Resetting custom rules in comodo firewall. Installing and configuring programs (overview): firewall (firewall) Comodo Firewall (end)


Comodo Personal Firewall designed to protect PC users running Windows OS. It is extremely easy to use and provides all the necessary features and functions. The most important thing is that it “flies” even on the most low-power computers. Another important advantage, especially for beginners, is that it requires minimal intervention from the user.

Why use our Firewall?

Comodo Firewall Pro introduces a new evolution in computer security: Disabled Blocking of Trusted Applications (DDP). What is DDP? Most security programs maintain a list of known malware, and use this list to decide which files and applications should not gain access to the PC. The problem here is obvious. What if the malware list is missing some entries, or is not up to date? DDP eliminates this problem to ensure complete security. Firewall links to a list of over two million known PC-friendly applications. If a file that is not found in the Safe List “knocks” at the “door” on the computer, the Firewall immediately warns about the possibility of a malware attack. All this happens before malware infects the computer. This is prevention-based security, the only way to maintain complete security.


Firewall Features:
  • Easy to understand informative alerts
  • No complex configuration issues - ideal for novice users
  • Lots of configuration options, let the techies configure everything the way they like :)
  • Security DDP, user-informative and PC-safe
  • Quickly adapt users to personalized protection
  • Convenient, attractive graphical interface

One of the first steps in securing your computer is downloading and activating a quality firewall to repel intrusions. Only this free firewall software has access to Comodo, a huge list of PC-friendly applications, a "deny by default" component

Comodo Firewall recognizes more than ten thousand different applications (secure, spyware, adware and others), which is a unique feature unique to this firewall.
Key features of Comodo Firewall Pro
monitoring program components;
program behavior analyzer;
against protocols;
smart alerts;
integration into Windows Security Center;
critical termination protection;
protection during computer boot;
automatic update;
error reporting interface;
detailed journal;
connection monitor;
program database - more than 13,000 programs with their security risks.

A description of the program can be found

Installing Comodo Personal Firewall Pro.
Download the program from the official website.











Attention! Be sure to uncheck “install” and do not check “install COMODO LivePC...”.






installation completed successfully! Restart your computer.

First start.
When you restart your computer, Comodo Firewall will automatically replace the standard Windows firewall. If after the first launch you do not see any shortcuts on the desktop, just reboot again. The program needs to be “taught” which programs you allow to run and which ones you do not. If you are an inexperienced user, then I recommend “not to be clever” but to allow everything (of course, reading the program’s recommendations), for example:

Set the mode to “training”. To do this, right-click the firewall icon in the panel (bottom right of the screen) and select “firewall mode” and then “training” from the menu.

Now the program will remember all your actions, and after training, your actions will no longer be accompanied by the opening of permission confirmation windows.
You can familiarize yourself with the functions of the program. To do this, double-click on the program icon. It’s not particularly difficult to figure it out, but you don’t have to go into it. Just leave all settings unchanged. Once again, the program requires only minimal user intervention.

Leave your comment!

Getting to the settings is quite problematic, since there is no button of the same name. However, on the menu Tasks did you see the button Advanced settings(Sandbox Tasks and Advanced Tasks), by clicking which you can get to the parameters window (Fig. 4.99).

Rice. 4.99. Advanced settings

The window is divided into two parts: on the left are settings categories, on the right are changeable parameters. There are only two categories: General settings And Security Settings(Fig. 4.100).


Rice. 4.100. General settings

There are four subcategories in General Settings.

Interface. In this subcategory you can change the program language, as well as configure visual and sound parameters. To do this, check the boxes next to the appropriate parameters. The more of them are enabled, the more often the program reminds you of its presence on the computer. Separately, it should be noted that you can block access to program settings using a password. To do this, check the Protect settings with a password checkbox, click on the Set password link and enter your password in the window that appears.

Updates. We are talking about updating both the anti-virus databases and the program itself. This is where you can configure the frequency of checking for updates (Fig. 4.101).

Journaling. You can disable logging or, conversely, enable it.

Configuration. The subcategory is responsible for protection priorities. By default, COMODO - Internet Security is selected, which is sensitive to threats from the Internet. If you spend a lot of time on the Internet, then don't change anything. COMODO - Proactive Security focuses on protecting from within. Select it if there were a large number of viruses on your computer. COMODO - Firewall Security provides only network protection (firewall). To change the configuration, double-click on the required item (Fig. 4.102).



Rice. 4.101. Setting Up Updates



Rice. 4.101. Setting Configuration

The default security settings are set to a very high level (Fig. 4.103). The only thing you can do is lower the protection and exclude individual files from scanning. These settings are unlikely to be useful to the average user, so we will not dwell on them in detail.



