Resetting custom rules in comodo firewall. Installation and configuration of Comodo Firewall. Example of permissions for accessing a local network

2492 23.12.2009

Tweet

Plus

Let's start getting acquainted with Comodo Firewall by installing it.

When you run the installation file, a warning window appears warning you about the need to remove other programs of a similar purpose in order to avoid conflict situations

If you already have any firewall installed, remove it; if not, then feel free to continue.
Now click on the “YES” button in the warning window. Further installation is standard for most Windows programs.

You just need to click “Next”. At the end, the program will offer configuration options: automatic or custom

Leave it on automatic. To complete the installation, all you have to do is restart your computer.

After the reboot, you will immediately be asked questions about the activity of programs that can use the network.

Here you need to understand which program you allow or prohibit activity. When you click the “Allow” or “Deny” button, the firewall will allow or not allow the program to access the Internet once. If the program tries to access the Internet again, the window about its activity will be displayed again. If you are confident in the program that is trying to access the Internet, you can check the “Remember my answer for this application” checkbox and click “Allow”. Comodo Firewall will now understand that you trust this application and allow it to run without interference. In the same way, a ban is set for the program: check the box “Remember my answer for this application” and click “Ban”.

Comodo will always block this program.

Having made an erroneous ban or allowed the program to be active, you can always use the Comodo Firewall settings and correct the situation. Looking at the lower right corner of the screen, where the clock is located, you will see an icon with a shield. This is Comodo. Right-click on the icon and select Open. The main program window will open immediately

The main window clearly shows the basic parameters of the firewall.
At the top of the window you can choose between the “Summary”, “Protection”, “Activity” panels.

On the left are icons for switching between the windows of this panel:

Tasks– In this window, you can quickly allow or deny program access to the network, as well as select other options, the capabilities of which are well described under the name of each option. It is better not to touch anything unless necessary.

Application Monitor– designed to view and edit the list of applications that the user trusts.

  • The window is presented in the form of a table, which indicates:
  • program name (Application),
  • IP address to which the connection is made (Recipient),
  • port number on which communication takes place (Port),
  • protocol within which information is received and transmitted (Protocol),

Well, and the column (Permission), which shows whether access to the application is allowed or denied.

  • Pay attention to the quick action options:
  • Enable/disable – you can temporarily disable some of the rules, for example, for testing purposes.
  • Add – fully customizable ability to create a new rule.
  • Edit – Edit the rule on which the cursor is positioned.

Delete – permanently removes the rule from the list.

By double-clicking the left mouse button on the program name or clicking “Edit”, you will be taken to the window for fine-tuning (editing) the rule

This window indicates the full path to the program on disk, the path to the program that is the parent of the one being configured. Nothing needs to be changed here.
And by looking at the tabs below you can:
- assign a program action to the application activity, indicate the protocol and direction of the program activity (whether the program receives information (Incoming), sends (Outgoing) or both receives and sends),

- specify one or more IP addresses with which the application interacts. One or more ports that an application opens when communicating.– designed to monitor the integrity of important files – sometimes viruses try to change files and Comodo can prevent this.

Network Monitor- Attention! The order of the rules is important here! Comodo Firewall scans rules from top to bottom.
This tab allows you to fine-tune the firewall filtering parameters for data transmission by IP addresses and ports.

Here you can forcefully close potentially dangerous ports. Here's how to do it:
Click the “Add” button and in the window that appears

select the “block” action and specify “one port” on the “Source Port” tab, and also enter the port number, for example, 137. Click the “OK” button. The new rule will appear in the list. Use the “Up” or “Down” arrows to specify the location of the rule in the list. To avoid mistakes, for now you can simply place the rule in the middle. On the bookmark

"Additionally" In the “Protection” window, you can further configure the firewall. These features need to be mastered gradually; as you work with the program, you will understand when there is a need for additional settings.
Going to the panel "Activity" we will see two tabs: “Connections” and “Log”

IN "Connections" a list of programs that are currently active is displayed. Here you can see if there is anything suspicious among the programs you trust. As well as the amount of data transmitted/received.

