Installing and configuring programs (overview): firewall (firewall) Comodo Firewall (end). Optimal settings for Comodo Internet Security Reset custom rules in comodo firewall

review, we examined in detail and "pictures" the process of installing a freeComodo Firewallon computer. Now, as promised, I will tell you howfirewall optimally, with a minimum of pop-up notifications, quickly and independently configure. The author's version of the advanced settings of the program largely coincides withrecommended in the Russian part InternationalCOMODO Forums(branch " CIS/CFP for beginners in firewalls"). These forums can be visited by clicking on the "Miscellaneous" paragraph " Visit Support Forum ". The only thing is that you will be taken to the main English-language page, therefore, in order not to search, here is a direct link to the forum " In Russian / Russian " (clickable!). There is a lot of useful information on the topic - those who wish, of course, can "dig around." And I, as usual, for convenience the points I will proceed with what I promised.

Advanced settings for Comodo Firewall

1. In the beginning, I propose to change the default (default) gray-gloomy "face" Comodo Firewall to something more interesting. To do this, in the same tab "Miscellaneous" click " Settings" → "Appearance" → in "Theme" change the "gray" theme "COMODO Default Normal" to, for example, "COMODO Blue Norma"l (first screenshot) and, having "dressed up", move on.

2. The first of the advanced settings of the program will be the inclusion of the "invisibility" mode of your computer on the network. To do this, in the tab " firewall"click applet" Hidden Port Wizard " → select " Block all incoming connections and hide my ports for all incoming connections " (screenshot above) and confirm your choice through " OK ".

3. Further, in the same tab " firewall"let's go in" Firewall settings "and on the tab" General settings "activate" ". Now for all applications from the list of trusted ones, allowing rules will be automatically created, which will save you from unnecessary manual permissions. In addition, check the box next to "Automatically detect new private networks " (which can be removed after detecting your network) and, most importantly, " Firewall mode "leaving unchanged" Safe ".

Confirm all changes in the settings with the button " OK".

4. Let's take care of the mode settings " Proactive Defense". To do this, in the tab " Defense+"click" Proactive Defense Settings " and, by analogy with the previous settings item, activate " Create rules for secure applications ". In case you are sure that the system is clean from viruses and have an effective antivirus scanner (which I wrote about in a note " ") like free, then feel free to put " Clean PC mode " - again, to get rid of "annoying" notifications. Also check the absence of a daw in front of " Enable Enhanced Protection Mode " and presence - opposite the item " BUT adapt the operating mode at low system resources " (no comment).

5. In the same settings of the Proactive Firewall Protection in the tab " Application execution control settings " check that unrecognized files are treated as " Partially limited " (default) or " suspicious " - under other settings, some applications will refuse to start.

6. Users of older versions Comodo Firewall< 5.3 рекомендуется отключить в программе режим "Sandbox " ("Песочница"), по отзывам, работающий некорректно. Лучший вариант – просто перейти на последнюю стабильную версию брандмауэра (на данный момент – v. 5.10), которую можно скачать, например, из Каталога избранного софта. В этом случае отключение режима "Песочницы" не требуется.

And do not forget to confirm the changes in the settings with the " OK ".

Note : When Proactive Defense is completely disabled, this option ("Sandbox") is automatically disabled.

7. The final tweak from the "optional" category: in the " Miscellaneous " → "Settings" → on tab " General"uncheck the checkbox" Automatically check for program updates" (penultimate screenshot), especially since the option " Check for updates "always "at hand" (last screenshot).

One more click on the button OK" and you can close the appropriately configured Comodo Firewall– after restarting Windows, with this configuration, "comfortable" for the user, the program reliably protects the computer from network threats.

Getting to the settings is quite problematic, since there is no button of the same name. However, the menu Tasks did you see the button Advanced settings(Sandbox tasks and Advanced tasks), by clicking which you can get to the parameters window (Fig. 4.99).

Rice. 4.99. Advanced settings

The window is divided into two parts: on the left - settings categories, on the right - changeable parameters. There are only two categories: General settings and Security Settings(Fig. 4.100).


Rice. 4.100. General settings

The General Settings has four subcategories.

Interface. In this subcategory, you can change the language of the program, as well as adjust the visual and sound settings. To do this, check the boxes next to the corresponding parameters. The more of them are enabled, the more often the program reminds of its presence on the computer. Separately, it should be noted the ability to block access to the program settings through a password. To do this, select the Protect settings with a password checkbox, click the Set password link, and enter your password in the window that appears.

Updates. We are talking about updating both anti-virus databases and the program itself. It is here that you can configure the frequency of checking for updates (Fig. 4.101).

Journaling. You can disable logging or, conversely, enable it.

Configuration. The subcategory is responsible for protection priorities. By default, COMODO - Internet Security is selected, which is sensitive to threats from the Internet. If you spend a lot of time on the Web, then don't change anything. COMODO - Proactive Security aims to protect on the inside. Select it if your computer had a large number of viruses. COMODO - Firewall Security provides only network protection (firewall). To change the configuration, double-click on the required item (Fig. 4.102).