Rice. 4.103. Security Settings

CHECKING YOUR COMPUTER

You can start scanning in the main window using the button Scan. You can also use the button Tasks (General Tasks Scan). In the window that opens, select the scan type (Fig. 4.104):

Quick scan - checks areas of the computer that are susceptible to infection;

Full scan - scans all files on the computer;

Custom Scan - scan individual files or folders ( Custom Scan Scan Folder or Scan file)(Fig. 4.106).

rice. 4.104. Scan profiles



Rice. 4.106. Custom Scan

In addition, you have the opportunity to create your own profile. To do this in the menu Custom Scan click the button Other options, in the window that opens, click the button Add(Fig. 4.107).



Rice. 4.107. Creating a Scan Profile

In the next window (Fig. 4.108), give the profile a name and add scan objects: individual files and entire areas (tab Objects). On the tab Options select the thoroughness of the check. The more checkboxes you check, the more thorough the check will be. In the tab Schedule set the time and frequency of this type of scanning. Click OK.



Rice. 4.108. Setting up a scan profile

Now in the window Scanning(see Fig. 4.104) the created object scanning profile will appear. Check the box to activate it, and the antivirus will begin scanning at the scheduled time.

To summarize, it should be noted that COMODO Antivirus is highly effective. He copes well with the task assigned to him. The disadvantages include a not very clear interface.

review, we examined in detail and with “pictures” the process of installing the freeComodo Firewallon computer. Now, as promised, I will tell you howoptimal firewall, with a minimum of pop-up notifications, quickly and independently configured. The author's version of the program's advanced settings largely coincides withrecommended in the Russian part InternationalCOMODO Forums(branch " CIS/CFP for firewall newbies"). These forums can be visited by clicking on the " tabMiscellaneous" paragraph " Visit the support forum "The only thing is that you will be taken to the main English page, so in order not to search, here is a direct link to the forum" In Russian / Russian "(clickable!) There is a lot of useful information on the topic - those who wish, of course, can “dig in.” And I, as usual, for convenience the points I'll start what I promised.

Comodo Firewall Advanced Settings

1. At the beginning, I suggest changing the default (default) grey-cheerful “face” Comodo Firewall for something more interesting. To do this, in the same “Miscellaneous” tab, click “ Settings" → "Appearance" → in "Theme" we change the "gray" theme "COMODO Default Normal" to, for example, "COMODO Blue Norma" (first screenshot) and, "dressed up", move on.

2. The first of the program's advanced settings will be to enable the "invisibility" mode of your computer on the network. To do this, in the tab " Firewall"click applet" Hidden Port Wizard "→ select" Block all incoming connections and hide my ports for all incoming connections "(screenshot above) and confirm your choice via " OK ".

3. Further, in the same tab " Firewall"let's go to" Firewall settings " and on the "General settings" tab we activate " ". Now allowing rules will be automatically created for all applications from the list of trusted ones, which will save you from unnecessary permissions manually. In addition, check the checkbox next to the item "Automatically discover new private networks " (which can be removed after detecting your network) and, most importantly, " Firewall mode "we leave unchanged" Safe ".

Confirm all changes in settings with the " OK".

4. Let's move on to the mode settings" Proactive Defense". To do this, in the tab " Protection+"click" Proactive Defense Settings " and, by analogy with the previous settings item, activate " Create rules for secure applications ". If you are confident that the system is clean from viruses and have an effective anti-virus scanner (the need for which I wrote in the note " ") like free, then feel free to install " Clean PC mode " – again, to get rid of “annoying” alerts. Also check that there is no checkbox next to " Enable enhanced protection mode " and presence - opposite the point " A adapt the operating mode at low system resources " (no comments).

5. In the same settings of Proactive Firewall Protection in the " tab Application execution control settings " check that unrecognized files are treated as " Partially limited " (default) or " Suspicious " – under other settings, some applications will refuse to launch.

6. For users of older versions Comodo Firewall

And don't forget to confirm changes in settings with the " OK ".

Note: When Proactive Defense is completely deactivated, this option ("Sandbox") is automatically disabled.

7. The final tweak from the "optional" category: in the " tab Miscellaneous " → "Settings"→ on tab" Are common"Uncheck the box next to the item" Automatically check for program updates" (penultimate screenshot), especially since the option " Check for updates "Always at hand" (last screenshot).

Another click on the " OK" and you can close the appropriately configured Comodo Firewall– after restarting Windows, with this configuration, “comfortable” for the user, the program reliably protects the computer from network threats.

As a result of unsuccessful attempts to force the database to be updated, I decided to simply install Comodo again, but with a younger version, in order to test it. Comodo Internet Security is a complete protection that includes an antivirus, firewall and proprietary features such as Hips and more.

Before Comodo, I tried various antiviruses. This includes Doctor Web, Kaspersky, AVG, Nod32, Avast, Panda, MalwareAntimalware and even the Chinese Rising, which works surprisingly well.

Most of all I like Kaspersky, which served me faithfully for several years, but the time has come to find something to replace it and, as a result of a long search, I chose the free Comodo. Now he has been protecting the computer for several years.

Comodo, and everyone admits it, has an awesome firewall. In fact, it alone solves the problem of online security. The antivirus is also excellent, but I prefer not to use it, although it works normally. Instead of an antivirus, I download a scanner from DrWeb called CureIt and check my computer every few months.

