starter Thread starter Deleted member 2913
  • Start date Start date
Status
Not open for further replies.
D

Deleted member 2913

Thread author
Windows Defender Disabled (Group Policy)

Comodo Firewall (Proactive Config + Customization) Screenshots -

UPDATE: Edited AutoSandbox Rule - Options - Set Restriction Level - "Checked" & set to "Restricted".
Added the screenshot


SCR1.png SCR2.png SCR3.png SCR4.png SCR5.png SCR6.png SCR7.png SCR8.png SCR9.png SCR10.png SCR14.png SCR11.png SCR12.png SCR13.png
 
Last edited by a moderator:
Last edited by a moderator:
Yash Khan: Chuck all AVs! CFW Proactive is my answer :cool:;)
You nailed it with minimalism.

Pretty awesome: Adguard, CFW and Backup. Thanks for the share!

Yash, are you waiting for Comodo to release the stable VALKYRIE integration in CCAV you had mentioned about earlier?
If not, why not use CIS premium instead of Firewall? Just wanna know.
 
Last edited by a moderator:
The only time I will disable UAC is with VoodooShield installed.
Crazy move but it's your PC and if your comfortable that's what
matters I guess. Thanks for sharing brother. ;)
I think UAC is kinda redundant or could be disabled with both But CFW have an edge with AutoSandbox...;)

Yash Khan: Chuck all AVs! CFW Proactive is my answer :cool:;)
You nailed it with minimalism.

Pretty awesome: Adguard, CFW and Backup. Thanks for the share!
Your comment hit the bulls eye my frd...;):)
 
Last edited by a moderator:
I think that with this configuration UAC security is tricky. Suppose that Yash will see the UAC alert and the file is executed in the real system. He knows that at 99.99% the file is clean (safe), because that is the way CF works. So, he simply always presses OK. He can be infected, when system/software is exploited by malware with stolen certificate (very unlikely in Windows 10).

Edit
The above should be corrected.
The first - this CF configuration is based on Auto Sandbox.
The second - Normally, UAC can protect the system, in some way, even if the user lets run something malicious. This can work, for example, due to UAC File and Registry Virualization. But, in most relevant cases, malicious files will be virtualized in Comodo Sandbox, etc.
 
Last edited:
Status
Not open for further replies.