IN

"Journal"

Tweet

Plus

A chronological record of important events is maintained. You can always refer to it when analyzing the actions of one of the programs.

And of course, don’t forget to update the program components. By clicking the “Update” button at the very top, you will launch the wizard for downloading new components. This simple procedure will prevent new emerging malware from carrying out destructive actions on your computer. By default, the settings are set to automatically check for updates.

It has long been no secret that any modern person cannot do without a computer and the Internet. The World Wide Web has become an integral part of the lives of most of us. It is a storehouse of information, a way (or means) of communication, and much more. The computer is the tool with which we gain access to the World Wide Web. Therefore, everyone has a natural desire to protect their iron friend from the dangers that it conceals behind itself.

One of these tools is Comodo Firewall - a program that will help us protect our computer from various computer infections, of which there are many on the Internet.

Questions in the style of “what is a firewall and why is it needed” have already been discussed earlier on the site in articles: Protecting yourself from hackers, worms and other riffraff, How to protect ports and your computer from hacking. Part 1., “Outpost Firewall, – installation, configuration, description” or “Internet protection and network security” and others.

This article will be entirely devoted to a separate product – Comodo Firewall. This program is free, and many rightfully consider it number one among similar products. At the same time, the product in question copes with its tasks no worse than most paid analogues from other software manufacturers. It is also important that there is an excellent Russian-language version of this firewall.

Installation and initial setup.

Installing Comodo Firewall is not fraught with any particular difficulties, but it still has some nuances.

After downloading, run the previously downloaded file (if you downloaded it from the link provided above, it should be called cfw_installer.exe). Next, you will be asked to select the installation language, naturally leave “Russian – By COMODO” and click “OK”, after which we will see the following:


We skip the “Enter your email address” item. Next, feel free to uncheck the “Change DNS server settings to COMODO SecureDNS” item (you can read about why here). Next, we also uncheck the box “I want to use Cloud Application Analysis, transferring unidentified programs to COMODO in compliance with the Privacy Policy.” Now look at the very bottom of the dialog box and click on “Installation options” (see screenshot above)


First of all, we are interested in the “Installation Options” tab. As you can see, by default we are offered to install two products, the Comodo Firewall itself, as well as the Comodo GeekBuddy service. The latter is a shareware service that offers technical support to users for 60 days The idea is that you can ask for help or just advice from Comodo employees directly from the program itself, but this is only relevant for those who know English well, since there is no Russian-language support. And why do we need it. , because we want to figure everything out ourselves using this article (), and if any questions or difficulties arise, you can always go to an interesting forum like FS [free computer help] (who would have thought of it? Therefore, we can safely uncheck the box). opposite “Installing Comodo GeekBuddy” - you are unlikely to ever use it in practice, and there is absolutely no need for this service to lie, as they say, as a dead weight in our operating system.

We leave the remaining settings unchanged and click the “Back” button, which will return us to the already familiar window, in which we click “Agree, Install”. We wait until the installer completes all the necessary operations and click “Yes” when prompted to reboot our operating system.

After the reboot, we will see a welcome window in which we need to check the box “Do not show this window again.”


And we calmly close it so that it does not bother us in the future.

Almost simultaneously with the welcome window, we will see another window. The smart program will detect your network and prompt you to give it a name and carry out preliminary configuration.


For example, if you have a laptop that you use both at work and at home, then you can name the networks “Work” and “Home Network”, respectively, or something at your discretion. If you need to be able to share folders and (or) print on a network printer, then check the box “Make the computer fully accessible to other computers on this network.” If there is no such need, then it is better to leave this option disabled, so how this significantly increases the level of security for your computer. Next, simply confirm your choice by clicking “Yes”, and complete the installation.

Advanced configuration of Comodo Firewall. We bring the defense to mind.