Rice. 4.101. Configuring Updates



Rice. 4.101. Configuration Setting

The default security settings are set to a very high level (Fig. 4.103). The only thing you can do is lower protection and exclude individual files from scanning. For an ordinary user, these settings are unlikely to be useful, so we will not dwell on them in detail.



Rice. 4.103. Security Settings

COMPUTER CHECK

You can start scanning in the main window using the button Scan. You can also use the button Tasks (General Tasks Scan). In the window that opens, select the type of scan (Fig. 4.104):

Quick scan - checks areas of the computer that are susceptible to infection;

Full scan - check all files on the computer;

Custom scan - check individual files or folders ( Custom Scan Scan Folder or scan file)(Fig. 4.106).

rice. 4.104. Scan profiles



Rice. 4.106. Custom scan

In addition, you have the option to create your own profile. To do this, the menu Custom scan press the button Other options, in the window that opens, click the button Add(Fig. 4.107).



Rice. 4.107. Create a scan profile

In the next window (Fig. 4.108), give the profile a name and add scan objects: individual files and entire areas (tab Objects). On the tab Options select the severity of the check. The more checkboxes you select, the more thorough the check will be. In the tab Schedule set the time and frequency of this type of scan. Click OK.



Rice. 4.108. Setting up a scan profile

Now in the window Scanning(see fig. 4.104) the created object scanning profile will appear. Check the box to activate it - and at the scheduled time, the antivirus will start scanning.

Summing up, it should be noted the high efficiency of COMODO Antivirus. He does an excellent job with the task assigned to him. The disadvantages include not very clear interface.

review, we examined in detail and "pictures" the process of installing a freeComodo Firewallon computer. Now, as promised, I will tell you howfirewall optimally, with a minimum of pop-up notifications, quickly and independently configure. The author's version of the advanced settings of the program largely coincides withrecommended in the Russian part InternationalCOMODO Forums(branch " CIS/CFP for beginners in firewalls"). These forums can be visited by clicking on the "Miscellaneous" paragraph " Visit Support Forum ". The only thing is that you will be taken to the main English-language page, therefore, in order not to search, here is a direct link to the forum " In Russian / Russian " (clickable!). There is a lot of useful information on the topic - those who wish, of course, can "dig around." And I, as usual, for convenience the points I will proceed with what I promised.

Advanced settings for Comodo Firewall

1. In the beginning, I propose to change the default (default) gray-gloomy "face" Comodo Firewall to something more interesting. To do this, in the same tab "Miscellaneous" click " Settings" → "Appearance" → in "Theme" change the "gray" theme "COMODO Default Normal" to, for example, "COMODO Blue Norma"l (first screenshot) and, having "dressed up", move on.

2. The first of the advanced settings of the program will be the inclusion of the "invisibility" mode of your computer on the network. To do this, in the tab " firewall"click applet" Hidden Port Wizard " → select " Block all incoming connections and hide my ports for all incoming connections " (screenshot above) and confirm your choice through " OK ".

3. Further, in the same tab " firewall"let's go in" Firewall settings "and on the tab" General settings "activate" ". Now for all applications from the list of trusted ones, allowing rules will be automatically created, which will save you from unnecessary manual permissions. In addition, check the box next to "Automatically detect new private networks " (which can be removed after detecting your network) and, most importantly, " Firewall mode "leaving unchanged" Safe ".

Confirm all changes in the settings with the button " OK".

4. Let's take care of the mode settings " Proactive Defense". To do this, in the tab " Defense+"click" Proactive Defense Settings " and, by analogy with the previous settings item, activate " Create rules for secure applications ". In case you are sure that the system is clean from viruses and have an effective antivirus scanner (which I wrote about in a note " ") like free, then feel free to put " Clean PC mode " - again, to get rid of "annoying" notifications. Also check the absence of a daw in front of " Enable Enhanced Protection Mode " and presence - opposite the item " BUT adapt the operating mode at low system resources " (no comment).

5. In the same settings of the Proactive Firewall Protection in the tab " Application execution control settings " check that unrecognized files are treated as " Partially limited " (default) or " suspicious " - under other settings, some applications will refuse to start.

6. Users of older versions Comodo Firewall

And do not forget to confirm the changes in the settings with the " OK ".

Note: When Proactive Defense is completely disabled, this option ("Sandbox") is automatically disabled.

7. The final tweak from the "optional" category: in the " Miscellaneous " → "Settings" → on tab " General"uncheck the checkbox" Automatically check for program updates" (penultimate screenshot), especially since the option " Check for updates "always "at hand" (last screenshot).

One more click on the button OK" and you can close the appropriately configured Comodo Firewall– after restarting Windows, with this configuration, "comfortable" for the user, the program reliably protects the computer from network threats.

As a result of unsuccessful attempts to force the databases to be updated, I decided to simply install Comodo again, but the version is younger, in order to test it. Comodo Internet Security is a complete protection that includes antivirus, firewall and proprietary features such as Hips and more.

