Comodo firewall setting rules. Comodo Firewall is the best free Windows firewall. Main components of Comodo Firewall

Firewall Comodo Firewall from version 3.5 it is part of the free comprehensive protection of Comodo Internet Security and can be installed as a separate component.

Comodo Firewall is designed to protect users of PCs running Windows OS; its capabilities are practically not inferior to similar products, including some commercial developments.

The interface is extremely simplified, but at the same time provides all the necessary features and functions.

Main components of Comodo Firewall

Key features of Comodo Firewall

Multifunctional firewall - firewall

Comodo Firewall provides a high level of protection against incoming and outgoing threats. This way, you get the most effective protection against hackers, malware, and identity theft. Now the firewall has been improved by adding new features:

  • Stealth Mode to make your computer completely invisible to port scanning;
  • Automatic detection master-based trusted zones;
  • Predefined firewall policies allow you to quickly apply the necessary security rules;
  • Diagnostics to analyze the system for the presence possible conflicts with a firewall and much more.

Behavior blocker

  • Checking the integrity of each program before allowing it to be loaded into the computer's memory;
  • Performs cloud-based behavior analysis for immediate detection of malware;
  • Warns you every time unknown or untrusted applications try to launch or install;
  • Blocks viruses, Trojans and spyware before they can gain access to your system;
  • Prevents unauthorized change critical system files and records Windows registry;
  • Includes an automatic sandboxing feature that completely isolates untrusted files from the rest of the computer

HIPS Intrusion Prevention System

  • Virtually impenetrable protection against rootkits, process injection, keyloggers and other zero-day threats.
  • Comodo's free firewall monitors the activity of all applications and processes on your computer and allows files and processes to run if they comply with prevailing security rules.
  • Blocks malware activity by stopping any activity that could cause damage operating system, system memory, registry or personal data.
  • Enables advanced users to enhance their security controls by quickly creating custom policies and rule sets using an easy-to-use and powerful rules interface.

Virtual kiosk

  • A virtual sandbox environment for running programs and surfing the Internet, isolated from your real computer. Applications and web browsers run inside the kiosk without leaving cookies or history on the real system, making it a secure environment for online banking and online shopping.
  • Prevents installation of viruses, rootkits and spyware to your computer and provides protection against hacking.
  • Includes virtual keyboard, which allows the user to enter numbers securely credit cards and passwords, without fear of programs for intercepting input data (keyloggers).
  • The virtual kiosk in Comodo Firewall allows power users to run beta software in an isolated environment that won't break stability or file structure real system.

Viruscope

This is a system that allows dynamic behavior analysis running processes and keep a record of their activity. Viruscope monitors the activities of processes running on your computer and alerts you if they try to perform suspicious activities.

Internet Security Essentials

The SSL certificate verification tool protects against fake (phishing) sites that try to steal sensitive information.

Hello, dear readers of the blog site! In this article, I continue the big topic I raised about protecting your computer from various types of threats. In my last article on this topic, I began to talk about protecting your access to the Internet and program control using a special protection component - Firewall, which is part of Kaspersky's extended protection - Kaspersky Internet Security. Firewall is also called differently - “Firewall” or “Firewall”.

And now I will again talk about Firewall protection, but from a different developer and which can be installed separately along with any anti-virus product, without specifically installing comprehensive protection from one manufacturer. The product I want to talk about is called Comodo Firewall. Its most important advantages are that it is free and high quality traffic protection!

In one of the previous articles I already mentioned that Comodo also offers free antivirus(read about it here:) or completely free comprehensive protection: Comodo Internet Security. However, the antivirus itself from this developer is not as reliable as, for example, Kaspersky Anti-Virus or Avast, so I recommend installing only a firewall from Comodo and, separately, a reliable antivirus from another developer. Or use the Kaspersky Internet Security package.

Let's look at the installation and basic settings of the firewall from Comodo.

Comodo Firewall installation process

Installing a separate Comodo Firewall product can be said to be no different at all from installing an antivirus from Comodo, so I will analyze this process more briefly - without commenting on each customizable option.

You can find more detailed comments on installation at the beginning of the article, the link to which is given above.

So let's begin:

Setting up Comodo Firewall

Setting up Comodo's Firewall is simple and almost everything will already be configured optimally by default. All we have to do is check and, if necessary, correct something. Before setting up the Firewall component itself, let's do some steps with the basic Comodo settings:

    Immediately after installing the Firewall, a pop-up window will appear in which you need to select which network you are connected to. Select “I am at home”:

    Now we launch the main window of Comodo Firewall by clicking on the tray icon (the area near the Windows clock) and we will see a large Exclamation point(which reports that some component is not working) and an active “Fix” button. In this case, we only need to reboot, because after installation not all protection components were launched.

    Just click the “Fix” button:

    The computer will reboot and after the system boots, the Firewall components will already be enabled and the warning icon will disappear.

    If you have Windows 7, then on the right side of your desktop there will be a completely unnecessary widget from Comodo :) This is what it looks like:

    Let's remove it. To do this, click right click mouse over the Comodo tray icon, select “Widget”, and then click on the button marked “Show”:

    As a result, the widget will disappear and will no longer be an eyesore or consume system resources :)

    Now again launch the main Comodo Firewall window from the desktop or from the tray and update the databases by clicking the appropriate button (see image below):

    The database update will start and if there are new versions, they will be updated. After this, the window will close automatically after a few seconds.

    Even if you have installed latest version antivirus or firewall from the official website of the developer, I still recommend checking for updates immediately after installing the product.

