Comodo firewall setup version 8. How to configure Comodo Firewall - previously there were only antiviruses. “Security Settings”, section “Firewall”, block “Firewall Settings”

This lesson is a continuation of the article: Firewall.

So, we found and downloaded the latest version of Comodo Firewall. Only one firewall can be installed on a computer. Therefore, to avoid inter-program conflicts, the built-in Windows firewall should be disabled. You can see how to turn off the firewall in Windows XP and Wiindows 7 in previous lessons: and. But when we install Comodo Firewall, this is not necessary. The Firewall Setup Wizard will automatically disable the built-in Windows firewall.

A firewall controls attempts by applications to communicate on the network. The illustration shows how the firewall intercepted an attempt by the Nokia phone software to access the Internet. This is the application you need, so click the “Allow” button:

One of the first to allow connections to the system components “Windows alg.exe” and “svchost.exe”. They are needed to connect to the network. Once installed, Comodo Firewall will issue alerts for various programs over and over again. If the application is known to us, we allow the connection request. If there is any doubt and the program seems suspicious, click the “Block” button. By checking the “Remember my choice” checkbox, we secure our choice for this application. And the next time you connect, the notification window for this program will not appear. You need to act carefully. Only programs known to us can allow connections and secure selections. If you click on the application name, the program properties window will open.

Also, the firewall notifies about incoming connections:

The following illustration shows how Comodo Firewall intercepted an incoming packet for a popular peer-to-peer client:

At first, the firewall notifications are a bit annoying. But we make our choice and over time there are fewer and fewer of them.

Malicious programs can disguise themselves as harmless software in order to deceive the firewall and gain permission to connect. Therefore, you need to regularly scan your machine with an antivirus program. You can read more about choosing and working an antivirus.

Let's move on now to the firewall settings.

We open Comodo Firewall, like any other application, by double-clicking on the icon on the desktop or on the icon in the notification area. The main program window appears with the "Summary" tab open:


This displays traffic information and system status. By clicking on the connection numbers, you can view details of active network connections. Clicking the "Stop all connections" button will stop all network activity. This function can be used in case of inappropriate system behavior - suspicion of interference with the operation of programs. For example, the system freezes for a long time and does not respond. This may be a consequence of the network activity of some malicious application. By blocking traffic, you can find out the reason and identify the program that poses a threat. All connections are turned on by clicking the same “Restore all connections” button.

The firewall operating mode can be changed by opening the drop-down list with the "Safe Mode" button.

"Block all" is a mode that does not allow any network activity - the equivalent of the "Stop all connections" button.

"Custom Policy" is a hard mode in which the firewall will display an alert for each program connecting to the Internet. Here, you need to create program policies yourself - clearly understand which applications can be allowed to connect.

"Safe Mode" is installed by default and is universal. The firewall applies user policies - it carries out user settings for individual programs, and also allows network traffic to applications that it considers safe. There will be few notifications and the firewall will not be too distracting.

We assign “learning mode” when you need to observe various applications without interfering with their operation. Here, Comodo Firewall independently determines program policies without displaying any alerts.

In Inactive mode, the firewall is disabled. You have to turn off the firewall in case of an obvious inter-program conflict, for example, with an anti-virus program or another firewall.

The next tab "Firewall" contains firewall settings. "Firewall Event Log" - the "log" reflects all events - the firewall's reactions to the network activity of various programs.

"Add trusted application" allows you to select the desired application and add it to the allowed ones.

“Add blocked application”, on the contrary, makes it possible to add the selected application to those blocked for connections.

The "Network Security Policies" section opens a window where you can select one of the preset application policies or create your own.

The "Active Network Connections" window shows programs currently exhibiting network activity.

"Hidden Port Wizard" - with these settings you can hide certain ports and make the computer invisible on selected networks.

"Firewall Settings" is a window for selecting an operating mode, duplicating the drop-down list on the "Summary" tab. Also, set the “Safe Mode” slider and check the “Create rules for safe applications” checkbox:


The next tab, "Protection +", contains functions for managing proactive protection. When installing a firewall, proactive protection is enabled by default. Proactive protection is another layer of protection that controls the behavior of programs and prevents infection of the system. Proactive protection settings are basically similar to firewall settings.