Before Comodo, I tried various antiviruses. This includes Doctor Web, Kaspersky, AVG, Nod32, Avast, Panda, MalwareAntimalware and even the Chinese Rising, which works surprisingly well.

Most of all I like Kaspersky, which served me faithfully for several years, but it was time to find something to replace it, and as a result of a long search, I chose the free Comodo. Now he protects, for several years, the computer.

Comodo, and everyone admits it, has an awesome firewall. In fact, only he alone solves the problem of the security of being on the network. The antivirus is also excellent, but I prefer not to use it, although it works normally. Instead of an antivirus, I download a scanner from DrWeb called CureIt and check my computer every few months.

Comodo is highly customizable and comes across as a very professional (and it is) product. Overall, I like Comodo and I'm happy with it. It just needs to be set up correctly. I am easily versed in any programs, so it was not difficult for me to figure out the Comodo settings.

I specifically made several screenshots of Comodo for this article, for which I had to go to WinXP, where I have the most recent version of Comodo installed, which I have not entered for probably half a year.

I will not talk about all Comodo settings. Any updates, messages, alerts you decide for yourself to leave or not. I will tell you only about the most basic settings, as well as some tricks in these settings.

What to do if the browser is infected? Read about it.

This Comodo differs from the 5th version in its improved and beautiful interface.

In my opinion, despite the beauty, the 5th version is still more convenient. There, all the settings are better grouped and informative.

For example, in the new version of Comodo, it is not clear when the anti-virus database was updated; no date. In the 5th version, this is indicated by the update date.

The settings for anti-virus scan profiles and exclusions are hidden so that they can only be found by having a good understanding of the structure of the Comodo interface in previous versions.

More on this below. However, let's just start with that.

As for the antivirus, here you can leave the setting for scanning the computer's memory at startup. By default, there is a checkbox for scanning archives. I always remove it, because often there are tablets in the archives, and the antivirus mercilessly deletes them.

As for cumulative scanning, in this mode, those files that have changed since the previous scan will be scanned. You can select "Scan on Access". It's up to you to decide. I always choose cumulative scan.

American developers were smart, in my opinion, with a list of scans. The fact is that if you do not know how to configure the antivirus, every time you start the computer, the antivirus will be checked. Not everyone and not always needs it. And to disable this automatic scanning, you need to know where to do it. The Comodo developers have made this non-obvious, for some reason. In general, in order to configure it as we need, we go to the "List of scans" and there we see the default list, and at the bottom there is a barely noticeable arrow.



That's what we need. We drag it up, the "Add", "Edit", etc. windows appear, where we can already do something. We cannot delete the default profiles of the scan list, but we can change them or add our own. In the line "Schedule" we set the desired position so that the scan does not start automatically with the start of the system. If we need a scan, we can always start it manually from the main window of the antivirus by clicking on the "Scan" button.

However, profiles can be configured so that scanning is enabled once a week, for example, at night or during the day. The idea itself with a schedule of "Full" or "Quick" scans is good, but it should have been done more clearly, and not hidden away from the user far into the bowels of the program.

The situation is similar with "Exceptions". The developers also managed to hide the setting of this extremely important item behind such an arrow, which is visible below in the main window when you go along the "Antivirus ---> Exceptions" path.

We drag this arrow up and a window with actions will pop up, thanks to which we can already fully work with exceptions.

We put in the "Exceptions" all those files and folders that, in our opinion, should be ignored by Comodo.

A few words about the Proactive Protection Mode. This is a proprietary feature of Comodo, which they consider to be almost the main one in protecting a computer. The version we're reviewing has a HIPS (Host-based Intrusion Prevention System) setting. The settings are below in the screenshot. You can select "Safe Mode". In it, all unknown actions on the computer will be under control. If you know / are sure that the computer is free of viruses and is clean, then you can set the "Clean PC" mode. In this mode, all files are recognized as trusted, and we receive fewer alerts from Comodo. I put in the settings "Clean PC".

HIPS is optional, but can be turned off. But if you use it, then I recommend that you check the box next to "Create rules for secure applications", specially highlighted in green. This will make it easier for you to further interact with Comodo. It will create rules and once you confirm them, you will not receive messages from Komodo for the same reason.

Well, setting up a firewall, or simply a firewall. Comodo's firewall is one of the best on the market. This is recognized by all experts and ordinary users. Some people specifically download only the Comodo firewall to use it with a third-party antivirus. There is nothing complicated in the settings.

Just as in the screenshot above, be sure to check the box to create rules so as not to receive constant messages from Comodo. The rest is up to you. I set it to "Safe Mode". Even with the default settings, the firewall does its job well.

If you want to make the computer invisible on the network, you can enable the blocking of all incoming connections and hiding your ports for all incoming connections in the hidden ports wizard. But, if you are using a home network, which is most often the case, it is better to activate the alert mode for incoming connections and make a separate decision for each port. For the most advanced: in the advanced firewall settings, you can put checkboxes everywhere, except for monitoring NDIS other than TCP / IP.