Comodo has a huge amount of customization and gives the impression of a very professional (and it is) product. Overall, I like Comodo and am happy with it. It just needs to be configured correctly. I can easily understand any program, so it wasn’t difficult for me to understand Comodo’s settings.

I specially made several screenshots of Comodo for this article, for which I had to go into WinXP, where I have the latest version of Comodo installed, which I haven’t visited for probably six months.

I won’t talk about all the Comodo settings. You can decide for yourself whether to leave any updates, messages, or notifications or not. I will tell you only about the most basic settings, as well as some tricks in these settings.

What to do if your browser is infected? Read about it.

This Comodo differs from the 5th version in its improved and beautiful interface.

In my opinion, despite its beauty, the 5th version is still more convenient. There, all the settings are better grouped and informative.

For example, in the new version of Comodo it is not clear when the anti-virus database was updated; no date. In version 5 this is indicated by the update date.

The settings for anti-virus scanning profiles and exclusions are hidden in such a way that they can only be found if you have a good understanding of the structure of the Comodo interface in previous versions.

More on this below. Although, let's start right there.

As for the antivirus, you can leave the setting to scan the computer's memory at startup. The default option is to scan archives. I always remove it, because there are often tablets in the archives, and the antivirus mercilessly removes them.

As for cumulative scanning, this mode will scan those files that have changed since the previous scan. You can select "Scan on Access". It's up to you to decide. I always choose cumulative scanning.

The American developers, in my opinion, were clever with the list of scans. The fact is that if you do not know how to set up an antivirus, an antivirus scan will occur every time you start your computer. Not everyone needs this and not always. And to disable this automatic scanning, you need to know where to do it. The Comodo developers made this non-obvious for some reason. In general, to set it up as we need, we go to the “List of scans” and there we see the default list, and at the bottom there is a barely noticeable arrow.



This is what we need. We drag it up, the “Add”, “Edit”, etc. windows appear, where we can already do something. We cannot delete default scan list profiles, but we can change them or add our own. In the “Graph” line, set the desired position so that scanning does not start automatically when the system starts. If we need a scan, we can always launch it manually from the main antivirus window by clicking on the “Scan” button.

However, profiles can be configured so that scanning is activated once a week, for example, at night or during the day. The idea itself with a schedule for “Full” or “Quick” scans is good, but it should have been done more clearly, and not hidden far into the depths of the program from the user.

The situation is similar with “Exceptions”. The developers also managed to hide the setting of this extremely important item behind this arrow, which is visible at the bottom of the main window when you go along the path “Antivirus ---> Exceptions”.

We drag this arrow up and a window with actions will pop up, thanks to which we can already fully work with exceptions.

We add to the "Exceptions" all those files and folders that, in our opinion, should be ignored by Comodo.

A few words about the Proactive Protection Mode. This is a proprietary feature of Comodo, which they consider almost the main one in protecting your computer. The version we are reviewing has a HIPS setting (Host-based Intrusion Prevention System or simply “intrusion prevention system”). The settings are below on the screen. You can select "Safe Mode". In it, all unknown actions on the computer will be under control. If you know/are sure that there are no viruses on your computer and it is clean, then you can set the “Clean PC” mode. In this mode, all files are recognized as trusted, and we receive fewer alerts from Comodo. I set the settings to "Clean PC".

It is not necessary to use HIPS; you can disable it. But if you use it, then I recommend that you check the box next to “Create rules for secure applications”, specifically highlighted in green. This will make it easier for you to continue interacting with Comodo. It will create rules and once you confirm them, you will not receive messages from Komodo for the same reason.

Well, setting up a firewall, or simply a firewall. Comodo's firewall is one of the best on the market. This is recognized by all specialists and ordinary users. Some people specifically download only the Comodo firewall to use it with a third-party antivirus. There is nothing complicated about the settings.

Just like in the screenshot above, be sure to check the box to create rules so as not to receive constant messages from Comodo. The rest is up to you. I set it to "Safe Mode". Even with the default settings, the firewall does its job perfectly.

If you want to make your computer invisible on the network, you can use the Hidden Ports Wizard to enable the mode of blocking all incoming connections and hiding your ports for all incoming connections. But, if you are using a home network, which is most often the case, it is better to activate the alert mode for incoming connections and make a separate decision for each port. For the particularly advanced: in the advanced firewall settings, you can check the boxes everywhere except for NDIS monitoring, other than TCP/IP.

A little about Sandbox mode. This cool thing, if enabled, isolates all unknown files and runs them in itself (sandbox). In this mode, files, if they are dangerous, will not harm the system. Not every paid antivirus has a sandbox. The free Comodo has it. So, take advantage.

You should know that the Sandbox and Protection Plus (Proactive) modes are not required to be activated. Without them, just with an antivirus and a firewall, you can normally secure your system. But the above modes make the protection even more reliable and powerful.