So, the program is already installed on your computer and, in principle, can work with the default settings specified by the manufacturer. But to increase your comfort, you need to fine-tune the firewall a little more. To do this, let's get acquainted with the main features of the program. What kind of beast is this Comodo Firewall? We can say that it consists of two main modules: the firewall itself (the “Firewall” tab) and the proactive protection module (the “Protection+” tab). Basic information on the operation of these modules can be viewed in the "Summary" tab.


Basically, from here you can quickly access some basic settings and statistics: see how many incoming and outgoing connections you have and intrusion statistics; assess which applications exhibit the most network activity; change the operating modes of the firewall and the "Protection+" module and even stop all connections. There is no need to be alarmed if the number of connections is very large: for example, if you have any torrent client with a large number of distributions turned on, the total number of connections can reach several hundred or even thousand.

It is worthwhile to dwell specifically on the operating modes of the firewall modules and the proactive protection module. By default, the operating mode of both modules is set to “Safe Mode,” which implies strict control over all network activity and executable files. I suggest leaving these modes as is to begin with, but in reality such control can be quite tedious. You will need each once we manually determine, allow or prohibit the activity of applications that are not included in the list of trusted ones, and also monitor each file that is launched. This issue may especially concern the “Protection+” module, which will consider all unfamiliar files that you launch as suspicious. from your computer. In such a situation, you will see a similar window quite often.


If you are completely sure that the application you are launching is safe, then when such a window appears, select the “Allow this request” and “Remember my choice” items, then click “Yes”. You can make your fate a little easier and switch the “Protection” module +” in “Clean PC Mode” (in the “Summary” tab, in the “Protection+” section, click on “Safe Mode” and select the desired mode).


I would like to note that this can only be done if Comodo Firewall is running in conjunction with some antivirus and you are completely sure that your system is healthy. Otherwise, you run the risk of automatically giving permission for some virus to run from your computer, because “Clean PC Mode” implies complete trust in the “Protection+” module in the files that were on your hard drive at the time of its installation.

Now let's move on to the "Firewall" tab. As you can see, there are many different possibilities here, and if we dwell on each, then one article will clearly not be enough. Each item is provided with a sufficient number of comments so that you can understand what is being said. We Currently interested in the item “Hidden Port Wizard”.


First of all, we benefit from the ability to protect our computer from external intrusions. Therefore, here we click on “Block all incoming connections and hide my ports for all incoming connections” and confirm our choice by clicking “OK”.


Now click on “Firewall Settings”, and in the dialog box, in the “General Settings” tab, check the box “Create rules for secure applications”. Next, confirm your choice by clicking the “OK” button.


Now, for all applications that are in the firewall’s safe list, allowing rules will be automatically created, which will save us from unnecessary confirmations and manual permissions.

Let’s finish with the “Firewall” tab and move on to the next one – “Protection+”. The points in it are in many ways similar to the previous ones. And here we are only interested in the “Proactive Defense Settings” item.


By analogy with the firewall settings, in the dialog box, in the “General settings” tab, check the box “Create rules for secure applications”.


The “Miscellaneous” tab is not directly related to the operation and configuration of the firewall. It contains settings relating to the program interface, updates, saving configurations, as well as its technical support. We will not change anything here.

This is where we finish finishing things off. With this configuration, Comodo Firewall is quite capable of reliably protecting your computer from external threats.

What you need to know for further work.

So, the main work is completed, your firewall is installed and configured. Now let's try to consider a number of basic questions that may arise in the process of using it. In the previous section, we only briefly went through the main tabs of the program, touching only on those points that interested us in the light of preparing Comodo Firewall for full-fledged operation. Now we will try to consider the main features that may be useful to you later, because you should also be able to manage the program, and not be limited to just installing it.


I think the first question that may arise when working with a firewall is how to allow (prohibit) the network activity of individual applications (groups of applications). To do this, go to the “Firewall” tab and pay attention to the items “Add a trusted application” and “Add a blocked application”.

