Yash Khan Config... (Laptop)

  • Thread starter Deleted member 2913
  • Start date
Status
Not open for further replies.
D

Deleted member 2913

Thread author
Windows Defender Disabled (Group Policy)

Comodo Firewall (Proactive Config + Customization) Screenshots -

UPDATE: Edited AutoSandbox Rule - Options - Set Restriction Level - "Checked" & set to "Restricted".
Added the screenshot


SCR1.png SCR2.png SCR3.png SCR4.png SCR5.png SCR6.png SCR7.png SCR8.png SCR9.png SCR10.png SCR14.png SCR11.png SCR12.png SCR13.png
 
Last edited by a moderator:
D

Deleted member 2913

Thread author
Last edited by a moderator:

Parsh

Level 25
Verified
Honorary Member
Top Poster
Malware Hunter
Well-known
Dec 27, 2016
1,480
Yash Khan: Chuck all AVs! CFW Proactive is my answer :cool:;)
You nailed it with minimalism.

Pretty awesome: Adguard, CFW and Backup. Thanks for the share!

Yash, are you waiting for Comodo to release the stable VALKYRIE integration in CCAV you had mentioned about earlier?
If not, why not use CIS premium instead of Firewall? Just wanna know.
 
Last edited by a moderator:
D

Deleted member 2913

Thread author
The only time I will disable UAC is with VoodooShield installed.
Crazy move but it's your PC and if your comfortable that's what
matters I guess. Thanks for sharing brother. ;)
I think UAC is kinda redundant or could be disabled with both But CFW have an edge with AutoSandbox...;)

Yash Khan: Chuck all AVs! CFW Proactive is my answer :cool:;)
You nailed it with minimalism.

Pretty awesome: Adguard, CFW and Backup. Thanks for the share!
Your comment hit the bulls eye my frd...;):)
 
Last edited by a moderator:

Andy Ful

From Hard_Configurator Tools
Verified
Honorary Member
Top Poster
Developer
Well-known
Dec 23, 2014
8,513
I think that with this configuration UAC security is tricky. Suppose that Yash will see the UAC alert and the file is executed in the real system. He knows that at 99.99% the file is clean (safe), because that is the way CF works. So, he simply always presses OK. He can be infected, when system/software is exploited by malware with stolen certificate (very unlikely in Windows 10).

Edit
The above should be corrected.
The first - this CF configuration is based on Auto Sandbox.
The second - Normally, UAC can protect the system, in some way, even if the user lets run something malicious. This can work, for example, due to UAC File and Registry Virualization. But, in most relevant cases, malicious files will be virtualized in Comodo Sandbox, etc.
 
Last edited:
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top