Comodo firewall does not work in windows vista. Comodo Firewall is the best free Windows firewall. What to do immediately after installation

Good day, dear readers.

It has long been no secret that any modern person cannot do without a computer and the Internet. The World Wide Web has become an integral part of the lives of most of us. It is a storehouse of information, a way (or means) of communication, and much more. The computer is the tool with which we gain access to world wide web. Therefore, everyone has a natural desire to protect their iron friend from the dangers that it conceals behind itself.

One of these tools is Comodo Firewall - a program that will help us protect our computer from various computer infections, of which there are many on the Internet.

Questions in the style of “what is a firewall and why is it needed” have already been discussed earlier on the site in articles: Protecting yourself from hackers, worms and other riffraff, How to protect ports and your computer from hacking. Part 1., “Outpost Firewall, – installation, configuration, description” or “Internet protection and network security” and others.

This article will be entirely devoted to a separate product – Comodo Firewall. This program is free, and many rightfully consider it number one among similar products. At the same time, the product in question copes with its tasks no worse than most paid analogues from other manufacturers software. It is also important that there is an excellent Russian-language version of this firewall.

Installation and initial setup.

Installing Comodo Firewall is not fraught with any particular difficulties, but it still has some nuances.

After downloading, run the previously downloaded file (if you downloaded it from the link provided above, it should be called cfw_installer.exe). Next, you will be asked to select the installation language, naturally leave “Russian – By COMODO” and click “OK”, after which we will see the following:


Item "Enter your address Email” we skip. Next, feel free to uncheck the “Change” box. DNS settings servers on COMODO SecureDNS” (you can read about why here). Next, we also uncheck the box “I want to use Cloud Application Analysis, transferring unidentified programs to COMODO in compliance with the Privacy Policy.” Now look at the very bottom of the dialog box and click on “Installation options” (see screenshot above)


First of all, we are interested in the “Installation Options” tab. As you can see, by default we are offered to install two products, the Comodo Firewall itself, as well as the Comodo GeekBuddy service. The latter is a conditional free service, which offers implementation within 60 days technical support users. The idea is that you can ask for help or just advice from Comodo employees at any time directly from the program itself. But this is only relevant for those who know well English language, since Russian-language support is not provided. And why do we need it, because we want to figure it out ourselves, using this article (), and if any questions or difficulties arise, you can always go to such an interesting FS forum [free computer help] (who would have thought). Therefore, we feel free to uncheck the box next to “Install Comodo GeekBuddy” - it is unlikely that you will ever use it in practice, and besides, there is absolutely no need for this service to lie, as they say, as a dead weight in our operating system.

We leave the remaining settings unchanged and click the “Back” button, which will return us to the already familiar window, in which we click “Agree, Install”. We wait until the installer completes all necessary operations, and click “Yes” to the offer to reboot our operating system.

After the reboot, we will see a welcome window in which we need to check the box “Do not show this window again.”


And we calmly close it so that it does not bother us in the future.

Almost simultaneously with the welcome window, we will see another window. Smart program will detect your network and prompt you to give it a name and carry out preliminary configuration.


For example, if you have a laptop that you use both at work and at home, then you can name the networks “Work” and “” home network”, or somehow at your discretion. If you need to be able public access to folders and (or) printing on network printer, then check the box “Make the computer fully accessible to other computers on this network.” If there is no such need, then it is better to leave this option disabled, as this significantly increases the level of security for your computer. Next, simply confirm your choice by clicking button “Yes”, and this completes the installation.

Advanced configuration of Comodo Firewall. We bring the defense to mind.

So, the program is already installed on your computer and, in principle, can work with the default settings specified by the manufacturer. But to increase your comfort, you need to fine-tune the firewall a little more. To do this, let's get acquainted with the main features of the program. What kind of beast is this Comodo Firewall? We can say that it consists of two main modules: the firewall itself (the “Firewall” tab) and the proactive protection module (the “Protection+” tab). Basic information on the operation of these modules can be viewed in the "Summary" tab.


Basically, from here you can quickly access some basic settings and statistics: see how many incoming and outgoing connections you have and intrusion statistics; assess which applications exhibit the most network activity; change the operating modes of the firewall and the "Protection+" module and even stop all connections. There is no need to be alarmed if the number of connections is very large: for example, if you have any torrent client enabled with big amount distributions, the total number of connections can reach several hundreds and even thousands.