Let's say that you need to prohibit the network activity of an application. To do this, go to the “Add blocked application” item and then click “Select”:


As you can see from the picture, there are several options to choose from. Firstly, it is possible to block a group of files (applications) at once. The Comodo Firewall developers have combined the most needed applications into groups so that we don't have to do everything manually. For example, from here you can disable the network activity of all applications included in startup or even completely deny network access to all executable files. Secondly, from here you can prohibit any of the processes running on your computer. When you select “Running processes” you will see a similar picture.


In order to block the desired process, select it by clicking the left mouse button (in the example in the picture this is the VBoxService.exe process) and click “Select”. Then click “Apply”. After this, the firewall will add a rule to its lists, according to which all network activity of the VBoxService.exe process will be blocked.

Also in the “Add blocked application” window, using the “Browse” button, you can select any application (file) and add it to the list of blocked ones.

If you need to add the desired application to the list of allowed applications, use the “Add trusted application” item in the “Firewall” tab. The principles of operation here are the same as in the “Add a blocked application” section, so we will not dwell on this in detail.

I think many people will now have a question: how can you then remove the desired process (application) from the blocked list? So, it was already mentioned earlier that when you add applications to the list of blocked (trusted) applications, Comodo Firewall creates rules that determine the behavior of the firewall regarding applications. We create some rules ourselves (as we did a little earlier for the VBoxService.exe process), and some are already added by default during installation. The list of such rules is part of the firewall's network security policy. These policies are accessed through the “Network Security Policies” item in the “Firewall” tab.


As you can see, in the “Application Rules” tab, the “Blocking and logging all requests” rule has been created for the VBoxService.exe process, which we blocked earlier. If desired, you can always delete or correct the desired rule using the buttons located on the right. Here you can add rules for any application by clicking the “Add” button. All rules in this tab are created either based on predefined policies for various application groups (that is, you simply select which group your application belongs to, and then they will be applied to it distribute rules defined for the entire group), or based on user settings (here you can either create new rules or simply duplicate rules created for another application, if there were any).


The "Predefined Policies" tab contains several standard policies (rule sets) that you can use to create rules for applications.


You can also add your policies here. This can be convenient when you need to apply the same rules to several applications at once. Then you just need to add the ruleset here once, and then use it every time you add a new rule for the application.

Another interesting and necessary element of the network security policy is the “Set of Ports” tab. You can read what a port is, as well as other basic computer network terminology in the article: “Computer network terminology or what is what.”


This shows the sets of ports that are currently open on your computer. You can always add a single port or a group of them using the buttons located on the right side of the window. Many applications use their own ports to work on the network, this is where you can add them to the list of open ones by clicking the "Add" button.

So, we looked at the main capabilities of the firewall. Let's now move on to the proactive protection module "Protection+". In fact, this module controls all files that are launched on your computer. Now we will return to the "Protection+" tab and consider the main points regarding this module.


In the “Trusted Files” section, you can access management of the local database of executable files on your computer. A number of system files were immediately added here, and those files that you yourself declare safe will also be added.


All files that are detected, but the program cannot determine whether they are safe, are added to the list of unidentified files. This list can be accessed in the “Unidentified files” item. This list is managed in the same way as the “Trusted files” list. All files that are unidentified will run in the virtual sandbox Sandbox. We can say that this is a security mechanism that creates a virtual file system and registry for running suspicious files and applications. Thus, any application launched through Sandbox will have an impact only on its virtual environment, and will not affect your operating system. By default, the virtual sandbox is disabled. To enable it, go to the “Proactive protection settings” item.


Personally, I’ll be honest, I’m not a big fan of this thing, so I usually turn it off, but see for yourself: if you are very concerned about security and constantly suffer from viruses, then maybe Sandbox makes sense for you. If yes, then here you need to set the “Sandbox Mode” switch to the “Active” position, and also check the boxes next to “Activate file system virtualization” and “Activate registry virtualization” and click “OK”. Now all files included in the “Unidentified files” list will run in a virtual environment. Also, if you want to run any application or file in a virtual environment, you can use the “Run program in Sandbox” item. If, like me, you are a supporter of optimization and adequacy, then on the contrary, you should uncheck all the boxes here and move the slider to the “Inactive” position.