And I would also like to say something about configurations. There are three of them by default. These are: Internet Security, Proactive Security and Firewall Security. For many, these things are incomprehensible, but there is nothing complicated here. These are, in essence, a kind of presets, ready-made presets. Firewall Security gives priority to protection on the network, the activity of the antivirus seems to be reduced: it seems to be working, but it doesn’t seem to be. In general, it is almost invisible and inaudible in this mode. In other modes it’s the same: In Proactive, priority is given to proactive protection; in Internet Security, priority is given to antivirus and network protection. I usually set it to Internet Security. In any mode, if anything, you can tweak the settings to achieve the desired functionality.

As they say, the flight is normal, only the product is paid and after 30 days it will stop working and ask for money. Tell me, is there any free firewall of the same quality?

Hello friends! Today's article is about the popular and free firewall Comodo Firewall.

Security software from the developer company Comodo Group has gained popularity in the software market due to the presence of three important components in software products - a popular field of application, simplicity and convenience of the interface, and free distribution. It is worth noting the flexibility of the developers’ approach. Thus, a software package for protecting a computer, consisting of an antivirus, a firewall, a Sandbox and other modules, can be installed either entirely or selectively by installing only individual modules of either the Comodo AntiVirus antivirus or the Comodo Firewall into the system. It is the latter that will be discussed in more detail below. Let's look at the features of the Comodo Firewall, how to install this program and how to configure it.

Tasks and features of Comodo Firewall

Comodo Firewall, despite the fact that the product is free, provides complete protection of your computer from online threats. Moreover, it has more than once become the winner of various tests conducted by Internet software resources in order to identify the best software solution of the Firewall class. Comodo Firewall is able to protect against attacks from hackers and malware spreading over the network at the same level as paid advanced firewalls such as Outpost Firewall Pro. To put it simply, you won’t find software of the same quality and especially free on the market..

Comodo Firewall analyzes suspicious program activity on your computer and checks all of its active components, blocking the launch of anything that could harm your computer. The program's Stealth Mode makes your computer invisible to port scanning by malware. Comodo Firewall automatically detects the trusted zones of your computer, that is, those folders and files that are authorized to be shared over a home or local network.

Unlike its counterpart, which does not work well with every antivirus on the same system, Comodo Firewall is more loyal in this regard. Even if you do not like the specificity or effectiveness of the Comodo AntiVirus antivirus module, you can install any other antivirus, since Comodo Firewall, as a rule, does not conflict with third-party security software.

Several operating modes and flexible settings of Comodo Firewall will allow both beginners and more experienced users to configure the desired behavior of the firewall.

Installing Comodo Firewall

Run the downloaded Comodo Firewall installer.

The installation process is somewhat different from the standard one, since it initially involves setting some parameters for the program. After selecting the program language, we will see the installation wizard window, where you need to select some options. It is not necessary to indicate your email.

You can leave all the preset options without changing anything only in the following cases:

When it comes to a powerful computer or laptop and a high-speed Internet connection;

You fundamentally want to participate in the improvement of security software, in particular Comodo products, so that the company improves user protection;

You don't trust your ISP's DNS.

A window will open with options for installing the program, where the developer, hoping that you will quickly complete the installation and not delve into the installation settings, has prepared, in addition to the Comodo Firewall, the automatic installation of two more programs - this is the technical support client from the developer Comodo GeekBuddy and the browser with enhanced web surfing protection Comodo Dragon. There is no point in contacting the first program for those who do not know English and do not intend to pay for technical support from Comodo at the end of the free period. You can download another program - the Comodo Dragon browser based on Chromium - for free on the Internet and install it at any other convenient time when the question arises about changing the browser.

Now you can safely press the “Forward” button.

In the next window, we are forced to install Yandex elements along the way and the omnipresence of this search engine in the browser. Let's refuse this service, since it can hardly be called a missed opportunity in life. Click the start installation button below.

The program will install. After launching it, we will see that the computer needs to be restarted. Click the “Fix” button.

Launching Comodo Firewall

The computer will reboot, and we will find a lot of Comodo Firewall windows on the desktop - information about Comodo technologies, a program gadget and a firewall pre-settings window, where we need to indicate which network the computer is connected to - home, work or a public network location, for example, with a Wi-Fi access point.

After this, Comodo Firewall will minimize to the system tray, from where the program interface can be called up at any time.

For any actions performed on the computer for which the firewall has not yet created a rule, you need to give it approval, unless, of course, we are talking about an unauthorized launch.

You will have to approve the launch of every program unknown to Comodo Firewall on your computer until the firewall develops rules of conduct for each of the programs launched. Of course, at first you will have to tinker, but this is actually a small price to pay for the ability to control network connections.

Setting up Comodo Firewall

Comodo Firewall is designed for a wide range of users, including beginners, and the computer will be safe even with the settings preset by the developer. But more experienced users will certainly be interested in using the capabilities of Comodo Firewall for enhanced computer protection.