It is worthwhile to dwell specifically on the operating modes of the firewall modules and the proactive protection module. By default, the operating mode of both modules is set to “Safe Mode,” which implies strict control over all network activity and executable files. I suggest leaving these modes as is to begin with, but in reality such control can be quite tedious. You will need each once we manually determine, allow or prohibit the activity of applications that are not included in the list of trusted ones, as well as monitor each file that is launched. This issue may especially concern the “Protection+” module, which will consider all unfamiliar files that you launch as suspicious from your computer. In such a situation, you will see a similar window quite often.


If you are completely sure that the application you are launching is safe, then when such a window appears, select the “Allow this request” and “Remember my choice” items, then click “Yes”. You can make your fate a little easier and switch the “Protection” module +” in “Clean PC Mode” (in the “Summary” tab in the “Protection +” section, click on “Safe Mode” and select the desired mode).


I would like to note that this can only be done if Comodo Firewall is running in conjunction with some antivirus and you are completely sure that your system is healthy. Otherwise, you run the risk of automatically giving permission for some virus to run from your computer, because “Clean PC Mode” implies complete trust in the “Protection+” module in the files that were on your hard drive at the time of its installation.

Now let's move on to the "Firewall" tab. As you can see, there are many different possibilities here, and if we dwell on each, then one article will clearly not be enough. Each item is provided with a sufficient number of comments so that you can understand what is being said. We V this moment I'm interested in the item "Hidden Port Wizard".


First of all, we benefit from the ability to protect our computer from external intrusions. Therefore, here we click on “Block all incoming connections and hide my ports for all incoming connections” and confirm our choice by clicking “OK”.


Now click on “Firewall Settings”, and in the dialog box in the tab “ General settings” Put a check mark on the item “Create rules for secure applications”. Next, confirm your choice by clicking the “OK” button.


Now, for all applications that are in the firewall’s safe list, allowing rules will be automatically created, which will save us from unnecessary confirmations and manual permissions.

Let’s finish with the “Firewall” tab and move on to the next one – “Protection+”. The points in it are in many ways similar to the previous ones. And here we are only interested in the “Proactive Defense Settings” item.


By analogy with the firewall settings, in the dialog box, in the “General settings” tab, check the box “Create rules for secure applications”.


The “Miscellaneous” tab is not directly related to the operation and configuration of the firewall. It contains settings relating to the program interface, updates, saving configurations, as well as its technical support. We will not change anything here.

This is where we finish finishing things off. With this configuration, Comodo Firewall is quite capable of reliably protecting your computer from external threats.

What you need to know for further work.

So, the main work is completed, your firewall is installed and configured. Now let's try to consider a number of basic questions that may arise in the process of using it. In the previous section, we only briefly went through the main tabs of the program, touching only on those points that interested us in the light of preparing Comodo Firewall for full-fledged operation. Now we will try to consider the main features that may be useful to you later, because you should also be able to manage the program, and not be limited to just installing it.


I think the first question that may arise when working with a firewall is how to allow (prohibit) the network activity of individual applications (groups of applications). To do this, go to the “Firewall” tab and pay attention to the items “Add a trusted application” and “Add a blocked application”.

Let's say that you need to prohibit the network activity of an application. To do this, go to the “Add blocked application” item and then click “Select”:


As you can see from the picture, there are several options to choose from. Firstly, it is possible to block a group of files (applications) at once. The Comodo Firewall developers have combined the most needed applications into groups so that we don't have to do everything manually. For example, from here you can disable the network activity of all applications included in startup or even completely deny network access to all executable files. Secondly, from here you can prohibit any of the processes running on your computer. When selecting " Running processes“You will see a similar picture.


In order to block the desired process, select it by clicking the left mouse button (in the example in the picture this is the VBoxService.exe process) and click “Select”. Then click “Apply”. After this, the firewall will add a rule to its lists, according to which all network activity of the VBoxService.exe process will be blocked.

Also in the “Add blocked application” window, using the “Browse” button, you can select any application (file) and add it to the list of blocked ones.

Add if necessary the right application to the list of allowed applications, use the “Add trusted application” item in the “Firewall” tab. The principles of operation here are the same as in the “Add a blocked application” section, so we will not dwell on this in detail.