    Now let's move on to checking the settings of the firewall component. For easy access to all settings, switch to the advanced mode of the main window. To do this, in the upper left corner, click on the small button as in the image below:

    Now the main window of Comodo Firewall will transform a little and we will see large quantity functions. But the main thing is that now we can easily move on to the settings of the firewall itself. To do this, simply click on the “Firewall” link in the upper left corner:

    As a result, we find ourselves in the first Comodo firewall settings window.

    As soon as we go to the settings, the very first menu from the “Firewall” category will open in front of us - “Firewall Settings”.

    These settings are optimal, but I will make some comments.

    The “Enable Firewall” checkbox, of course, is responsible for enabling or disabling protection. Do not uncheck the box under any circumstances, otherwise the installed Comodo Firewall will be of no use to anyone right away, since the firewall itself will simply be turned off :)

    Next to the checkbox to enable/disable the firewall, there is a list where you can select a security mode. I'll tell you briefly about these modes:

    • Complete blocking. By selecting this mode, the firewall will block absolutely all connections, both incoming and outgoing, and from any network. Your computer will be isolated, similar to if you turned off all networks on your computer and unplugged the network cable.

      This mode, in principle, is not needed as such, since the advisability of its use can only be when working in extremely dangerous unprotected networks, in which various viral threats are circulating in droves.

      Custom set of rules. By selecting this mode, the firewall will work and block traffic only based on the rules for programs and networks that we set ourselves. In this case, the firewall will not take into account that the program is trusted and has a digital signature. He will make decisions only based on the rules we set.

      Safe mode. This is the mode I recommend using. When operating in this mode, the firewall itself creates most of the rules for trusted applications that have valid digital signatures. Based on this, he chooses which connections to allow a particular application and which not. When it detects unrecognized and untrusted programs, Comodo will give the user the choice to allow or block the connection, telling them what actions the application was about to perform.

      Training mode. In this mode, the firewall will not show any notifications and will itself create rules for all applications, allowing them network requests. The mode can only be used if you are 100% sure of the reliability of the applications installed on your computer. As a rule, this cannot happen, so I do not recommend using this mode :)

    In the “Application Rules” firewall menu, we can set rules for any applications or see previously created rules.

    All already created rules will be visible immediately if you click on the “Rules for Applications” menu. To add your own rule, right-click on an empty area in the window and select “Add”:

    Now I’ll show you with an example how to block access to the network of any program.

    To do this, in the window that opens, first of all, you need to select the program for which we are creating a rule (as I indicated for the example: block access to the network). Click on the “Browse” button, after which you can select many files at once by selecting “File groups” and checking the appropriate group. You can also select one of the ones running in this moment processes in the system and create a blocking rule for it. But it’s more convenient to select the “Files” item:

    After we select “Files”, Explorer will open, where you need to select the program for which we will create a rule. For example, I will block access to the Internet for a well-known browser - Mozilla Firefox. I look for the folder where Firefox is installed and select the file responsible for launching (firefox.exe). Then I click the “Open” button in Explorer:

    Now we will automatically return to the previous window and see that the path to the program we specified has now appeared in the “Name” field. Check the “Use set of rules” option, then select “Blocked application” from the list of ready-made rules on the right:

    After all the settings in this window are set, click the “OK” button below to save them:

    As a result, we will return to the window with a set of rules for programs and in the list we will see a newly added program (in my example, Firefox) with the “Blocked application” rule. In order to immediately check the result, you need to apply all changes in the rules and click the “OK” button at the bottom again:

    To check my action I run Mozilla browser Firefox and trying, for example, to open our favorite blog site :) As a result, I get the error “Connection attempt failed”:

    And this is exactly what we needed for the example :) Connections for Firefox are blocked. It is clear that Firefox, seriously, of course, does not need to be blocked. This was just an example :) You can and should block programs that do not need Internet access or programs that are untrusted.

    The created rule is even easier to delete. You need to go back to the firewall menu - “Rules for applications” and, right-clicking on the desired rule, select “Remove from list”:

    In our selected “Safe Mode” mode, Comodo Firewall will be very good at selecting rules for applications and we will rarely have to dig around and configure the rules ourselves. In principle, this is where the important firewall settings from Comodo for beginners end. I do not recommend making any settings in the remaining firewall menus, since they are intended for much more experienced users who understand computer networks and having more complete knowledge of working with networks in operating systems.

The settings that I showed are quite enough to protect your computer from attacks by a hacker and block access to the Internet for untrusted applications or those that we choose ourselves.

Surely you noticed that in addition to the “Firewall” section, there are other sections in the settings, for example: “Protection+”, “File rating”, “ General settings». Necessary settings I have already described the sections listed in one of my previous articles - “Another good free antivirus - Comodo”, so, if necessary, you can read about them in that article by clicking on the link above.

And with this, I conclude the last of the articles I am currently planning.

There is still a single article on computer topics ahead of you, for example: backup data, remote control computer and others :) I think that a periodic deviation from the topic of surfing and making money towards technical issues is even useful. Thus, on the same favorite blog, in addition to continuous information about earnings, we also study our computer and everything connected with it :)

See you soon! Good luck to you;)

We thank him and provide instructions on how to configure the Comodo firewall for maximum protection.

Introduction

Regarding these settings, I would like to note that, despite their “maximum” nature, working on a computer does not make you especially paranoid - everything is quite moderate: once you create rules for a program/application, requests no longer come for configured programs. It is clear that this mode is more suitable for experienced users.