We launch the firewall using its shortcut in the system tray. In the main window that opens in front of us, we see the program status - the computer is protected. We also see the number of network intrusions, the number of blocked intrusions, and software updates.

Using the button in the upper left corner, we can switch to the program displaying a detailed summary. And then return to the summary view again.

In the main window of Comodo Firewall there is a "Game Mode" option. Game mode is essentially a full-screen mode not only in games, but also when watching videos, as well as in any other applications that are displayed in full screen. When we switch to this mode, the firewall will not bother us with its notifications and will make all decisions itself.

To open advanced firewall settings, in the main Comodo Firewall window with a detailed summary, click the “Firewall” link.

Detailed firewall settings will open, where you can change certain preset parameters.

You can, for example, at the top of the settings window, change the preset “Safe Mode” of the firewall, when the network activity of programs in the list of trusted ones is allowed, and Comodo Firewall does not jerk on every occasion, to other modes. For example:

“Full blocking” - in this mode, any network activity is excluded. This mode is simply irreplaceable if your computer is infected with a virus.

“Custom set of rules” - as the name of the mode implies, it provides for strict control and user participation in decision-making for each network request for which there are no previously defined rules.

“Learning mode” - in this case, Comodo Firewall does not interfere with the activity of running programs, but only monitors events.

Comodo Internet Security (CIS)- this is an antivirus + firewall. Comodo Internet Security also has a SandBox (sandbox), in which you can run applications so that they do not affect the system (in an isolated environment). It is possible to filter all traffic through Comodo's DNS servers, minimizing the threat of viruses and malicious sites. There is a virtual desktop, in the virtual desktop you can safely run programs and surf the Internet, and it also protects against keyloggers. You can use tablet mode and Windows desktop mode.

There is also an intrusion prevention system called HIPS (Host-based Intrusion Prevention System), which analyzes the behavior of programs.

Comodo Internet Security (CIS) is the best free antivirus and firewall.

Download Comodo Internet Security available on the official website comodorus.ru/free_versions/detal/comodo_free/8.

During installation, the program can also be installed:

- Comodo Dragon(enhanced security Internet browser from Comodo). I did it earlier.
- Comodo Antivirus(antivirus)
- Comodo Firewall(firewall)
- Comodo Geekbuddy This is a shareware service (limited 60 days). It works on the principle of 24/7 technical support. Communication takes place using the Internet messenger built into the program)

You can choose what to install and what not to install during the installation process of the program package.

So let's start installing Comodo Internet Security. We launch the installer and the files for installation begin unpacking.

If User Account Control comes up with a question: should I allow the following program to make changes on this computer? Click yes.

Select the installation language for Comodo Internet Security Premium and click OK.

You can enter your email address (optional).

You can check the box " I want to provide additional security on the Internet by switching to COMODO Secure DNS service, minimizing the threat of viruses and malicious sites so that all requests are filtered and processed on Comodo servers and malicious sites are blocked and other threats do not reach you.”

You can check the box “I want to use Cloud Application Behavior Analysis, transferring unidentified programs to COMODO, subject to the terms of the Privacy Policy.”

You can check the box “Anonymously send application usage data (configuration information, crashes, errors, etc.) to COMODO to make changes that improve the operation of the program.”

Push forward.

Uncheck the following items:

Install Yandex elements
- make Yandex the home page (applies to all supported browsers)
- make Yandex the default search engine (applies to all supported browsers)

Click agree. install.

The installation of Comodo Internet Security Premium begins. The Comodo Dragon browser is installed first.

The installation of Comodo Internet Security Premium then begins.

After installing Comodo Internet Security Premium, the Comodo Internet Security Premium widget appears on the Windows desktop, which shows system security, Internet speed, and quick launch of Internet browsers.

When you first launch Comodo Internet Security Premium, it scans your computer for threats.

You can stop it or continue scanning in the background (which will take longer to scan but use fewer resources and put less strain on your computer). This is called a hidden task - a task that requires fewer resources to complete than an active task.

This is what the main window of Comodo Internet Security Premium looks like.

This window will also pop up with a short story about the programs Viruscope, content filter, GeekBuddy. Check the box at the bottom left to not show this window again and close it.

Network detected. Please indicate your location:

I am at home. Select if you have connected your computer to your home local network
- I am at work. Select if you have connected your computer to an office LAN
- I'm in a public place. Select if you are in a public place, such as a cafe, hotel, school, etc.

I chose I am in a public place.

By clicking on the tasks at the top right, we will switch to tasks.

You can switch back by clicking on the main window.

In Tasks, you can enter Firewall Tasks and select advanced settings to configure various aspects of the firewall.

Firewall settings. You can enable or disable the firewall and select its operating mode. Do not show alerts, automatically detect private networks, show alerts, trustconnect, show animation on the CIS icon in the notification area, create rules for secure applications, configure alert frequency level, display alert time on screen, enable IPv6 traffic filtering, block fragmented IP traffic, analyze the protocol.

Global rules.