I think many people will now have a question: how can you then remove the desired process (application) from the blocked list? So, it was already mentioned earlier that when you add applications to the list of blocked (trusted) applications, Comodo Firewall creates rules that determine the behavior of the firewall regarding applications. We create some rules ourselves (as we did a little earlier for the VBoxService.exe process), and some are already added by default during installation. The list of such rules is part of the firewall's network security policy. These policies are accessed through the “Network Security Policies” item in the “Firewall” tab.


As you can see, in the “Application Rules” tab, the “Blocking and logging all requests” rule has been created for the VBoxService.exe process, which we blocked earlier. If desired, you can always delete or correct the desired rule using the buttons located on the right. Here you can add rules for any application by clicking the "Add" button. All rules in this tab are created either based on predefined policies for various groups applications (that is, you simply select which group your application belongs to, and then it will be subject to the rules defined for the entire group), or based on custom settings(here you can either create new rules or simply duplicate rules created for another application, if there were any).


The "Predefined Policies" tab contains several standard policies (rule sets) that you can use to create rules for applications.


You can also add your policies here. This can be convenient when you need to apply the same rules to several applications at once. Then you just need to add the ruleset here once, and then use it every time you add a new rule for the application.

Another interesting and necessary element of the network security policy is the “Port Set” tab. What is a port, as well as other basic terminology computer network you can read in the article: “Computer network terminology or what is what.”


This shows the sets of ports that are currently open on your computer. You can always add a single port or a group of them using the buttons located on the right side of the window. Many applications use their own ports to work on the network, this is where you can add them to the list of open ones by clicking the "Add" button.

So, we looked at the main capabilities of the firewall. Let's now move on to the proactive protection module "Protection+". In fact, this module controls all files that are launched on your computer. Now we will return to the "Protection+" tab and consider the main points regarding this module.


In the "Trusted files" section you can access management local base data files executable on your computer. A number of system files, and will also add those files that you yourself declare safe.


All files that are detected, but the program cannot determine whether they are safe, are added to the list of unidentified files. This list can be accessed in the “Unidentified files” item. This list is managed in the same way as the “Trusted files” list. All files that are unidentified will run in the virtual sandbox Sandbox. We can say that this is a security mechanism that creates a virtual file system and registry for running suspicious files and applications. Thus, any application launched through Sandbox will have an impact only on its virtual environment, and will not affect your operating system. By default, the virtual sandbox is disabled. To enable it, go to the “Proactive Protection Settings” item.


Personally, I’ll be honest, I’m not a big fan of this thing, so I usually turn it off, but see for yourself: if you are very concerned about security and constantly suffer from viruses, then maybe Sandbox makes sense for you. If yes, then here you need to set the "Sandbox Mode" switch to the "Active" position, and also check the boxes next to "Activate virtualization file system” and “Activate registry virtualization” and click “OK”. Now all files included in the “Unidentified files” list will run in a virtual environment. Also, if you want to run any application or file in a virtual environment, you can use the “Run program in Sandbox” item. If, like me, you are a supporter of optimization and adequacy, then on the contrary, you should uncheck all the boxes here and move the slider to the “Inactive” position.

Afterword.

So this heroic epic about the brave struggle of a valiant firewall against an overwhelming army of computer pests has come to an end. With your skillful control, this struggle will always end in victory for the forces of good

With this I say goodbye to you. Let viruses and other malware bypass you!

As always, if you have any questions, additions, thanks, etc., I will be glad to hear them in the comments to this post.

Antivirus with advanced network protection Comodo Internet Security is loved by many advanced users, but is traditionally considered complex and inconvenient to use. initial setup. And the number of alerts that require immediate resolution significantly exceeds that of automatic security packages like Norton Security or Bit Defender. But if you spend a little time on the initial fine-tuning Comodo, ordinary users who do not want to delve into the intricacies of work will be able to work with it network protocols or technology antivirus protection. This is what we will try to figure out today.

After Comodo is finalized, ordinary users will be able to work with it

What to pay attention to when installing

  1. Check the box “I want to use cloud-based application behavior analysis...”. Thus, you will delegate routine decisions about allowing/prohibiting many operations to the user community. This will somewhat reduce the level of safety, but will make the work much more comfortable.
  2. Whether or not to send statistics about the use of the application depends on your desire. But many users prefer to do without it.
  3. On the screen for selecting components to install, check the boxes for “Comodo Antivirus” and “Comodo Firewall”. The rest can be safely turned off.
  4. Be sure to disable the option “If possible, do not show alerts that require the user to make a security decision.”