A little about the Sandbox mode. This cool thing, if enabled, isolates all unknown files and runs them in itself (sandbox). In this mode, files, if they are dangerous, will not harm the system. Not every paid antivirus has a sandbox. The free Comodo has it. So use it.

You should be aware that the Sandbox and Protection Plus (Proactive) modes are not required to be activated. Without them, with just an antivirus and a firewall, you can normally secure your system. But the above modes make the protection even more reliable and powerful.

And I would also like to say about the configurations. There are three of them by default. These are: Internet Security, Proactive Security and Firewall Security. For many, these things are incomprehensible, but there is nothing complicated here. These are, in fact, a kind of presets, ready-made presets. Firewall Security gives priority to network protection, the activity of the antivirus, as it were, is reduced: it seems to work, but it seems not. In general, it is almost invisible and inaudible in this mode. The same is true in other modes: In Proactive, priority is given to proactive protection, in Internet Security, priority is given to antivirus and network protection. I usually install Internet Security. In any mode, if anything, you can tweak the settings to the desired functionality.

As they say, the flight is normal, only the product is paid and after 30 days it will stop working, it will ask for money. Tell me, is there any free firewall of the same quality.

Hello friends! Today's article is about the popular and free Comodo Firewall.

Security software from the Comodo Group developer company has gained popularity in the software market due to the presence of three important components in software products - the demanded scope, the simplicity and convenience of the interface, as well as free distribution. Separately, it is worth noting the flexibility of the approach of developers. So, a software package for protecting a computer, consisting of an antivirus, a firewall, a Sandbox (Sandbox) and other modules, can be installed both as a whole and selectively by installing only individual modules of either the Comodo AntiVirus antivirus or the Comodo Firewall firewall into the system. It is the latter that will be discussed in more detail below. Consider the features of the Comodo Firewall, how to install this program and how to configure it.

Tasks and features of Comodo Firewall

Firewall Comodo Firewall, despite the fact that the product is free, provides complete protection for your computer against network threats. Moreover, it has repeatedly become the winner of various tests conducted by Internet software resources in order to identify the best software solution of the Firewall class. Comodo Firewall is able to protect against hacker attacks and malware spreading over the network at a level with paid advanced firewalls like Outpost Firewall Pro. To put it simply, you will not find software of the same quality, and even more so free, on the software market..

Comodo Firewall analyzes the suspicious activity of programs on the computer and checks all their active components, blocking the launch of everything that can harm the computer. The program's Stealth Mode makes the computer invisible to port scanning by malware. Comodo Firewall automatically detects the computer's trusted zones, that is, those folders and files that are authorized to be shared on a home or local network.

Unlike its counterpart - which does not coexist in one system with every antivirus, Comodo Firewall is more loyal in this regard. Even if you don't like the specifics or performance of the Comodo AntiVirus module, you can install any other antivirus, since Comodo Firewall usually does not conflict with third-party security software.

Several modes of operation and flexible settings of Comodo Firewall will allow both beginners and more experienced users to configure the desired behavior of the firewall.

Installing Comodo Firewall

Run the downloaded Comodo Firewall installer.

The installation process is somewhat different from the standard one, since it initially involves setting some parameters for the program to work. After choosing the language of the program, we will see the installation wizard window, where you need to select some options. Your E-Mail is optional.

You can leave all the preset options without changing anything only in such cases:

When it comes to a productive computer or laptop and a high-speed Internet connection;

You fundamentally want to participate in the improvement of security software, in particular Comodo products, so that the company improves user protection;

You don't trust your ISP's DNS.

A window will open with options for installing the program, where the developer, hoping that you will hastily install and not delve into the installation settings, has prepared, in addition to the Comodo Firewall, the automatic installation of two more programs - this is a technical support client from the developer Comodo GeekBuddy and a browser with enhanced protection for web surfing Comodo Dragon. It makes no sense to contact the first program for those who do not know English and are not going to pay for technical support from Comodo at the end of the free period. Another program - the Chromium-based Comodo Dragon browser - you can download for free on the Internet and install at any other convenient moment when the question of changing the browser arises.

Now you can safely press the "Forward" button.

In the next window, we are forced to install Yandex elements along the way and the omnipresence of this search engine in the browser. We will refuse this service, since it can hardly be called a missed opportunity in life. Click the installer button below.

The program will install. After launching it, we will see that a computer restart is required. Click the "Fix" button.

Launch Comodo Firewall

The computer will reboot, and we will find a lot of Comodo Firewall windows on the desktop - information about Comodo technologies, a gadget for the program and a firewall preset window, where we need to specify which network the computer is connected to - home, work or public network location, such as a Wi-Fi hotspot.

After that, Comodo Firewall will be minimized to the system tray, from where the program interface can be called at any time.

Any actions performed on the computer for which the firewall has not yet created a rule must be approved, unless, of course, we are talking about unauthorized launch.

You will have to approve the launch of each unknown Comodo Firewall program on the computer until the firewall develops for itself the rules of behavior for each of the launched programs. Of course, at first you have to tinker, but this is actually a small price to pay for the ability to control network connections.