The following global rules are active on this computer:

Allow IP Outgoing from MAC Any to MAC Any
- allow ICMPv4 Incoming from MAC Any to MAC Any
- block IP Incoming from MAC Any to MAC Any

You can add a new firewall rule.

Sets of rules.

Here you can configure which sets of rules are used on this computer.

Content filter.

This option configures the firewall to filter access to sites in accordance with the rules and profiles specified below.

Antivirus monitoring.

Perform real-time scanning (recommended).
Continuous anti-virus monitoring is carried out in parallel with the execution of user tasks.

Form a cache if the computer is in standby mode, scan the memory when the computer starts, do not show alerts, unzip and scan files: .jar, .exe, configure the level of heuristic analysis, search for potentially unwanted applications.

Interface.

You can change the interface to Classic Theme, Tile Theme, Modern Theme. Also show notifications from the COMODO message center, show informational messages, show a greeting on startup, show a widget on the desktop, show informational messages when task windows are minimized or tasks are running in the background, accompany notifications with a sound signal, protect settings with a password.

Updates.

Check for program updates.

Automatically download program updates. If the option is enabled, program updates will be downloaded automatically. When to install them is up to you to decide. Check for anti-virus database updates every 6 hours.

Do not check for updates if these connections are used.

Do not check for updates when running on battery power.

Proxy server settings.

Configuration.

In this section you can import and export configurations, as well as change the current configuration.

Types of scanning.

On this page you can add, delete or edit scan profiles and schedules.

Protected objects.

Objects protected on this computer.

Here you can add a folder or file that needs to be protected from changes that are not made by you, as well as from intrusions by other programs.

Use cloud verification (recommended) so that the file is checked against the database in the cloud. Perform cloud-based analysis of unknown files, allowing you to get quick results and save computer resources. Trust applications signed by trusted providers. Trust applications installed using trusted installers.

The Comodo Internet Security widget on the desktop can be disabled, or a brief summary can be provided, and links to browsers and social networks can also be included. networks and for the widget to show your Internet traffic.

In Comodo Internet Security Premium, you can enable a virtual desktop to surf the Internet safely, for example, without fear that someone will steal your password, or run a virus to test its effect without harming the system, or run an application that will not affect your system in any way. system, but only operate within the virtual desktop.

To use the virtual desktop you need to download and install Microsoft Silverlight. Click yes to begin the download and installation.

Click agree. Install.

Microsoft Silverlight 5.1 is loading.

The virtual desktop is loading.

You can return to Windows again.

You can go to settings...

and change the virtual desktop mode from a tablet PC to a regular PC.

You can freely use the Comodo virtual machine.

Launching in Sanbox is needed in order to isolate the application from the system.

You can clean your computer of viruses and threats with Comodo Cleaning Essentials.

With Comodo Cleaning Essentials, you can start scanning and detect and remove viruses, rootkits, hidden files and malicious items in the system registry.

Checking the MBR (Windows boot area).

A reboot is required to complete the scan.

You can view activity and monitor ongoing processes using Comodo Killswitch.

Allow User Account Control to take action by clicking Yes.

Click agree. Install to download and install Comodo Killswitch.

Comodo Killswitch is loading.

Comodo Killswitch application initialization.

In Comodo Killswitch you can see the activity of all processes in the system and stop them if they seem suspicious and unnecessary to you, and also find an application that is eating up a lot of system resources. You can also see how busy the CPU is and see which application is consuming Internet traffic.

How to find something forbidden in tor

optimally, with a minimum of pop-up notification windows, quickly andconfigure it yourself . The author's version of the program's advanced settings largely coincides with that recommended in the Russian part of the International COMODO Forums (thread "CIS/CFP for beginners in firewalls"). These forums can be visited by clicking on the "Miscellaneous" tab and clicking "Visit Support Forum". The only thing is that you will be taken to the main English page, so in order not to search, here is the directlink to the forum "In Russian / Russian". There is a lot of useful information on the topic - those who wish, of course, can “dig into it.” And for convenience, point by point, I will proceed to what I promised.


Setting up Comodo Firewall

1. At the beginning, I suggest changing the default gray and sad “face” of Comodo Firewall to something more interesting. To do this, in the same “Miscellaneous” tab, click “Settings” > “Appearance” > “Theme” and change the gray COMODO Default Normal theme to, say,. COMODO Blue Normal and, having dressed up, we move on.

2490 23.12.2009

Tweet

Plus

Let's start getting acquainted with Comodo Firewall by installing it.

When you run the installation file, a warning window appears warning you about the need to remove other programs of a similar purpose in order to avoid conflict situations

If you already have any firewall installed, remove it; if not, then feel free to continue.
Now click on the “YES” button in the warning window. Further installation is standard for most Windows programs. You just need to click “Next”. At the end, the program will offer configuration options: automatic or custom

Leave it on automatic. To complete the installation, all you have to do is restart your computer.

After the reboot, you will immediately be asked questions about the activity of programs that can use the network.