What to do immediately after installation

  1. Update your anti-virus databases (the “Update” icon at the bottom of the main screen).
  2. Select the “InternetSecurity” configuration (“Basic settings” - “Configuration”), then click the “Enable” button in the lower pop-up panel.
  3. There, click the “Export” button and save the settings in a safe place.
  4. After that, click "Import", select the settings you just saved and give a name to your own option. Then select it in the list and click “Enable”. This is necessary so that the original configuration from the manufacturer remains intact.

After updates, restart your computer

  1. Disable the desktop widget that is of little use (click right click mouse on the tray icon, select “Widget”, uncheck “Show”).
  2. Reboot your computer.

"Security Settings", section "Antivirus"

Leave the heuristic analysis level at “Low”

  • Selecting the “Do not show notifications” option will help inexperienced users quickly get used to the program settings, but it is better not to use it constantly.
  • Leave the heuristic analysis level at “Low”, otherwise you risk drowning in a heap of messages and warnings.
  • Add the folder that contains files downloaded from the Internet, the working directory of the torrent client, and the section with installation packages as an exception. To do this, in the lower pop-up panel, select “Add”, “Folders”, select the desired directory and click “OK”. This will significantly increase the comfort of work during an active online life.

Canceling the desired directory will increase the comfort of work

“Security Settings”, section “Protection+”

  • "HIPS Settings". Recommended operating mode is “Safe”. It is better to leave the “Create rules for secure applications” checkbox enabled.
  • "Sandbox Settings". If you are confident in the security of certain executable files, you can add them to the exception (click the line “Do not virtualize access to specified files and folders"). It is better not to touch the remaining settings.

If you are sure that your files are safe, add them to exceptions

  • Viruscope. A useful and necessary dynamic behavior analysis system running programs. Sometimes it may not work entirely correctly, then until the reasons for the failure are determined, it is better to disable it (uncheck “Use Viruscope”).

Useful dynamic analysis system

“Security Settings”, section “Firewall”, block “Firewall Settings”

This point should be given maximum attention, since one incorrectly set option can lead to serious consequences.

  • A custom set of rules for filtering traffic provides maximum protection, but at the initial setup stage it requires increased attention from the user. "Safe Mode" provides a slightly lower level of protection, but displays far fewer warnings.
  • The “Create rules for safe offers” checkbox will turn Comodo into a complete automatic machine, so if you are not ready to carefully read every warning, you can check it. In all other cases, the field should be left blank.
  • Activated advanced settings (“Enable IPv6 traffic filtering”, “Block fragmented IP traffic”, “Analyze protocol” and “Enable ARP spoofing protection”) provide additional security, but sometimes lead to problems. Use at your own risk.

Pay maximum attention to setting up this option

“Security Settings”, section “File Reputation”

  • Block “File reputation settings”. Here it is better to trust the default settings, and if you want to get rid of some requests, check the “Do not show alerts” checkbox.

Leave the settings as default

Additional settings

They are not necessary, therefore they should be used with some caution, and in case of unstable operation, everything should be returned to its original state.

“HIPS” tab, “HIPS Settings” section:

  • We increase the notification time to a maximum of 999 s.
  • Activating the item “Adapt operating mode when system resources are low” increases stability, but negatively affects the speed of the program.
  • The item “Enable enhanced protection mode” makes sense only for 64-bit OSes.
  • If you use software emulators (Daemontools, VMware, Alcohol), add the corresponding directories to exceptions: the “Detect shell code injection” item.

“Security Settings”, “Protection+”, “Auto-Sandbox”:

The efficiency of virtualization technologies implemented in Comodo is quite high, but due to the high resource intensity on weak computers problems are possible. In this case, we do the following:

  • For all objects with the “Unidentified” reputation, select the “edit” item in the pop-up panel, and in the “Action” line select “Block”.

Using a torrent client

For his normal operation it is required not only to give executable file full access, but also add a special global rule. We select sequentially “Security Settings”, “Firewall”, “Global Rules”, then click “Add” on the pop-up bottom panel and assign a policy:

  • Action: “Allow”, the “Register trigger in the log” checkbox should remain unselected.
  • Protocol: check the “TCP or UDP” box.
  • Direction: “Outgoing and Incoming”.
  • Description: not important.
  • Destination Port tab. Specify the number specified in the uTorrent settings.
  • When everything is ready, move the newly created rule to the very top of the list.