The “Run program in Sandbox” option makes it possible to run a dubious application in a kind of “sandbox”. Working in isolation in this protected area, the malware will not be able to harm the system:


The "Proactive Defense Settings" item opens a window of proactive defense operating modes. And, briefly, let's go through these settings.

The "Paranoid" mode implies a paranoid suspicion of the protection towards any network activity. Proactive protection will issue an alert every time any application attempts to establish a connection.

In safe mode, protection applies policies set by the user, and also allows applications that it considers safe to be active.

In Clean PC mode, protection unconditionally trusts all programs installed on the computer and requests connection permissions only for newly installed applications.

"Training mode". In this mode, the protection does not issue alerts and performs monitoring independently.

"Protection disabled." In this mode, proactive protection is disabled. There is no need to disable protection. The optimal solution would be to set the protection to safe mode.

The "Miscellaneous" tab contains additional firewall settings. You can watch them yourself. The review turned out to be voluminous. The main thing is that Comodo Firewall is a very reliable, flexible, Russian-language and free firewall. Comodo Firewall, combined with a good antivirus program, will ensure comfortable and safe browsing.

Read in detail about the operation and selection of an antivirus program.

optimally, with a minimum of pop-up notification windows, quickly andconfigure it yourself . The author's version of the program's advanced settings largely coincides with that recommended in the Russian part of the International COMODO Forums (thread "CIS/CFP for beginners in firewalls"). These forums can be visited by clicking on the "Miscellaneous" tab and clicking "Visit Support Forum". The only thing is that you will be taken to the main English page, so in order not to search, here is the directlink to the forum "In Russian / Russian". There is a lot of useful information on the topic - those who wish, of course, can “dig into it.” And for convenience, point by point, I will proceed to what I promised.


Setting up Comodo Firewall

1. At the beginning, I suggest changing the default gray and sad “face” of Comodo Firewall to something more interesting. To do this, in the same “Miscellaneous” tab, click “Settings” > “Appearance” > “Theme” and change the gray COMODO Default Normal theme to, say,. COMODO Blue Normal and, having dressed up, we move on.

Instructions for installing Comodo Firewall on a Windows PC.

1. At the very beginning of the installation, you must select Russian from the list of suggested ones in order to understand the complex settings of the program.

2. In the next dialog box, uncheck additional functions and DO NOT enter your email address.
In addition, in this window you need to click on the “Configure upgrade” button and carry out some manipulations.

3. In the upgrade settings, uncheck the boxes for Geek Buddy and Dragon Web Browser.

Geek Buddy - another reason to smile if you know English and can translate this expression. This is a small application “for lamers” that will provide you with 60 days of free help from the technical support of this firewall.

This means that if you have any questions, you can safely write/call in the USA and consult in English with their team.

Since we are already great, and you can ask questions on our website, we won’t use this opportunity :-)

Dragon Web Browser is a browser that provides supposedly secure network surfing.
In fact, we don’t need it, because the security of surfing will be provided for us by Komodo Firewall, so we remove the checkbox from this item.

Click “Back” -> “I agree.” Install” and begin installing the firewall.

4. After some time, the program will ask you to restart your computer. Save all open documents and click “Yes”.

5. As soon as the computer is restarted, the program will automatically introduce you to its products and capabilities.
To avoid this in the future, check the box next to “Don’t show this window again” and close it.

Setting up a firewall.

1. After installing Commodo, the firewall will start to complain to you that some applications are trying to access the Internet to update. In this regard, you can either allow them to do this or prohibit them.

Your choice will be permanent and the system will remember it, i.e. if you prohibit/allow some application to update once, after restarting the computer
Komodo will automatically block/give him the ability to update without notification.

If you eventually want to change your anger to mercy and block/allow the connection of a certain program to the Internet, we will later look at how to do this manually.

2. The main thing in setting up any firewall is to make sure that its operation is invisible to you, but at the same time, it reliably protects your PC from external threats.
To do this, run:

    go to the desktop and click on the firewall in the place where the inscription “safe” (there may be some other inscription there).
    The full program menu will open.

    Go to “Tasks”.

    Select “Firewall tasks”. At this point you can allow certain programs to connect to the Internet to update their databases.

    If you are confident in the application and know that it is accessing the World Wide Web for new databases, then click on the “Allow connection” button, then select the application file that needs to be given access to the network and click open.

All other settings can be left at default for now.