The second point is that testing was carried out in tandem with avast! Free Antivirus, and without it. The result, as noted, was 100% in both cases (despite the fact that the screenshots have avast! antivirus, and without it the Comodo firewall passed all tests 100% on these settings).

Moreover, with avast enabled! and using these settings for Comodo Firewall - the antivirus simply does not have time to start working, since all the blocking is performed by Comodo Firewall.

In addition, in the PC Security Test 2011, Comodo Firewall blocked the first stage of the Antivirus Protection Test, preventing the possibility of placing virus files on the system, although this is essentially the work of an antivirus (for example, in combination with Online Armor + avast! this work After passing the first part of this test, Avast!) performs it.

As a result, Comodo Firewall, so to speak, prevents the antivirus from working, since it simply blocks the possibility of viruses entering the system. Those. It can be noted that Comodo Firewall’s response to threats is very fast (although it is clear that it is synthetic). However, I have not yet had a single product from many vendors (such as Kaspersky Internet Security, Norton Internet Security, Emsisoft Internet Security, McAfee Internet Security, Bitdefender Internet Security, avast! Internet Security, etc.). I think that even though it is synthetic, it is still very significant.

System used in testing settings: Windows 7 PRO 64-bit SP1, 1.65 GHz Dual-core AMD processor, 4GB memory (3.6 GB available).

With these settings in Proactive Security mode, Comodo Firewall passes the following synthetic tests with 100% results:

1) Anti-Test
2) PC Security Test 2011
3) PCFlank Leaktest
4) CLT
5) SSS
6) FireWallTest
7) Mini Security Test

Comodo Firewall 2013 Settings

1. Advanced settings -> General settings -> Configuration


2. Advanced settings -> Security settings -> Protection+ -> HIPS -> Behavioral analysis

Uncheck "Automatically launch detected unknown applications in Sandbox and process them as"


Click to enlarge image

3. Advanced settings -> Security settings -> Firewall -> Firewall settings

We switch the firewall to the “Custom Rule Set” mode so that any network event in the system prompts you to set your own rules manually.

In the "Advanced settings" field, check all the boxes opposite:
- Enable IPv6 traffic filtering
- Enable loopback traffic filtering (for example, 127.x.x.x, ::1)
- Block fragmented IP traffic
- Analyze the protocol
- Enable ARP spoofing protection


Click to enlarge image

4. Advanced settings -> Security settings -> Firewall -> Global rules


Click to enlarge image

5. Advanced settings -> Security settings -> File rating -> File rating settings

Trust applications signed by trusted providers
- Trust applications installed using trusted installers


Click to enlarge image

2492 23.12.2009

Tweet

Plus

Let's start getting acquainted with Comodo Firewall by installing it.

On startup installation file A warning window appears about the need to remove other programs of a similar purpose in order to avoid conflict situations

If you already have any firewall installed, remove it; if not, then feel free to continue.
Now click on the “YES” button in the warning window. Further installation is standard for most Windows programs. You just need to click “Next”. At the end, the program will offer configuration options: automatic or custom

Leave it on automatic. To complete the installation, all you have to do is restart your computer.

After the reboot, you will immediately be asked questions about the activity of programs that can use the network.

Here you need to understand which program you allow or prohibit activity. When you click the “Allow” or “Deny” button, the firewall will allow or not allow the program to access the Internet once. If the program tries to access the Internet again, the window about its activity will be displayed again. If you are confident in the program that is trying to access the Internet, you can check the “Remember my answer for this application” checkbox and click “Allow”. Comodo Firewall will now understand that you trust this application and allow it to run without interference. In the same way, a ban is set for the program: check the box “Remember my answer for this application” and click “Ban”. Comodo will always block this program.

During testing, the first questions were asked regarding alg.exe and svchost.exe.

This system programs and they need to be allowed access. Questions about user programs will be asked as they are launched. If the program is intended to work on the Internet or via the Internet, then it must be allowed. If it is clear that the program is overly zealous in caring about the user and wants to download something from the Internet or transmit it via the Internet, then its access should be denied. Thus, you, interested in your safe stay on the global network, after some time will create rules of conduct for all programs installed on the computer.

Having made an erroneous ban or allowed the program to be active, you can always use the Comodo Firewall settings and correct the situation. Looking at the lower right corner of the screen, where the clock is located, you will see an icon with a shield. This is Comodo. Right-click on the icon and select Open. The main program window will open immediately

The main window clearly shows the basic parameters of the firewall.
At the top of the window you can choose between the “Summary”, “Protection”, “Activity” panels.

On the left are icons for switching between the windows of this panel:

Tasks– In this window, you can quickly allow or deny program access to the network, as well as select other options, the capabilities of which are well described under the name of each option. It is better not to touch anything unless necessary.

Application Monitor– designed to view and edit the list of applications that the user trusts. The window is presented in the form of a table, which indicates:

  • program name (Application),
  • IP address to which the connection is made (Recipient),
  • port number on which communication takes place (Port),
  • protocol within which information is received and transmitted (Protocol),
  • Well, and the column (Permission), which shows whether access to the application is allowed or denied.

pay attention to quick options actions:

  • Enable/disable – you can temporarily disable some of the rules, for example, for testing purposes.
  • Add – A fully customizable option to create a new rule.
  • Edit – Edit the rule on which the cursor is positioned.
  • Delete – permanently removes the rule from the list.