Attention! If, as a result of erroneous actions, the program has stopped functioning normally, select “General Settings”, “Configuration”, check the “COMODO–Internet Security” item and click “Enable”.

We thank him and provide instructions on how to configure the Comodo firewall for maximum protection.

Introduction

Regarding these settings, I would like to note that, despite their “maximum” nature, working on a computer does not make you especially paranoid - everything is quite moderate: once you create rules for a program/application, requests no longer come for configured programs. It is clear that this mode is more suitable for experienced users.

The second point is that testing was carried out in tandem with avast! Free Antivirus, and without it. The result, as noted, was 100% in both cases (despite the fact that the screenshots have avast! antivirus, and without it the Comodo firewall passed all tests 100% on these settings).

Moreover, with avast enabled! and using these settings for Comodo Firewall - the antivirus simply does not have time to start working, since all the blocking is performed by Comodo Firewall.

In addition, in the PC Security Test 2011, Comodo Firewall blocked the first stage of the Antivirus Protection Test, preventing the possibility of placing virus files on the system, although this is essentially the work of an antivirus (for example, in combination with Online Armor + avast! this work After passing the first part of this test, Avast!) performs it.

As a result, Comodo Firewall, so to speak, prevents the antivirus from working, since it simply blocks the possibility of viruses entering the system. Those. It can be noted that Comodo Firewall’s response to threats is very fast (although it is clear that it is synthetic). However, I have not yet had a single product from many vendors (such as Kaspersky Internet Security, Norton Internet Security, Emsisoft Internet Security, McAfee Internet Security, Bitdefender Internet Security, avast! Internet Security, etc.). I think that even though it is synthetic, it is still very significant.

System used in testing settings: Windows 7 PRO 64-bit SP1, 1.65 GHz Dual-core AMD processor, 4GB memory (3.6 GB available).

With these settings in Proactive Security mode, Comodo Firewall passes the following synthetic tests with 100% results:

1) Anti-Test
2) PC Security Test 2011
3) PCFlank Leaktest
4) CLT
5) SSS
6) FireWallTest
7) Mini Security Test

Comodo Firewall 2013 Settings

1. Advanced settings -> General settings -> Configuration


2. Advanced settings -> Security settings -> Protection+ -> HIPS -> Behavioral analysis

Uncheck "Automatically launch detected unknown applications in Sandbox and process them as"


Click to enlarge image

3. Advanced settings -> Security settings -> Firewall -> Firewall settings

We switch the firewall to the “Custom Rule Set” mode so that any network event in the system prompts you to set your own rules manually.

In the "Advanced settings" field, check all the boxes opposite:
- Enable IPv6 traffic filtering
- Enable loopback traffic filtering (for example, 127.x.x.x, ::1)
- Block fragmented IP traffic
- Analyze the protocol
- Enable ARP spoofing protection


Click to enlarge image

4. Advanced settings -> Security settings -> Firewall -> Global rules


Click to enlarge image

5. Advanced settings -> Security settings -> File rating -> File rating settings

Trust applications signed by trusted providers
- Trust applications installed using trusted installers


Click to enlarge image

This lesson is a continuation of the article: Firewall.

So, we found and downloaded latest version Comodo Firewall. Only one firewall can be installed on a computer. Therefore, in order to avoid inter-program conflicts, the built-in Windows firewall must be disabled. You can see how to turn off the firewall in Windows XP and Wiindows 7 in previous lessons: and. But when we install Comodo Firewall, this is not necessary. The Firewall Setup Wizard will automatically disable the built-in Windows firewall.

A firewall controls attempts by applications to communicate on the network. The illustration shows how the firewall intercepted an attempt by the Nokia phone software to access the Internet. This is the application you need, so click the “Allow” button:

One of the first to allow connections to the system components “Windows alg.exe” and “svchost.exe”. They are needed to connect to the network. Once installed, Comodo Firewall will issue alerts for various programs over and over again. If the application is known to us, we allow the connection request. If there is any doubt and the program seems suspicious, click the “Block” button. By checking the “Remember my choice” checkbox, we confirm our choice for this application. And the next time you connect, the notification window for this program will not appear. You need to act carefully. Only programs known to us can allow connections and secure selections. If you click on the application name, the program properties window will open.

Also, the firewall notifies about incoming connections:

The following illustration shows how Comodo Firewall intercepted an incoming packet for a popular peer-to-peer client:

At first, the firewall notifications are a bit annoying. But we make our choice and over time there are fewer and fewer of them.