The developers of this application have already worked hard to make protection against attacks and use of the Firewall convenient for users.

Antivirus with advanced network protection Comodo Internet Security is loved by many advanced users, but is traditionally considered complex and inconvenient to set up initially. And the number of alerts that require immediate resolution significantly exceeds that of automatic security packages like Norton Security or Bit Defender. But if you spend a little time on the initial fine-tuning Comodo, ordinary users who do not want to delve into the intricacies of network protocols or anti-virus protection technologies will be able to work with it. This is what we will try to figure out today.

After Comodo is finalized, ordinary users will be able to work with it

What to pay attention to when installing

  1. Check the box “I want to use cloud-based application behavior analysis...”. Thus, you will delegate routine decisions about allowing/prohibiting many operations to the user community. This will somewhat reduce the level of safety, but will make the work much more comfortable.
  2. Whether or not to send statistics about the use of the application depends on your desire. But many users prefer to do without it.
  3. On the screen for selecting components to install, check the boxes for “Comodo Antivirus” and “Comodo Firewall”. The rest can be safely turned off.
  4. Be sure to disable the option “If possible, do not show alerts that require the user to make a security decision.”

What to do immediately after installation

  1. Update your anti-virus databases (the “Update” icon at the bottom of the main screen).
  2. Select the “InternetSecurity” configuration (“Basic settings” - “Configuration”), then click the “Enable” button in the bottom pop-up panel.
  3. There, click the “Export” button and save the settings in a safe place.
  4. After that, click "Import", select the settings you just saved and give a name to your own option. Then select it in the list and click “Enable”. This is necessary so that the original configuration from the manufacturer remains intact.

After updates, restart your computer

  1. Disable the desktop widget that is of little use (right-click on the tray icon, select “Widget”, uncheck “Show”).
  2. Reboot your computer.

"Security Settings", section "Antivirus"

Leave the heuristic analysis level at “Low”

  • Selecting the “Do not show notifications” option will help inexperienced users quickly get used to the program settings, but it is better not to use it constantly.
  • Leave the heuristic analysis level at “Low”, otherwise you risk drowning in a heap of messages and warnings.
  • Add the folder that contains files downloaded from the Internet, the working directory of the torrent client, and the section with installation packages as an exception. To do this, in the lower pop-up panel, select “Add”, “Folders”, select the desired directory and click “OK”. This will significantly increase the comfort of work during an active online life.

Canceling the desired directory will increase the comfort of work

“Security Settings”, section “Protection+”

  • "HIPS Settings". Recommended operating mode is “Safe”. It is better to leave the “Create rules for secure applications” checkbox enabled.
  • "Sandbox Settings". If you are confident in the security of certain executable files, you can add them to the exception (click the line “Do not virtualize access to the specified files and folders”). It is better not to touch the remaining settings.

If you are sure that your files are safe, add them to exceptions

  • Viruscope. A useful and necessary system for dynamic analysis of the behavior of running programs. Sometimes it may not work entirely correctly, then until the reasons for the failure are determined, it is better to disable it (uncheck “Use Viruscope”).

Useful dynamic analysis system

“Security Settings”, section “Firewall”, block “Firewall Settings”

This point should be given maximum attention, since one incorrectly set option can lead to serious consequences.

  • A custom set of rules for filtering traffic provides maximum protection, but at the initial setup stage it requires increased attention from the user. "Safe Mode" provides a slightly lower level of protection, but displays far fewer warnings.
  • The “Create rules for safe offers” checkbox will turn Comodo into a complete automatic machine, so if you are not ready to carefully read every warning, you can check it. In all other cases, the field should be left blank.
  • Activated advanced settings (“Enable IPv6 traffic filtering”, “Block fragmented IP traffic”, “Analyze protocol” and “Enable ARP spoofing protection”) provide additional security, but sometimes lead to problems. Use at your own risk.

Pay maximum attention to setting up this option

“Security Settings”, section “File Reputation”

  • Block “File reputation settings”. Here it is better to trust the default settings, and if you want to get rid of some requests, check the “Do not show alerts” checkbox.

Leave the settings as default

Additional settings

They are not necessary, therefore they should be used with some caution, and in case of unstable operation, everything should be returned to its original state.