By double-clicking the left mouse button on the program name or clicking “Edit”, you will be taken to the window for fine-tuning (editing) the rule

This window indicates the full path to the program on disk, the path to the program that is the parent of the one being configured. Nothing needs to be changed here.

And by looking at the tabs below you can:
- assign a program action to the application activity, indicate the protocol and direction of the program activity (whether the program receives information (Incoming), sends (Outgoing) or both receives and sends),
- specify one or more IP addresses with which the application interacts. One or more ports that an application opens when communicating.

Component Monitor– designed to monitor the integrity of important files – sometimes viruses try to change files and Comodo can prevent this.

Network Monitor- Attention! The order of the rules is important here! Comodo Firewall scans rules from top to bottom. On this tab you can fine tuning firewall filtering parameters for data transmission by IP addresses and ports. Here you can forcefully close potentially dangerous ports. Here's how to do it:
Click the “Add” button and in the window that appears

select the “block” action and specify “one port” on the “Source Port” tab, and also enter the port number, for example, 137. Click the “OK” button. The new rule will appear in the list.
Use the “Up” or “Down” arrows to specify the location of the rule in the list. To avoid mistakes, for now you can simply place the rule in the middle.

On the bookmark "Additionally" In the “Protection” window, you can further configure the firewall. These features need to be mastered gradually; as you work with the program, you will understand when there is a need for additional settings.

Going to the panel "Activity" we will see two tabs: “Connections” and “Log”
IN "Connections" a list of programs that are currently active is displayed. Here you can see if there is anything suspicious among the programs you trust. As well as the amount of data transmitted/received.

IN "Journal" A chronological record of important events is maintained. You can always refer to it when analyzing the actions of one of the programs.

And of course, don’t forget to update the program components. By clicking the “Update” button at the very top, you will launch the wizard for downloading new components. This simple procedure will prevent new ones from appearing. malware implement destructive actions on your computer. By default, the settings are set to automatically check for updates.

Easy to use and configure, the Comodo firewall program will protect your Internet browsing and help you learn to understand the processes that occur during the exchange of information over the network.

Tweet

Plus

Please enable JavaScript to view the

Getting to the settings is quite problematic, since there is no button of the same name. However, on the menu Tasks did you see the button Advanced settings(Sandbox Tasks and Advanced Tasks), by clicking which you can get to the parameters window (Fig. 4.99).

Rice. 4.99. Advanced settings

The window is divided into two parts: on the left are settings categories, on the right are changeable parameters. There are only two categories: General settings And Security Settings(Fig. 4.100).


Rice. 4.100. General settings

There are four subcategories in General Settings.

Interface. In this subcategory you can change the program language, as well as configure visual and sound parameters. To do this, check the boxes next to the appropriate parameters. The more of them are enabled, the more often the program reminds you of its presence on the computer. Separately, it should be noted that you can block access to program settings using a password. To do this, check the Protect settings with a password checkbox, click on the Set password link and enter your password in the window that appears.

Updates. We are talking about updating both the anti-virus databases and the program itself. This is where you can configure the frequency of checking for updates (Fig. 4.101).

Journaling. You can disable logging or, conversely, enable it.

Configuration. The subcategory is responsible for protection priorities. By default, COMODO - Internet Security is selected, which is sensitive to threats from the Internet. If you spend a lot of time on the Internet, then don't change anything. COMODO - Proactive Security focuses on protecting from within. Select it if there were a large number of viruses on your computer. COMODO - Firewall Security provides only network protection (firewall). To change the configuration, double-click on the required item (Fig. 4.102).



Rice. 4.101. Setting Up Updates



Rice. 4.101. Setting Configuration

The default security settings are set to very high level(Fig. 4.103). The only thing you can do is lower the protection and exclude individual files from scanning. These settings are unlikely to be useful to the average user, so we will not dwell on them in detail.



Rice. 4.103. Security Settings

CHECKING YOUR COMPUTER

You can start scanning in the main window using the button Scan. You can also use the button Tasks (General Tasks Scan). In the window that opens, select the scan type (Fig. 4.104):

Quick scan - checks areas of the computer that are susceptible to infection;

Full scan - scans all files on the computer;

Custom Scan - scan individual files or folders ( Custom Scan Scan Folder or Scan file)(Fig. 4.106).

rice. 4.104. Scan profiles



Rice. 4.106. Custom Scan

In addition, you have the opportunity to create your own profile. To do this in the menu Custom Scan click the button Other options, in the window that opens, click the button Add(Fig. 4.107).



Rice. 4.107. Creating a Scan Profile

In the next window (Fig. 4.108), give the profile a name and add scan objects: individual files and entire areas (tab Objects). On the tab Options select the thoroughness of the check. The more checkboxes you check, the more thorough the check will be. In the tab Schedule set the time and frequency of this type of scanning. Click OK.



Rice. 4.108. Setting up a scan profile

Now in the window Scanning(see Fig. 4.104) the created object scanning profile will appear. Check the box to activate it, and the antivirus will begin scanning at the scheduled time.

To summarize, it should be noted that COMODO Antivirus is highly effective. He copes well with the task assigned to him. The disadvantages include a not very clear interface.

review, we examined in detail and with “pictures” the process of installing the freeComodo Firewallon computer. Now, as promised, I will tell you howoptimal firewall, with a minimum of pop-up notifications, quickly and independently configured. The author's version of the program's advanced settings largely coincides withrecommended in the Russian part InternationalCOMODO Forums(branch " CIS/CFP for firewall newbies"). These forums can be visited by clicking on the " tabMiscellaneous" paragraph " Visit the support forum "The only thing is that you will be taken to the main English page, so in order not to search, here is a direct link to the forum" In Russian / Russian "(clickable!). Useful information There is a lot on the topic - those who wish, of course, can “dig into it.” And I, as usual, for convenience the points I'll start what I promised.