Malicious programs can disguise themselves as harmless software in order to deceive the firewall and gain permission to connect. Therefore, you need to regularly scan your machine with an antivirus program. You can read more about choosing and working an antivirus.

Let's move on now to the firewall settings.

We open Comodo Firewall, like any other application, by double-clicking on the icon on the desktop or on the icon in the notification area. The main program window appears with the "Summary" tab open:


This displays traffic information and system status. By clicking on the connection numbers, you can view details of active network connections. Clicking the "Stop all connections" button will stop all network activity. This function can be used in case of inappropriate system behavior - suspicion of interference with the operation of programs. For example, the system freezes for a long time and does not respond. This may be a consequence of the network activity of some malicious application. By blocking traffic, you can find out the reason and identify the program that poses a threat. All connections are turned on by clicking the same “Restore all connections” button.

The firewall operating mode can be changed by opening the drop-down list with the "Safe Mode" button.

"Block all" is a mode that does not allow any network activity - the equivalent of the "Stop all connections" button.

"Custom Policy" is a hard mode in which the firewall will display an alert for each program connecting to the Internet. Here, you need to create program policies yourself - clearly understand which applications can be allowed to connect.

"Safe Mode" is installed by default and is universal. The firewall applies user policies - it carries out user settings for individual programs, and also allows network traffic to applications that it considers safe. There will be few notifications and the firewall will not be too distracting.

We assign “training mode” when you need to observe various applications without interfering with their work. Here, Comodo Firewall independently determines program policies without displaying any alerts.

In Inactive mode, the firewall is disabled. You have to turn off the firewall in case of an obvious inter-program conflict, for example, with an anti-virus program or another firewall.

The next tab "Firewall" contains firewall settings. "Firewall Event Log" - the "log" reflects all events - the firewall's reactions to the network activity of various programs.

"Add trusted application" allows you to select the desired application and add it to the allowed ones.

“Add blocked application”, on the contrary, makes it possible to add the selected application to those blocked for connections.

The "Network Security Policies" section opens a window where you can select one of the preset application policies or create your own.

In the "Active" window network connections" shows programs currently exhibiting network activity.

"Hidden Port Wizard" - with these settings you can hide certain ports and make the computer invisible on selected networks.

"Firewall Settings" is a window for selecting an operating mode, duplicating the drop-down list on the "Summary" tab. Also, set the “Safe Mode” slider and check the “Create rules for safe applications” checkbox:


The next tab, "Protection +", contains functions for managing proactive protection. When installing a firewall, proactive protection is enabled by default. Proactive protection is another layer of protection that controls the behavior of programs and prevents infection of the system. Proactive protection settings are basically similar to firewall settings.

The “Run program in Sandbox” option makes it possible to run a dubious application in a kind of “sandbox”. Working in isolation in this protected area, the malware will not be able to harm the system:


The "Proactive Defense Settings" item opens a window of proactive defense operating modes. And, briefly, let's go through these settings.

The "Paranoid" mode implies a paranoid suspicion of the protection towards any network activity. Proactive protection will issue an alert every time any application attempts to establish a connection.

IN safe mode protection applies policies set by the user, and also allows applications that it considers safe to be active.

In Clean PC mode, protection unconditionally trusts all programs installed on the computer and requests connection permissions only for newly installed applications.

"Training mode". In this mode, the protection does not issue alerts and performs monitoring independently.

"Protection disabled." In this mode, proactive protection is disabled. There is no need to disable protection. The optimal solution would be to set the protection to safe mode.

On the "Miscellaneous" tab there are additional settings firewall. You can watch them yourself. The review turned out to be voluminous. The main thing is that Comodo Firewall is a very reliable, flexible, Russian-language and free firewall. Comodo Firewall, combined with a good antivirus program, will ensure comfortable and safe browsing.

In detail, about work and choice antivirus program read .

2490 23.12.2009

Tweet

Plus

Let's start getting acquainted with Comodo Firewall by installing it.

On startup installation file A warning window appears about the need to remove other programs of a similar purpose in order to avoid conflict situations

If you already have any firewall installed, remove it; if not, then feel free to continue.
Now click on the “YES” button in the warning window. Further installation is standard for most Windows programs. You just need to click “Next”. At the end, the program will offer configuration options: automatic or custom

Leave it on automatic. To complete the installation, all you have to do is restart your computer.