Configuring Comodo Firewall

The Comodo Firewall program is designed for a wide range of users, including beginners, and the computer will be safe even with the settings preset by the developer. But for more experienced users, it will certainly be interesting to use the capabilities of Comodo Firewall to enhance computer protection.

We launch the firewall using its shortcut in the system tray. In the main window that opens before us, we see the status of the program - the computer is protected. We also see the number of network intrusions, the number of blocked intrusions, software updates.

Using the button in the upper left corner, we can switch to the display of a detailed summary by the program. And then back to the summary view again.

In the main window of Comodo Firewall is the option "Game Mode". Game mode is, in fact, a full screen mode, not only in games, but also when watching videos, as well as in any other applications that are displayed in full screen. When switching to this mode, the firewall will not bother us with its notifications and will make all decisions itself.

To open the advanced firewall settings, in the main Comodo Firewall window with a detailed summary, click the Firewall link.

Detailed firewall settings will open, where you can change certain preset parameters.

You can, for example, at the top of the settings window, change the pre-installed “Safe Mode” of the firewall, when network activity of programs that are on the list of trusted ones is allowed, and Comodo Firewall does not pull on every occasion to other modes. For example:

"Complete blocking" - in this mode, any network activity is excluded. This mode is simply an indispensable thing in case a computer is infected with a virus.

“User rule set” - as the name of the mode implies, it provides for strict control and participation of the user in decision-making on each network request for which there are no previously set rules.

"Learning mode" - in this case, Comodo Firewall does not interfere with the activity of running programs, but only monitors events.

Comodo Internet Security (CIS) It's an antivirus + firewall. Also in Comodo Internet Security there is a SandBox (sandbox), in which you can run applications so that they do not affect the system (in an isolated environment). It is possible to filter all traffic through Comodo DNS servers minimizing the threat of viruses and malicious sites. There is a virtual desktop, in the virtual desktop you can safely run programs and surf the Internet, it also protects against keyloggers (keyloggers). You can use tablet mode and Windows desktop mode.

There is also a HIPS (Host-based Intrusion Prevention System) intrusion prevention system that analyzes the behavior of programs.

Comodo Internet Security (CIS) is the best free antivirus and firewall.

Download Comodo Internet Security you can on the official website comodorus.ru/free_versions/detal/comodo_free/8.

When installing the program, you can also install:

- Comodo Dragon(Secure Internet Browser by Comodo). Previously I did.
- Comodo Antivirus(antivirus)
- Comodo Firewall(firewall)
- Comodo Geekbuddy This is a shareware service (limit 60 days). Works on the principle of round-the-clock technical support. Communication takes place using the Internet messenger built into the program)

You can choose what to install and what not to install during the installation of the program package.

So let's start installing Comodo Internet Security. We launch the installer and unpacking the files for installation begins.

If User Account Control pops up with the question: allow the following program to make changes on this computer? We press yes.

Select the installation language for Comodo Internet Security Premium and click ok.

You can enter your email address (optional).

You can check the box " I want to provide additional security on the Internet by switching to COMODO Secure DNS service, minimizing the threat of viruses and malicious sites so that all requests are filtered and processed on Comodo servers and malicious sites are blocked and other threats do not pass to you.

You can check the box "I want to use Cloud-Based Application Behavior Analysis by submitting unrecognized programs to COMODO in accordance with the terms of the Privacy Policy."

You can check the box "Anonymously send data about the use of the application (configuration, crash, errors, etc.) to COMODO so that changes can be made to improve the operation of the program."

We press forward.

Uncheck the boxes:

Install Yandex elements
- make Yandex the home page (applies to all supported browsers)
- make Yandex the default search engine (applies to all supported browsers)

Click agree. install.

The installation of Comodo Internet Security Premium begins. The Comodo Dragon browser is installed first.

Then the installation of Comodo Internet Security Premium begins.

After installing Comodo Internet Security Premium, the Comodo Internet Security Premium widget appears on the Windows desktop, which shows system security, Internet speed, and fast launch of Internet browsers.

During the first launch, Comodo Internet Security Premium scans your computer for threats.

You can stop it or continue scanning in the background (which will take longer to scan, but use fewer resources and load your computer less). This is called a hidden task - it is a task that requires fewer resources to complete than an active task.

This is what the main window of Comodo Internet Security Premium looks like.

This window will also pop up with a brief story about Viruscope programs, content filter, GeekBuddy. Put a tick in the bottom left of the item do not show this window again and close it.

Network detected. Please enter your location:

I'm at home. Select if you have connected your computer to your home LAN
- I am at work. Select if you have connected your computer to an office LAN
- I'm in a public place. Select if you are in a public place such as a cafe, hotel, school, etc.

I chose I'm in a public place.

By clicking on the top right on tasks, we switch to tasks.

You can switch back by clicking on the main window.

In tasks, you can enter firewall tasks and select advanced settings to customize various aspects of the firewall.