Comodo Firewall Advanced Settings

1. At the beginning, I suggest changing the default (default) grey-cheerful “face” Comodo Firewall for something more interesting. To do this, in the same “Miscellaneous” tab, click “ Settings" → "Appearance " → in "Theme" we change the "gray" theme "COMODO Default Normal" to, for example, "COMODO Blue Norma" (first screenshot) and, "dressed up", move on.

2. The first of the program's advanced settings will be to enable the "invisibility" mode of your computer on the network. To do this, in the tab " Firewall"click applet" Hidden Port Wizard "→ select" Block all incoming connections and hide my ports for all incoming connections "(screenshot above) and confirm your choice via " OK ".

3. Further, in the same tab " Firewall"let's go to" Firewall settings " and on the "General settings" tab we activate " ". Now allowing rules will be automatically created for all applications from the list of trusted ones, which will save you from unnecessary permissions manually. In addition, check the checkbox next to the item "Automatically discover new private networks " (which can be removed after detecting your network) and, most importantly, " Firewall mode "we leave unchanged" Safe ".

Confirm all changes in settings with the " OK".

4. Let's move on to the mode settings" Proactive Defense". To do this, in the tab " Protection+"click" Proactive Defense Settings " and, by analogy with the previous settings item, activate " Create rules for secure applications ". If you are confident that the system is clean from viruses and have an effective anti-virus scanner (the need for which I wrote in the note " ") like free, then feel free to install " Clean PC mode " – again, to get rid of “annoying” alerts. Also check that there is no checkbox next to " Enable enhanced protection mode " and presence - opposite the point " A adapt the operating mode at low system resources " (no comments).

5. In the same settings of Proactive Firewall Protection in the " tab Application execution control settings " check that unrecognized files are treated as " Partially limited " (default) or " Suspicious " – under other settings, some applications will refuse to launch.

6. For users of older versions Comodo Firewall

And don't forget to confirm changes in settings with the " OK ".

Note: With Proactive Defense completely deactivated this option("Sandbox") is automatically disabled.

7. The final tweak from the "optional" category: in the " tab Miscellaneous " → "Settings"→ on tab" Are common"Uncheck the box next to the item" Automatically check for program updates" (penultimate screenshot), especially since the option " Check for updates "Always at hand" (last screenshot).

Another click on the " OK" and you can close the appropriately configured Comodo Firewall- after reboot Windows, with this configuration, “comfortable” for the user, the program reliably protects the computer from network threats.

As a result of unsuccessful attempts to force the database to be updated, I decided to simply install Comodo again, but with a younger version, in order to test it. Comodo Internet Security is a complete protection that includes an antivirus, firewall and proprietary features such as Hips and more.

Before Comodo, I tried various antiviruses. This includes Doctor Web, Kaspersky, AVG, Nod32, Avast, Panda, MalwareAntimalware and even the Chinese Rising, which works surprisingly well.

Most of all I like Kaspersky, which served me faithfully for several years, but the time has come to find something to replace it and, as a result of a long search, I chose the free Comodo. Now he has been protecting the computer for several years.

Comodo, and everyone admits it, has an awesome firewall. In fact, it alone solves the problem of online security. The antivirus is also excellent, but I prefer not to use it, although it works normally. Instead of an antivirus, I download a scanner from DrWeb called CureIt and check my computer every few months.

Comodo has a huge amount of customization and gives the impression of a very professional (and it is) product. Overall, I like Comodo and am happy with it. It just needs to be configured correctly. I can easily understand any program, so it wasn’t difficult for me to understand Comodo’s settings.

I specially made several screenshots of Comodo for this article, for which I had to go into WinXP, where I have the latest version of Comodo installed, which I haven’t visited for probably six months.

I won’t talk about all the Comodo settings. You can decide for yourself whether to leave any updates, messages, or notifications or not. I will tell you only about the most basic settings, as well as some tricks in these settings.

What to do if your browser is infected? Read about it.

This Comodo differs from the 5th version in its improved and beautiful interface.

In my opinion, despite its beauty, the 5th version is still more convenient. There, all the settings are better grouped and informative.

For example, in the new version of Comodo it is not clear when the anti-virus database was updated; no date. In version 5 this is indicated by the update date.

The settings for anti-virus scanning profiles and exclusions are hidden in such a way that they can only be found if you have a good understanding of the structure of the Comodo interface in previous versions.

More on this below. Although, let's start right there.

As for the antivirus, you can leave the setting to scan the computer's memory at startup. The default option is to scan archives. I always remove it, because there are often tablets in the archives, and the antivirus mercilessly removes them.

As for cumulative scanning, this mode will scan those files that have changed since the previous scan. You can select "Scan on Access". It's up to you to decide. I always choose cumulative scanning.

The American developers, in my opinion, were clever with the list of scans. The fact is that if you do not know how to set up an antivirus, an antivirus scan will occur every time you start your computer. Not everyone needs this and not always. And to disable this automatic scanning, you need to know where to do it. The Comodo developers made this non-obvious for some reason. In general, to set it up as we need, we go to the “List of scans” and there we see the default list, and at the bottom there is a barely noticeable arrow.