After the reboot, you will immediately be asked questions about the activity of programs that can use the network.

Here you need to understand which program you allow or prohibit activity. When you click the “Allow” or “Deny” button, the firewall will allow or not allow the program to access the Internet once. If the program tries to access the Internet again, the window about its activity will be displayed again. If you are confident in the program that is trying to access the Internet, you can check the “Remember my answer for this application” checkbox and click “Allow”. Comodo Firewall will now understand that you trust this application and allow it to run without interference. In the same way, a ban is set for the program: check the box “Remember my answer for this application” and click “Ban”. Comodo will always block this program.

During testing, the first questions were asked regarding alg.exe and svchost.exe.

This system programs and they need to be allowed access. Questions about user programs will be asked as they are launched. If the program is intended to work on the Internet or via the Internet, then it must be allowed. If it is clear that the program is overly zealous in caring about the user and wants to download something from the Internet or transmit it via the Internet, then its access should be denied. Thus, you, interested in your safe stay on the global network, after some time will create rules of conduct for all programs installed on the computer.

Having made an erroneous ban or allowed the program to be active, you can always use the Comodo Firewall settings and correct the situation. Looking at the lower right corner of the screen, where the clock is located, you will see an icon with a shield. This is Comodo. Right-click on the icon and select Open. The main program window will open immediately

The main window clearly shows the basic parameters of the firewall.
At the top of the window you can choose between the “Summary”, “Protection”, “Activity” panels.

On the left are icons for switching between the windows of this panel:

Tasks– In this window, you can quickly allow or deny program access to the network, as well as select other options, the capabilities of which are well described under the name of each option. It is better not to touch anything unless necessary.

Application Monitor– designed to view and edit the list of applications that the user trusts. The window is presented in the form of a table, which indicates:

  • program name (Application),
  • IP address to which the connection is made (Recipient),
  • port number on which communication takes place (Port),
  • protocol within which information is received and transmitted (Protocol),
  • Well, and the column (Permission), which shows whether access to the application is allowed or denied.

pay attention to quick options actions:

  • Enable/disable – you can temporarily disable some of the rules, for example, for testing purposes.
  • Add – A fully customizable option to create a new rule.
  • Edit – Edit the rule on which the cursor is positioned.
  • Delete – permanently removes the rule from the list.

By double-clicking the left mouse button on the program name or clicking “Edit”, you will be taken to the window for fine-tuning (editing) the rule

This window indicates the full path to the program on disk, the path to the program that is the parent of the one being configured. Nothing needs to be changed here.

And by looking at the tabs below you can:
- assign a program action to the application activity, indicate the protocol and direction of the program activity (whether the program receives information (Incoming), sends (Outgoing) or both receives and sends),
- specify one or more IP addresses with which the application interacts. One or more ports that an application opens when communicating.

Component Monitor– designed to monitor the integrity of important files – sometimes viruses try to change files and Comodo can prevent this.

Network Monitor- Attention! The order of the rules is important here! Comodo Firewall scans rules from top to bottom. On this tab you can fine tuning firewall filtering parameters for data transmission by IP addresses and ports. Here you can forcefully close potentially dangerous ports. Here's how to do it:
Click the “Add” button and in the window that appears

select the “block” action and specify “one port” on the “Source Port” tab, and also enter the port number, for example, 137. Click the “OK” button. The new rule will appear in the list.
Use the “Up” or “Down” arrows to specify the location of the rule in the list. To avoid mistakes, for now you can simply place the rule in the middle.

On the bookmark "Additionally" In the “Protection” window, you can further configure the firewall. These features need to be mastered gradually; as you work with the program, you will understand when there is a need for additional settings.

Going to the panel "Activity" we will see two tabs: “Connections” and “Log”
IN "Connections" a list of programs that are currently active is displayed. Here you can see if there is anything suspicious among the programs you trust. As well as the amount of data transmitted/received.

IN "Journal" A chronological record of important events is maintained. You can always refer to it when analyzing the actions of one of the programs.

And of course, don’t forget to update the program components. By clicking the “Update” button at the very top, you will launch the wizard for downloading new components. This simple procedure will prevent new emerging malware from carrying out destructive actions on your computer. By default, the settings are set to automatically check for updates.

Easy to use and configure, the Comodo firewall program will protect your Internet browsing and help you learn to understand the processes that occur during the exchange of information over the network.

Tweet

Plus

Please enable JavaScript to view the