HJLBX,
But as you know Comodo Cloud is not a pure Cloud AV i.e it doesn't blocks a file for cloud results i.e like Panda has default 30 secs, Bd free too works like this. And as per Panda getting cloud results is instant...30 secs default is just in case.
So if a detection is present in the cloud but due to Comodo cloud glitch or whatever malware was not detected on the system...I believe it will be autosandboxed or if an installer then elevated privileges Comodo alert will be there, right?
You can set Comodo Cloud Antivirus to "No notifications: 'Block and Terminate."
If local CIS cannot communicate with Comodo File Lookup Server (FLS\Comodo Cloud) to establish file reputation, then it will treat it as Unrecognized. At default Internet Security configuration, CIS will auto-sandbox. At default Proactive Security configuration, CIS will generate HIPS alert and auto-sandbox - if user allows file to run at HIPS alert.
If the following settings are enabled under Defense+ > Sandbox > Sandbox Settings :
- Detect programs which require elevated privileges, e.g. installers or updaters
- Show privilege elevation alerts for unknown programs
then when execute any file that requires elevated privileges will be detected - and - Sandbox "Elevation" alerts will be generated for any Unrecognized file.
That alert is for the user to understand that the file that is about to run will do so with complete system access .
(Although sandboxed file cannot do much to physical system... plus, protected objects and protected data folders cannot be modified. I am a bit perplexed as to why Comodo designed it this way, since the Unrecognized file will be sandboxed and the elevated privilege is irrelevant to overall actual, physical system security in the sandbox. In other words, I've considered it carefully and the elevated privilege alert for Unrecognized apps seems to be superfluous - and somewhat of a duplicate to the HIPS alert. In any case, system is protected despite elevated privileges. Protected... that's all that matters... right ?)