Firewall settings. You can enable or disable the firewall and select the mode of its operation. Do not show alerts, automatically detect private networks, show alerts, trustconnect, show animation on the CIS icon in the notification area, create rules for secure applications, configure the alert frequency level, alert display time on the screen, enable IPv6 traffic filtering, block fragmented IP traffic, analyze the protocol.

global rules.

The following global rules are active on this computer:

Allow IP Outgoing from MAC Any to MAC Any
- allow ICMPv4 Incoming from MAC Any to MAC Any
- Block IP Incoming from MAC Any to MAC Any

You can add a new firewall rule.

Rule sets.

Here you can configure which rule sets are used on this computer.

Content filter.

This option configures the firewall to filter access to sites according to the following rules and profiles.

Antivirus monitoring.

Perform real-time scanning (recommended).
Continuous anti-virus monitoring is performed in parallel with the execution of user tasks.

Generate a cache if the computer is in standby mode, scan the memory when the computer starts, do not show alerts, unzip and scan files: .jar, .exe, adjust the level of heuristic analysis, search for potentially unwanted applications.

Interface.

You can change the interface to Classic Theme, Tile Theme, Modern Theme. Also show notifications from the COMODO message center, show informational messages, show a welcome message at startup, show a widget on the desktop, show informational messages when task windows are minimized or tasks are running in the background, accompany alerts with a sound, password protect settings.

Updates.

Check for program updates.

Automatically download program updates. If this option is enabled, program updates will be downloaded automatically. When to install them, you will decide for yourself. Check for anti-virus database updates every 6 hours.

Do not check for updates if these connections are used.

Do not check for updates when running on battery power.

Proxy settings.

Configuration.

In this section, you can import and export configurations, as well as change the current configuration.

Types of scanning.

On this page, you can add, remove or edit profiles and scan schedules.

protected objects.

Objects protected on this computer.

Here you can add a folder or file that needs to be protected from changes that are not made by you, as well as from intrusions by other programs.

Use cloud validation (recommended) to check the file against the database in the cloud. Perform cloud-based analysis of unknown files, allowing you to get fast results and save computer resources. Trust applications signed by trusted vendors. Trust applications installed using trusted installers.

You can turn off the Comodo Internet Security widget on the desktop, or put a summary, also enable links to browsers, social networks. networks and have the widget show your internet traffic.

In Comodo Internet Security Premium, you can enable a virtual desktop to safely surf the Internet, for example, without fear that someone will steal your password or launch a virus to check its effect without harming the system, or run an application that will not affect your system in any way. system, but only to act within the virtual desktop.

To use the virtual desktop, you need to download and install Microsoft Silverlight. Click yes to start the download and installation.

Click agree. Install.

Microsoft Silverlight 5.1 is loading.

The virtual desktop is loading.

You can go back to Windows.

You can go to settings...

and change the virtual desktop mode from tablet pc to regular pc.

You can freely use the Comodo virtual machine.

Running in Sanbox is needed in order to isolate the application from the system.

You can clean your computer of viruses and threats with Comodo Cleaning Essentials.

With Comodo Cleaning Essentials, you can start scanning and detect and remove viruses, rootkits, hidden files, and malicious items in your system registry.

Check MBR (Windows boot area).

A reboot is required to complete the scan.

You can view activity and monitor ongoing processes with Comodo Killswitch.

Allow the user account control action by clicking yes.

Click agree. Install to download and install Comodo Killswitch.

Comodo Killswitch is loading.

Comodo Killswitch application initialization.

In Comodo Killswitch, you can view the activity of all processes in the system and stop them if they seem suspicious and unnecessary to you, as well as find an application that eats up a lot of system resources. You can also see how busy the CPU is and see which application consumes Internet traffic.

How to find something forbidden in tor

We thank him and provide instructions on how to set up the Comodo firewall for maximum protection.

Introduction

According to these settings, I would like to note that, despite their "maximum", working at a computer does not cause any particular paranoia - everything is rather moderate: once you have created rules for a program / application, requests are no longer received for configured programs. It is clear that this mode is more suitable for advanced users.

The second point - testing was carried out, both in tandem with avast! Free Antivirus, and without it. The result, as noted, was 100% in both cases (despite the fact that the screenshots have avast! antivirus, and without it, the Comodo firewall passed all tests 100% on these settings).

Moreover, with avast! and using these settings for Comodo Firewall - the antivirus simply does not have time to start working, since Comodo Firewall performs all the blocking.

In addition, in the "PC Security Test 2011" test, Сomodo Firewall blocked the first stage of the "Antivirus Proteсtion Test", closing the possibility of placing virus files in the system, although in fact this is the work of an antivirus (for example, in the Online Armor + avast! passing the first part of this test is performed by avast!).

As a result, Comodo Firewall, so to speak, does not allow the antivirus to work, as it simply blocks the possibility of viruses penetrating the system. Those. it can be noted that the reaction of Comodo Firewall to threats is very fast (although it is clear that this is synthetic). However, PC Security Test 100% (as well as the rest of the passed tests) I have not yet passed a single product from many vendors (such as Kaspersky Internet Security, Norton Internet Security, Emsisoft Internet Security, McAfee Internet Security, Bitdefender Internet Security, avast! Internet Security, etc.). I think that although it is synthetic, it is still very significant.