Here you need to understand which program you allow or prohibit activity. When you click the “Allow” or “Deny” button, the firewall will allow or not allow the program to access the Internet once. If the program tries to access the Internet again, the window about its activity will be displayed again. If you are confident in the program that is trying to access the Internet, you can check the “Remember my answer for this application” checkbox and click “Allow”. Comodo Firewall will now understand that you trust this application and allow it to run without interference. In the same way, a ban is set for the program: check the box “Remember my answer for this application” and click “Ban”. Comodo will always block this program.

During testing, the first questions were asked regarding alg.exe and svchost.exe.

These are system programs and must be allowed access. Questions about user programs will be asked as they are launched. If the program is intended to work on the Internet or via the Internet, then it must be allowed. If it is clear that the program is overly zealous in caring about the user and wants to download something from the Internet or transmit it via the Internet, then its access should be denied. Thus, you, interested in your safe stay on the global network, after some time will create rules of conduct for all programs installed on the computer.

Having made an erroneous ban or allowed the program to be active, you can always use the Comodo Firewall settings and correct the situation. Looking at the lower right corner of the screen, where the clock is located, you will see an icon with a shield. This is Comodo. Right-click on the icon and select Open. The main program window will open immediately

The main window clearly shows the basic parameters of the firewall.
At the top of the window you can choose between the “Summary”, “Protection”, “Activity” panels.

On the left are icons for switching between the windows of this panel:

Tasks– In this window, you can quickly allow or deny program access to the network, as well as select other options, the capabilities of which are well described under the name of each option. It is better not to touch anything unless necessary.

Application Monitor– designed to view and edit the list of applications that the user trusts. The window is presented in the form of a table, which indicates:

  • program name (Application),
  • IP address to which the connection is made (Recipient),
  • port number on which communication takes place (Port),
  • protocol within which the reception and transmission of information is carried out (Protocol),
  • Well, and the column (Permission), which shows whether access to the application is allowed or denied.

Pay attention to the quick action options:

  • Enable/disable – you can temporarily disable some of the rules, for example, for testing purposes.
  • Add – fully customizable ability to create a new rule.
  • Edit – Edit the rule on which the cursor is positioned.
  • Delete – permanently removes the rule from the list.

By double-clicking the left mouse button on the program name or clicking “Edit”, you will be taken to the window for fine-tuning (editing) the rule

This window indicates the full path to the program on disk, the path to the program that is the parent of the one being configured. Nothing needs to be changed here.

And by looking at the tabs below you can:
- assign a program action to the application activity, indicate the protocol and direction of the program activity (whether the program receives information (Incoming), sends (Outgoing) or both receives and sends),
- specify one or more IP addresses with which the application interacts. One or more ports that an application opens when communicating.

Component Monitor– designed to monitor the integrity of important files – sometimes viruses try to change files and Comodo can prevent this.

Network Monitor- Attention! The order of the rules is important here! Comodo Firewall scans rules from top to bottom. This tab allows you to fine-tune the firewall filtering parameters for data transmission by IP addresses and ports. Here you can forcefully close potentially dangerous ports. Here's how to do it:
Click the “Add” button and in the window that appears

select the “block” action and specify “one port” on the “Source Port” tab, and also enter the port number, for example, 137. Click the “OK” button. The new rule will appear in the list.
Use the “Up” or “Down” arrows to specify the location of the rule in the list. To avoid mistakes, for now you can simply place the rule in the middle.

On the bookmark "Additionally" In the “Protection” window, you can further configure the firewall. These features need to be mastered gradually; as you work with the program, you will understand when there is a need for additional settings.

Going to the panel "Activity" we will see two tabs: “Connections” and “Log”
IN "Connections" a list of programs that are currently active is displayed. Here you can see if there is anything suspicious among the programs you trust. As well as the amount of data transmitted/received.

IN "Journal" A chronological record of important events is maintained. You can always refer to it when analyzing the actions of one of the programs.

And of course, don’t forget to update the program components. By clicking the “Update” button at the very top, you will launch the wizard for downloading new components. This simple procedure will prevent new emerging malware from carrying out destructive actions on your computer. By default, the settings are set to automatically check for updates.

Easy to use and configure, the Comodo firewall program will protect your Internet browsing and help you learn to understand the processes that occur during the exchange of information over the network.

Tweet

Plus

Please enable JavaScript to view the

As they say, the flight is normal, only the product is paid and after 30 days it will stop working and ask for money. Tell me, is there any free firewall of the same quality?

Hello friends! Today's article is about the popular and free firewall Comodo Firewall.

Security software from the developer company Comodo Group has gained popularity in the software market due to the presence of three important components in software products - a popular field of application, simplicity and convenience of the interface, and free distribution. It is worth noting the flexibility of the developers’ approach. Thus, a computer protection software package consisting of an antivirus, a firewall, a Sandbox and other modules can be installed either entirely or selectively by installing only individual modules of either the Comodo AntiVirus antivirus or the Comodo Firewall into the system. It is the latter that will be discussed in more detail below. Let's look at the features of the Comodo Firewall, how to install this program and how to configure it.