This is what we need. We drag it up, the “Add”, “Edit”, etc. windows appear, where we can already do something. We cannot delete default scan list profiles, but we can change them or add our own. In the “Graph” line, set the desired position so that scanning does not start automatically when the system starts. If we need a scan, we can always launch it manually from the main antivirus window by clicking on the “Scan” button.

However, profiles can be configured so that scanning is activated once a week, for example, at night or during the day. The idea itself with a schedule for “Full” or “Quick” scans is good, but it should have been done more clearly, and not hidden far into the depths of the program from the user.

The situation is similar with “Exceptions”. The developers also managed to hide the setting of this extremely important item behind this arrow, which is visible at the bottom of the main window when you go along the path “Antivirus ---> Exceptions”.

We drag this arrow up and a window with actions will pop up, thanks to which we can already fully work with exceptions.

We add to the "Exceptions" all those files and folders that, in our opinion, should be ignored by Comodo.

A few words about the Proactive Protection Mode. This is a proprietary feature of Comodo, which they consider almost the main one in protecting your computer. The version we are reviewing has a HIPS setting (Host-based Intrusion Prevention System or simply “intrusion prevention system”). The settings are below on the screen. You can select "Safe Mode". In it, all unknown actions on the computer will be under control. If you know/are sure that there are no viruses on your computer and it is clean, then you can set the “Clean PC” mode. In this mode, all files are recognized as trusted, and we receive fewer alerts from Comodo. I set the settings to "Clean PC".

It is not necessary to use HIPS; you can disable it. But if you use it, then I recommend that you check the box next to “Create rules for secure applications”, specifically highlighted in green. This will make it easier for you to continue interacting with Comodo. It will create rules and once you confirm them, you will not receive messages from Komodo for the same reason.

Well, setting up a firewall, or simply a firewall. Comodo's firewall is one of the best on the market. This is recognized by all specialists and ordinary users. Some people specifically download only the Comodo firewall to use it with a third-party antivirus. There is nothing complicated about the settings.

Just like in the screenshot above, be sure to check the box to create rules so as not to receive constant messages from Comodo. The rest is up to you. I set it to "Safe Mode". Even with the default settings, the firewall does its job perfectly.

If you want to make your computer invisible on the network, you can use the Hidden Ports Wizard to enable the mode of blocking all incoming connections and hiding your ports for all incoming connections. But if you use home network, which most often happens, it is better to activate the notification mode about incoming connections and make a separate decision for each port. For the particularly advanced: in the advanced firewall settings, you can check the boxes everywhere except for NDIS monitoring, other than TCP/IP.

A little about Sandbox mode. This cool thing, if enabled, isolates all unknown files and runs them in itself (sandbox). In this mode, files, if they are dangerous, will not harm the system. Not every paid antivirus has a sandbox. The free Comodo has it. So, take advantage.

You should know that the Sandbox and Protection Plus (Proactive) modes are not required to be activated. Without them, just with an antivirus and a firewall, you can normally secure your system. But the above modes make the protection even more reliable and powerful.

And I would also like to say something about configurations. There are three of them by default. These are: Internet Security, Proactive Security and Firewall Security. For many, these things are incomprehensible, but there is nothing complicated here. These are, in essence, a kind of presets, ready-made presets. Firewall Security gives priority to protection on the network, the activity of the antivirus seems to be reduced: it seems to be working, but it doesn’t seem to be. In general, it is almost invisible and inaudible in this mode. In other modes it’s the same: In Proactive, priority is given to proactive protection; in Internet Security, priority is given to antivirus and network protection. I usually set it to Internet Security. In any mode, if anything, you can tweak the settings to achieve the desired functionality.

As they say, the flight is normal, only the product is paid and after 30 days it will stop working and ask for money. Tell me, is there any free firewall of the same quality?

Hello friends! Today's article is about the popular and free firewall Comodo Firewall.

Security software from the developer company Comodo Group has gained popularity in the software market due to the presence of three important components in software products - a popular field of application, simplicity and convenience of the interface, and free distribution. It is worth noting the flexibility of the developers’ approach. Thus, a software package for protecting a computer, consisting of an antivirus, a firewall, a Sandbox and other modules, can be installed either entirely or selectively by installing only individual modules of either the Comodo AntiVirus antivirus or the Comodo Firewall into the system. It is the latter that will be discussed in more detail below. Let's look at the features of the Comodo Firewall, how to install this program and how to configure it.

Tasks and features of Comodo Firewall

Comodo Firewall, despite the fact that the product is free, provides complete protection of your computer from online threats. Moreover, he has more than once become the winner of various tests conducted by Internet software resources in order to identify the best software solution class "Firewall". Comodo Firewall is able to protect against attacks from hackers and malware spreading over the network at the same level as paid advanced firewalls such as Outpost Firewall Pro. To put it simply, you won’t find software of the same quality and especially free on the market..

Comodo Firewall analyzes suspicious program activity on your computer and checks all of its active components, blocking the launch of anything that could harm your computer. The program's Stealth Mode makes your computer invisible to port scanning by malware. Comodo Firewall automatically detects the trusted zones of your computer, that is, those folders and files that are authorized to be opened by public access over your home or local network.

Unlike its counterpart, which does not work well with every antivirus on the same system, Comodo Firewall is more loyal in this regard. Even if you do not like the specificity or effectiveness of the Comodo AntiVirus antivirus module, you can install any other antivirus, since Comodo Firewall, as a rule, does not conflict with third-party security software.