Afterword.

So this heroic epic about the brave struggle of a valiant firewall against an overwhelming army of computer pests has come to an end. With your skillful control, this struggle will always end in victory for the forces of good

With this I say goodbye to you. Let viruses and other malware bypass you!

As always, if you have any questions, additions, thanks, etc., I will be glad to hear them in the comments to this post.

Getting to the settings is quite problematic, since there is no button of the same name. However, on the menu Tasks did you see the button Advanced settings(Sandbox Tasks and Advanced Tasks), by clicking which you can get to the parameters window (Fig. 4.99).

Rice. 4.99. Advanced settings

The window is divided into two parts: on the left are settings categories, on the right are changeable parameters. There are only two categories: General settings And Security Settings(Fig. 4.100).


Rice. 4.100. General settings

There are four subcategories in General Settings.

Interface. In this subcategory you can change the program language, as well as configure visual and sound parameters. To do this, check the boxes next to the appropriate parameters. The more of them are enabled, the more often the program reminds you of its presence on the computer. Separately, it should be noted that you can block access to program settings using a password. To do this, check the Protect settings with a password checkbox, click on the Set password link and enter your password in the window that appears.

Updates. We are talking about updating both the anti-virus databases and the program itself. This is where you can configure the frequency of checking for updates (Fig. 4.101).

Journaling. You can disable logging or, conversely, enable it.

Configuration. The subcategory is responsible for protection priorities. By default, COMODO - Internet Security is selected, which is sensitive to threats from the Internet. If you spend a lot of time on the Internet, then don't change anything. COMODO - Proactive Security focuses on protecting from within. Select it if there were a large number of viruses on your computer. COMODO - Firewall Security provides only network protection (firewall). To change the configuration, double-click on the required item (Fig. 4.102).



Rice. 4.101. Setting Up Updates



Rice. 4.101. Setting Configuration

The default security settings are set to a very high level (Fig. 4.103). The only thing you can do is lower the protection and exclude individual files from scanning. These settings are unlikely to be useful to the average user, so we will not dwell on them in detail.



Rice. 4.103. Security Settings

CHECKING YOUR COMPUTER

You can start scanning in the main window using the button Scan. You can also use the button Tasks (General Tasks Scan). In the window that opens, select the scan type (Fig. 4.104):

Quick scan - checks areas of the computer that are susceptible to infection;

Full scan - scans all files on the computer;

Custom Scan - scan individual files or folders ( Custom Scan Scan Folder or Scan file)(Fig. 4.106).

rice. 4.104. Scan profiles



Rice. 4.106. Custom Scan

In addition, you have the opportunity to create your own profile. To do this in the menu Custom Scan click the button Other options, in the window that opens, click the button Add(Fig. 4.107).



Rice. 4.107. Creating a Scan Profile

In the next window (Fig. 4.108), give the profile a name and add scan objects: individual files and entire areas (tab Objects). On the tab Options select the thoroughness of the check. The more checkboxes you check, the more thorough the check will be. In the tab Schedule set the time and frequency of this type of scanning. Click OK.



Rice. 4.108. Setting up a scan profile

Now in the window Scanning(see Fig. 4.104) the created object scanning profile will appear. Check the box to activate it, and the antivirus will begin scanning at the scheduled time.

To summarize, it should be noted that COMODO Antivirus is highly effective. He copes well with the task assigned to him. The disadvantages include a not very clear interface.

review, we examined in detail and with “pictures” the process of installing the freeComodo Firewallon computer. Now, as promised, I will tell you howoptimal firewall, with a minimum of pop-up notifications, quickly and independently configured. The author's version of the program's advanced settings largely coincides withrecommended in the Russian part InternationalCOMODO Forums(branch " CIS/CFP for firewall newbies"). These forums can be visited by clicking on the " tabMiscellaneous" paragraph " Visit the support forum "The only thing is that you will be taken to the main English-language page, so in order not to search, here is a direct link to the forum" In Russian / Russian "(clickable!). There is a lot of useful information on the topic - those who wish, of course, can “dig in.” And I, as usual, for convenience the points I'll start what I promised.