Tasks and features of Comodo Firewall

Comodo Firewall, despite the fact that the product is free, provides complete protection of your computer from online threats. Moreover, it has more than once become the winner of various tests conducted by Internet software resources in order to identify the best software solution of the Firewall class. Comodo Firewall is able to protect against attacks from hackers and malware spreading over the network at the same level as paid advanced firewalls such as Outpost Firewall Pro. To put it simply, you won’t find software of the same quality and especially free on the market..

Comodo Firewall analyzes suspicious program activity on your computer and checks all of its active components, blocking the launch of anything that could harm your computer. The program's Stealth Mode makes your computer invisible to port scanning by malware. Comodo Firewall automatically detects the trusted zones of your computer, that is, those folders and files that are authorized to be shared over a home or local network.

Unlike its counterpart, which does not work well with every antivirus on the same system, Comodo Firewall is more loyal in this regard. Even if you do not like the specificity or effectiveness of the Comodo AntiVirus antivirus module, you can install any other antivirus, since Comodo Firewall, as a rule, does not conflict with third-party security software.

Several operating modes and flexible settings of Comodo Firewall will allow both beginners and more experienced users to configure the desired behavior of the firewall.

Installing Comodo Firewall

Run the downloaded Comodo Firewall installer.

The installation process is somewhat different from the standard one, since it initially involves setting some parameters for the program. After selecting the program language, we will see the installation wizard window, where you need to select some options. It is not necessary to indicate your email.

You can leave all the preset options without changing anything only in the following cases:

When it comes to a powerful computer or laptop and a high-speed Internet connection;

You fundamentally want to participate in the improvement of security software, in particular Comodo products, so that the company improves user protection;

You don't trust your ISP's DNS.

A window will open with options for installing the program, where the developer, hoping that you will quickly complete the installation and not delve into the installation settings, has prepared, in addition to the Comodo Firewall, the automatic installation of two more programs - this is the technical support client from the developer Comodo GeekBuddy and the browser with enhanced web surfing protection Comodo Dragon. There is no point in contacting the first program for those who do not know English and do not intend to pay for technical support from Comodo at the end of the free period. You can download another program - the Comodo Dragon browser based on Chromium - for free on the Internet and install it at any other convenient time when the question arises about changing the browser.

Now you can safely press the “Forward” button.

In the next window, we are forced to install Yandex elements along the way and the omnipresence of this search engine in the browser. Let's refuse this service, since it can hardly be called a missed opportunity in life. Click the start installation button below.

The program will install. After launching it, we will see that the computer needs to be restarted. Click the “Fix” button.

Launching Comodo Firewall

The computer will reboot, and we will find a lot of Comodo Firewall windows on the desktop - information about Comodo technologies, a program gadget and a firewall pre-settings window, where we need to indicate which network the computer is connected to - home, work or a public network location, for example, with a Wi-Fi access point.

After this, Comodo Firewall will minimize to the system tray, from where the program interface can be called up at any time.

For any actions performed on the computer for which the firewall has not yet created a rule, you need to give it approval, unless, of course, we are talking about an unauthorized launch.

You will have to approve the launch of every program unknown to Comodo Firewall on your computer until the firewall develops rules of conduct for each of the programs launched. Of course, at first you will have to tinker, but this is actually a small price to pay for the ability to control network connections.

Setting up Comodo Firewall

Comodo Firewall is designed for a wide range of users, including beginners, and the computer will be safe even with the settings preset by the developer. But more experienced users will certainly be interested in using the capabilities of Comodo Firewall for enhanced computer protection.

We launch the firewall using its shortcut in the system tray. In the main window that opens in front of us, we see the program status - the computer is protected. We also see the number of network intrusions, the number of blocked intrusions, and software updates.

Using the button in the upper left corner, we can switch to the program displaying a detailed summary. And then return to the summary view again.

In the main window of Comodo Firewall there is a "Game Mode" option. Game mode is essentially a full-screen mode not only in games, but also when watching videos, as well as in any other applications that are displayed in full screen. When we switch to this mode, the firewall will not bother us with its notifications and will make all decisions itself.

To open advanced firewall settings, in the main Comodo Firewall window with a detailed summary, click the “Firewall” link.

Detailed firewall settings will open, where you can change certain preset parameters.

You can, for example, at the top of the settings window, change the preset “Safe Mode” of the firewall, when the network activity of programs in the list of trusted ones is allowed, and Comodo Firewall does not jerk on every occasion, to other modes. For example:

“Full blocking” - in this mode, any network activity is excluded. This mode is simply irreplaceable if your computer is infected with a virus.

“Custom set of rules” - as the name of the mode implies, it provides for strict control and user participation in decision-making for each network request for which there are no previously defined rules.

“Learning mode” - in this case, Comodo Firewall does not interfere with the activity of running programs, but only monitors events.







2024 gtavrl.ru.