System used in setup testing: Windows 7 PRO 64-bit SP1, 1.65GHz Dual-core AMD processor, 4GB memory (3.6GB available).

With these settings in Proactive Security mode, Comodo Firewall passes 100% synthetic tests such as:

1) Anti-test
2) PC Security Test 2011
3) PC Flank Leaktest
4) CLT
5) SSS
6) FireWallTest
7) Mini Security Test

Comodo Firewall 2013 settings

1. Advanced settings -> General settings -> Configuration


2. Advanced Settings -> Security Settings -> Security+ -> HIPS -> Behavioral Analysis

Uncheck "Automatically run unknown application detected in Sandbox and treat it as"


Click to enlarge image

3. Advanced Settings -> Security Settings -> Firewall -> Firewall Settings

We switch the firewall to the "Custom rule set" mode so that any network event in the system prompts you to set your own rules manually.

In the "Advanced settings" field, check all the checkboxes opposite:
- Enable IPv6 traffic filtering
- Enable filtering of loopback traffic (for example, 127.x.x.x, ::1)
- Block fragmented IP traffic
- Analyze protocol
- Enable ARP spoofing protection


Click to enlarge image

4. Advanced Settings -> Security Settings -> Firewall -> Global Rules


Click to enlarge image

5. Advanced Settings -> Security Settings -> File Rating -> File Rating Settings

Trust applications signed by trusted vendors
- Trust apps installed with trusted installers


Click to enlarge image

Comodo Personal Firewall designed to protect users of PCs running Windows. It is extremely easy to use, provides all the necessary features and functions. The most important thing is that it "flies" even on the most low-powered computers. Another important plus, especially for beginners, requires minimal user intervention.

Why use our Firewall?

Comodo Firewall Pro introduces a new evolution in computer security: Trusted Application Blocking Prevention (DDP). What is DDP? Most security programs maintain a list of known malware, and use this list to decide which files and applications should not get access to the PC. The problem here is obvious. What if some entries are missing from the malware list, or not up to date? DDP eliminates this issue to ensure complete security. Firewall links list over two million known PC-friendly applications. If a file that is not found in the Safe List "knocks" on the computer's "door", the Firewall immediately warns of the possibility of a malware attack. All this happens before malware infects the computer. This is a prevention-based security, the only way to maintain complete security.


Firewall Features:
  • Easy to understand informative alerts
  • No complex configuration issues - ideal for novice users
  • Lots of configuration options, let the techies set it up however they like :)
  • DDP security, user-friendly and PC-reliable
  • Fast adaptation of users to personalized protection
  • Convenient, attractive graphical interface

One of the first steps in securing a computer is booting up and activating a quality firewall to repel intrusions. Only this free firewall software has access to Comodo, a huge list of PC-friendly applications, a "default block" component

Comodo Firewall recognizes more than ten thousand different applications (safe, spyware, adware and others), which is a unique feature that only this firewall has.
Key features of Comodo Firewall Pro
tracking program components;
program behavior analyzer;
against protocols;
smart alerts;
integration into Windows Security Center;
protection against critical termination;
protection during computer boot;
automatic update;
error reporting interface;
detailed log;
connection monitor;
database of programs - more than 13,000 programs with their security risks.

Program description can be found

Installing Comodo Personal Firewall Pro.
Download the program on the official website.











Attention! Be sure to uncheck "install and do not check" "install COMODO LivePC ...".






installation completed successfully! Restart your computer.

First start.
When you restart your computer, Comodo Firewall will automatically replace the standard Windows firewall. If after the first launch you don't see any shortcuts on your desktop, just reboot again one more time. The program needs to be "taught" which programs you allow to run and which not. If you are an inexperienced user, then I recommend “not being smart” but allowing everything (of course, reading the recommendations of the program), for example:

Set the training mode. To do this, right-click the firewall icon on the panel (bottom right of the screen) and select “firewall mode” from the menu, and then “training”.

Now the program will remember all your actions, and after training, your actions will no longer be accompanied by opening windows to confirm permission.
You can familiarize yourself with the functions of the program. To do this, double-click on the program icon. Dealing with it is not difficult, but you can not delve into it. Just leave all settings as they are. Once again, the program requires only minimal user intervention.

Leave your comment!

As they say, the flight is normal, only the product is paid and after 30 days it will stop working, it will ask for money. Tell me, is there any free firewall of the same quality.

Hello friends! Today's article is about the popular and free Comodo Firewall.

Security software from the Comodo Group developer company has gained popularity in the software market due to the presence of three important components in software products - the demanded scope, the simplicity and convenience of the interface, as well as free distribution. Separately, it is worth noting the flexibility of the approach of developers. So, a software package for protecting a computer, consisting of an antivirus, a firewall, a Sandbox (Sandbox) and other modules, can be installed both as a whole and selectively by installing only individual modules of either the Comodo AntiVirus antivirus or the Comodo Firewall firewall into the system. It is the latter that will be discussed in more detail below. Consider the features of the Comodo Firewall, how to install this program and how to configure it.