Several operating modes and flexible settings of Comodo Firewall will allow both beginners and more experienced users to configure the desired behavior of the firewall.

Installing Comodo Firewall

Run the downloaded Comodo Firewall installer.

The installation process is somewhat different from the standard one, since it initially involves setting some parameters for the program. After selecting the program language, we will see the installation wizard window, where you need to select some options. It is not necessary to indicate your email.

You can leave all the preset options without changing anything only in the following cases:

When it comes to a powerful computer or laptop and a high-speed Internet connection;

You fundamentally want to participate in the improvement of security software, in particular Comodo products, so that the company improves user protection;

You don't trust your ISP's DNS.

A window will open with options for installing the program, where the developer, hoping that you will quickly complete the installation and not delve into the installation settings, has prepared, in addition to the Comodo Firewall, the automatic installation of two more programs - this is the client technical support from the developer Comodo GeekBuddy and a browser with enhanced protection for web surfing Comodo Dragon. There is no point in contacting the first program for those who do not know in English and is not going to pay for technical support from Comodo at the end of the free period. You can download another program - the Comodo Dragon browser based on Chromium - for free on the Internet and install it at any other convenient time when the question arises about changing the browser.

Now you can safely press the “Forward” button.

In the next window, we are forced to install Yandex elements along the way and the omnipresence of this search engine in the browser. Let's refuse this service, since it can hardly be called a missed opportunity in life. Click the start installation button below.

The program will install. After launching it, we will see that the computer needs to be restarted. Click the “Fix” button.

Launching Comodo Firewall

The computer will reboot and we will find a lot of Comodo Firewall windows on the desktop - information about Comodo technologies, a program gadget and a window presets firewall, where we need to indicate which network the computer is connected to - home, work, or a network in a public place, for example, with a Wi-Fi access point.

After this, Comodo Firewall will minimize to the system tray, from where the program interface can be called up at any time.

For any actions performed on the computer for which the firewall has not yet created a rule, you need to give it approval, unless, of course, we are talking about an unauthorized launch.

You will have to approve the launch of every program unknown to Comodo Firewall on your computer until the firewall develops rules of conduct for each of the programs launched. Of course, at first you will have to tinker, but this is actually a small price to pay for the ability to control network connections.

Setting up Comodo Firewall

Comodo Firewall is designed for a wide range of users, including beginners, and the computer will be safe even with the settings preset by the developer. But more experienced users will certainly be interested in using the capabilities of Comodo Firewall for enhanced computer protection.

We launch the firewall using its shortcut in the system tray. In the main window that opens in front of us, we see the program status - the computer is protected. We also see the number of network intrusions, the number of blocked intrusions, and software updates.

Using the button in the upper left corner, we can switch to the program displaying a detailed summary. And then return to the summary view again.

In the main window of Comodo Firewall there is a "Game Mode" option. Game mode is essentially full screen mode not only in games, but also when watching videos, as well as in any other applications that are displayed in full screen. When we switch to this mode, the firewall will not bother us with its notifications and will make all decisions itself.

To open advanced firewall settings, in the main Comodo Firewall window with a detailed summary, click the “Firewall” link.

Will open detailed settings firewall, where you can change certain preset parameters.

You can, for example, at the top of the settings window, change the preset “Safe Mode” of the firewall, when the network activity of programs in the list of trusted ones is allowed, and Comodo Firewall does not jerk on every occasion, to other modes. For example:

“Full blocking” - in this mode, any network activity is excluded. This mode is simply irreplaceable if your computer is infected with a virus.

“Custom set of rules” - as the name of the mode implies, it provides for strict control and user participation in decision making for each network request, for which there are no previously defined rules.

“Learning mode” - in this case, Comodo Firewall does not interfere with the activity of running programs, but only monitors events.

Comodo Internet Security (CIS)- this is an antivirus + firewall. Comodo Internet Security also has a SandBox (sandbox), in which you can run applications so that they do not affect the system (in an isolated environment). It is possible to filter all traffic through DNS servers Comodo minimizes the threat of viruses and malicious sites. There is a virtual desktop, in the virtual desktop you can safely run programs and surf the Internet, it also protects against keyloggers(keyloggers). You can use tablet mode and Windows desktop mode.

There is also an intrusion prevention system called HIPS (Host-based Intrusion Prevention System), which analyzes the behavior of programs.

Comodo Internet Security (CIS) is the best free antivirus and firewall.

Download Comodo Internet Security available on the official website comodorus.ru/free_versions/detal/comodo_free/8.

During installation, the program can also be installed:

- Comodo Dragon(Internet browser increased security from Comodo). I did it earlier.
- Comodo Antivirus(antivirus)
- Comodo Firewall(firewall)
- Comodo Geekbuddy This is a shareware service (limited 60 days). It works on the principle of 24/7 technical support. Communication takes place using the Internet messenger built into the program)

You can choose what to install and what not to install during the installation process of the program package.

So let's start installing Comodo Internet Security. We launch the installer and the files for installation begin unpacking.

If User Account Control comes up with a question: should I allow the following program to make changes on this computer? Click yes.

Select the installation language for Comodo Internet Security Premium and click OK.

You can enter your address Email(not necessary).

You can check the box " I want to provide additional security on the Internet by switching to COMODO Secure DNS service, minimizing the threat of viruses and malicious sites so that all requests are filtered and processed on Comodo servers and malicious sites are blocked and other threats do not reach you.”