“HIPS” tab, “HIPS Settings” section:

  • We increase the notification time to a maximum of 999 s.
  • Activating the item “Adapt operating mode when system resources are low” increases stability, but negatively affects the speed of the program.
  • The item “Enable enhanced protection mode” makes sense only for 64-bit OSes.
  • If you use software emulators (Daemontools, VMware, Alcohol), add the corresponding directories to exceptions: the “Detect shell code injection” item.

“Security Settings”, “Protection+”, “Auto-Sandbox”:

The efficiency of the virtualization technologies implemented in Comodo is quite high, but due to the high resource intensity, problems are possible on weak computers. In this case, we do the following:

  • For all objects with the “Unidentified” reputation, select the “edit” item in the pop-up panel, and in the “Action” line select “Block”.

Using a torrent client

For its normal operation, it is necessary not only to give the executable file full access, but also to add a special global rule. We select sequentially “Security Settings”, “Firewall”, “Global Rules”, then click “Add” on the pop-up bottom panel and assign a policy:

  • Action: “Allow”, the “Register trigger in the log” checkbox should remain unselected.
  • Protocol: check the “TCP or UDP” box.
  • Direction: “Outgoing and Incoming”.
  • Description: not important.
  • Destination Port tab. Specify the number specified in the uTorrent settings.
  • When everything is ready, move the newly created rule to the very top of the list.

Attention! If, as a result of erroneous actions, the program has stopped functioning normally, select “General Settings”, “Configuration”, check the “COMODO–Internet Security” item and click “Enable”.

Comodo Personal Firewall designed to protect PC users running Windows OS. It is extremely easy to use and provides all the necessary features and functions. The most important thing is that it “flies” even on the most low-power computers. Another important advantage, especially for beginners, is that it requires minimal intervention from the user.

Why use our Firewall?

Comodo Firewall Pro introduces a new evolution in computer security: Disabled Blocking of Trusted Applications (DDP). What is DDP? Most security programs maintain a list of known malware, and use this list to decide which files and applications should not gain access to the PC. The problem here is obvious. What if the malware list is missing some entries, or is not up to date? DDP eliminates this problem to ensure complete security. Firewall links to a list of over two million known PC-friendly applications. If a file that is not found in the Safe List “knocks” at the “door” on the computer, the Firewall immediately warns about the possibility of a malware attack. All this happens before malware infects the computer. This is prevention-based security, the only way to maintain complete security.


Firewall Features:
  • Easy to understand informative alerts
  • No complex configuration issues - ideal for novice users
  • Lots of configuration options, let the techies configure everything the way they like :)
  • Security DDP, user-informative and PC-safe
  • Quickly adapt users to personalized protection
  • Convenient, attractive graphical interface

One of the first steps in securing your computer is downloading and activating a quality firewall to repel intrusions. Only this free firewall software has access to Comodo, a huge list of PC-friendly applications, a "deny by default" component

Comodo Firewall recognizes more than ten thousand different applications (secure, spyware, adware and others), which is a unique feature unique to this firewall.
Key features of Comodo Firewall Pro
monitoring program components;
program behavior analyzer;
against protocols;
smart alerts;
integration into Windows Security Center;
critical termination protection;
protection during computer boot;
automatic update;
error reporting interface;
detailed journal;
connection monitor;
program database - more than 13,000 programs with their security risks.

A description of the program can be found

Installing Comodo Personal Firewall Pro.
Download the program from the official website.











Attention! Be sure to uncheck “install” and do not check “install COMODO LivePC...”.






installation completed successfully! Restart your computer.

First start.
When you restart your computer, Comodo Firewall will automatically replace the standard Windows firewall. If after the first launch you do not see any shortcuts on the desktop, just reboot again. The program needs to be “taught” which programs you allow to run and which ones you do not. If you are an inexperienced user, then I recommend “not to be clever” but to allow everything (of course, reading the program’s recommendations), for example:

Set the mode to “training”. To do this, right-click the firewall icon in the panel (bottom right of the screen) and select “firewall mode” and then “training” from the menu.

Now the program will remember all your actions, and after training, your actions will no longer be accompanied by the opening of permission confirmation windows.
You can familiarize yourself with the functions of the program. To do this, double-click on the program icon. It’s not particularly difficult to figure it out, but you don’t have to delve into it. Just leave all settings unchanged. Once again, the program requires only minimal user intervention.

Leave your comment!