Tasks and features of Comodo Firewall

Firewall Comodo Firewall, despite the fact that the product is free, provides complete protection for your computer against network threats. Moreover, it has repeatedly become the winner of various tests conducted by Internet software resources in order to identify the best software solution of the Firewall class. Comodo Firewall is able to protect against hacker attacks and malware spreading over the network at a level with paid advanced firewalls like Outpost Firewall Pro. To put it simply, you will not find software of the same quality, and even more so free, on the software market..

Comodo Firewall analyzes the suspicious activity of programs on the computer and checks all their active components, blocking the launch of everything that can harm the computer. The program's Stealth Mode makes the computer invisible to port scanning by malware. Comodo Firewall automatically detects the computer's trusted zones, that is, those folders and files that are authorized to be shared on a home or local network.

Unlike its counterpart - which does not coexist in one system with every antivirus, Comodo Firewall is more loyal in this regard. Even if you don't like the specifics or performance of the Comodo AntiVirus module, you can install any other antivirus, since Comodo Firewall usually does not conflict with third-party security software.

Several modes of operation and flexible settings of Comodo Firewall will allow both beginners and more experienced users to configure the desired behavior of the firewall.

Installing Comodo Firewall

Run the downloaded Comodo Firewall installer.

The installation process is somewhat different from the standard one, since it initially involves setting some parameters for the program to work. After choosing the language of the program, we will see the installation wizard window, where you need to select some options. Your E-Mail is optional.

You can leave all the preset options without changing anything only in such cases:

When it comes to a productive computer or laptop and a high-speed Internet connection;

You fundamentally want to participate in the improvement of security software, in particular Comodo products, so that the company improves user protection;

You don't trust your ISP's DNS.

A window will open with options for installing the program, where the developer, hoping that you will hastily install and not delve into the installation settings, has prepared, in addition to the Comodo Firewall, the automatic installation of two more programs - this is a technical support client from the developer Comodo GeekBuddy and a browser with enhanced protection for web surfing Comodo Dragon. It makes no sense to contact the first program for those who do not know English and are not going to pay for technical support from Comodo at the end of the free period. Another program - the Chromium-based Comodo Dragon browser - you can download for free on the Internet and install at any other convenient moment when the question of changing the browser arises.

Now you can safely press the "Forward" button.

In the next window, we are forced to install Yandex elements along the way and the omnipresence of this search engine in the browser. We will refuse this service, since it can hardly be called a missed opportunity in life. Click the installer button below.

The program will install. After launching it, we will see that a computer restart is required. Click the "Fix" button.

Launch Comodo Firewall

The computer will reboot, and we will find a lot of Comodo Firewall windows on the desktop - information about Comodo technologies, a gadget for the program and a firewall preset window, where we need to specify which network the computer is connected to - home, work or public network location, such as a Wi-Fi hotspot.

After that, Comodo Firewall will be minimized to the system tray, from where the program interface can be called at any time.

Any actions performed on the computer for which the firewall has not yet created a rule must be approved, unless, of course, we are talking about unauthorized launch.

You will have to approve the launch of each unknown Comodo Firewall program on the computer until the firewall develops for itself the rules of behavior for each of the launched programs. Of course, at first you have to tinker, but this is actually a small price to pay for the ability to control network connections.

Configuring Comodo Firewall

The Comodo Firewall program is designed for a wide range of users, including beginners, and the computer will be safe even with the settings preset by the developer. But for more experienced users, it will certainly be interesting to use the capabilities of Comodo Firewall to enhance computer protection.

We launch the firewall using its shortcut in the system tray. In the main window that opens before us, we see the status of the program - the computer is protected. We also see the number of network intrusions, the number of blocked intrusions, software updates.

Using the button in the upper left corner, we can switch to the display of a detailed summary by the program. And then back to the summary view again.

In the main window of Comodo Firewall is the option "Game Mode". Game mode is, in fact, a full screen mode, not only in games, but also when watching videos, as well as in any other applications that are displayed in full screen. When switching to this mode, the firewall will not bother us with its notifications and will make all decisions itself.

To open the advanced firewall settings, in the main Comodo Firewall window with a detailed summary, click the Firewall link.

Detailed firewall settings will open, where you can change certain preset parameters.

You can, for example, at the top of the settings window, change the pre-installed “Safe Mode” of the firewall, when network activity of programs that are on the list of trusted ones is allowed, and Comodo Firewall does not pull on every occasion to other modes. For example:

"Complete blocking" - in this mode, any network activity is excluded. This mode is simply an indispensable thing in case a computer is infected with a virus.

“User rule set” - as the name of the mode implies, it provides for strict control and participation of the user in decision-making on each network request for which there are no previously set rules.

"Learning mode" - in this case, Comodo Firewall does not interfere with the activity of running programs, but only monitors events.

Share with friends or save for yourself:

Loading...