You can check the box “I want to use Cloud Application Behavior Analysis, transferring unidentified programs to COMODO, subject to the terms of the Privacy Policy.”

You can check the box “Anonymously send application usage data (configuration information, crashes, errors, etc.) to COMODO to make changes that improve the operation of the program.”

Push forward.

Uncheck the following items:

Install Yandex elements
- make Yandex the home page (applies to all supported browsers)
- make Yandex search engine default (applies to all supported browsers)

Click agree. install.

The installation of Comodo Internet Security Premium begins. The Comodo Dragon browser is installed first.

The installation of Comodo Internet Security Premium then begins.

After installing Comodo Internet Security Premium on your desktop Windows desktop the Comodo Internet Security Premium widget appears, which shows system security, Internet speed, and quick start Internet browsers.

When you first launch Comodo Internet Security Premium, it scans your computer for threats.

You can stop it or continue scanning in background(this will take longer to scan, but will use fewer resources and load less on your computer). This is called a hidden task - a task that requires fewer resources to complete than an active task.

This is what the main window of Comodo Internet Security Premium looks like.

This window will also pop up with a short story about the programs Viruscope, content filter, GeekBuddy. Check the box at the bottom left to not show this window again and close it.

Network detected. Please indicate your location:

I am at home. Select if you have connected your computer to your home local network
- I am at work. Select if you have connected your computer to an office LAN
- I'm in a public place. Select if you are in a public place, such as a cafe, hotel, school, etc.

I chose I am in a public place.

By clicking on the tasks at the top right, we will switch to tasks.

You can switch back by clicking on the main window.

In Tasks, you can enter Firewall Tasks and select advanced settings to configure various aspects of the firewall.

Firewall settings. You can enable or disable the firewall and select its operating mode. Do not show alerts, automatically detect private networks, show alerts, trustconnect, show animation on the CIS icon in the notification area, create rules for secure applications, configure alert frequency level, display alert time on screen, enable IPv6 traffic filtering, block fragmented IP traffic, analyze the protocol.

Global rules.

On this computer The following global rules are active:

Allow IP Outgoing from MAC Any to MAC Any
- allow ICMPv4 Incoming from MAC Any to MAC Any
- block IP Incoming from MAC Any to MAC Any

You can add a new firewall rule.

Sets of rules.

Here you can configure which sets of rules are used on this computer.

Content filter.

This option configures the firewall to filter access to sites in accordance with the rules and profiles specified below.

Antivirus monitoring.

Perform real-time scanning (recommended).
Continuous anti-virus monitoring is carried out in parallel with the execution of user tasks.

Form a cache if the computer is in standby mode, scan the memory when the computer starts, do not show alerts, unzip and scan files: .jar, .exe, configure the level of heuristic analysis, search for potentially unwanted applications.

Interface.

You can change the interface to Classic Theme, Tile Theme, Modern Theme. Also show notifications from the COMODO message center, show informational messages, show a greeting on startup, show a widget on the desktop, show informational messages when task windows are minimized or tasks are running in the background, accompany notifications with a sound signal, protect settings with a password.

Updates.

Check for program updates.

Automatically download program updates. If the option is enabled, program updates will be downloaded automatically. When to install them is up to you to decide. Check for anti-virus database updates every 6 hours.

Do not check for updates if these connections are used.

Do not check for updates when running on battery power.

Proxy server settings.

Configuration.

In this section you can import and export configurations, as well as change the current configuration.

Types of scanning.

On this page you can add, delete or edit scan profiles and schedules.

Protected objects.

Objects protected on this computer.

Here you can add a folder or file that needs to be protected from changes that are not made by you, as well as from intrusions by other programs.

Use cloud verification (recommended) so that the file is checked against the database in the cloud. Perform cloud-based analysis of unknown files, allowing you to get quick results and save computer resources. Trust applications signed by trusted providers. Trust applications installed using trusted installers.

The Comodo Internet Security widget on the desktop can be disabled, or a brief summary can be provided, and links to browsers and social networks can also be included. networks and for the widget to show your Internet traffic.

In Comodo Internet Security Premium, you can enable a virtual desktop to surf the Internet safely, for example, without fear that someone will steal your password, or run a virus to test its effect without harming the system, or run an application that will not affect your system in any way. system, but only operate within the virtual desktop.

To use the virtual desktop you need to download and install Microsoft Silverlight. Click yes to begin the download and installation.

Click agree. Install.

Microsoft Silverlight 5.1 is loading.

The virtual desktop is loading.

You can return to Windows again.

You can go to settings...

and change the virtual desktop mode from a tablet PC to a regular PC.

You can use it freely virtual machine Comodo.

Launching in Sanbox is needed in order to isolate the application from the system.

You can clean your computer of viruses and threats with Comodo Cleaning Essentials.

With Comodo Cleaning Essentials you can start scanning and detect and remove viruses, rootkits, hidden files and malicious elements in the system registry.

Checking the MBR (Windows boot area).

A reboot is required to complete the scan.

You can view activity and monitor ongoing processes using Comodo Killswitch.

Allow User Account Control to take action by clicking Yes.

Click agree. Install to download and install Comodo Killswitch.

Comodo Killswitch is loading.

Comodo Killswitch application initialization.

In Comodo Killswitch you can see the activity of all processes in the system and stop them if they seem suspicious and unnecessary to you, and also find an application that is eating up a lot of system resources. You can also see how busy the CPU is and see which application is consuming Internet traffic.

How to find something forbidden in tor