Comodo Firewall Advanced Settings

1. At the beginning, I suggest changing the default (default) grey-cheerful “face” Comodo Firewall for something more interesting. To do this, in the same “Miscellaneous” tab, click “ Settings" → "Appearance" → in "Theme" we change the "gray" theme "COMODO Default Normal" to, for example, "COMODO Blue Norma" (first screenshot) and, "dressed up", move on.

2. The first of the program's advanced settings will be to enable the "invisibility" mode of your computer on the network. To do this, in the tab " Firewall"click applet" Hidden Port Wizard "→ select" Block all incoming connections and hide my ports for all incoming connections "(screenshot above) and confirm your choice via " OK ".

3. Further, in the same tab " Firewall"let's go to" Firewall settings " and on the "General settings" tab we activate " ". Now allowing rules will be automatically created for all applications from the list of trusted ones, which will save you from unnecessary permissions manually. In addition, check the checkbox next to the item "Automatically discover new private networks " (which can be removed after detecting your network) and, most importantly, " Firewall mode "we leave unchanged" Safe ".

Confirm all changes in settings with the " OK".

4. Let's move on to the mode settings" Proactive Defense". To do this, in the tab " Protection+"click" Proactive Defense Settings " and, by analogy with the previous settings item, activate " Create rules for secure applications ". If you are confident that the system is clean from viruses and have an effective anti-virus scanner (the need for which I wrote in the note " ") like free, then feel free to install " Clean PC mode " – again, to get rid of “annoying” alerts. Also check that there is no checkbox next to " Enable enhanced protection mode " and presence - opposite the point " A adapt the operating mode at low system resources " (no comments).

5. In the same settings of Proactive Firewall Protection in the " tab Application execution control settings " check that unrecognized files are treated as " Partially limited " (default) or " Suspicious " – under other settings, some applications will refuse to launch.

6. For users of older versions Comodo Firewall

And don't forget to confirm changes in settings with the " OK ".

Note: When Proactive Defense is completely deactivated, this option ("Sandbox") is automatically disabled.

7. The final tweak from the "optional" category: in the " tab Miscellaneous " → "Settings"→ on tab" Are common"Uncheck the box next to the item" Automatically check for program updates" (penultimate screenshot), especially since the option " Check for updates "Always at hand" (last screenshot).

Another click on the " OK" and you can close the appropriately configured Comodo Firewall– after restarting Windows, with this configuration, “comfortable” for the user, the program reliably protects the computer from network threats.

As a result of unsuccessful attempts to force the database to be updated, I decided to simply install Comodo again, but with a younger version, in order to test it. Comodo Internet Security is a complete protection that includes an antivirus, firewall and proprietary features such as Hips and more.

Before Comodo, I tried various antiviruses. This includes Doctor Web, Kaspersky, AVG, Nod32, Avast, Panda, MalwareAntimalware and even the Chinese Rising, which works surprisingly well.

Most of all I like Kaspersky, which served me faithfully for several years, but the time has come to find something to replace it and, as a result of a long search, I chose the free Comodo. Now he has been protecting the computer for several years.

Comodo, and everyone admits it, has an awesome firewall. In fact, it alone solves the problem of online security. The antivirus is also excellent, but I prefer not to use it, although it works normally. Instead of an antivirus, I download a scanner from DrWeb called CureIt and check my computer every few months.

Comodo has a huge amount of customization and gives the impression of a very professional (and it is) product. Overall, I like Comodo and am happy with it. It just needs to be configured correctly. I can easily understand any program, so it wasn’t difficult for me to understand Comodo’s settings.

I specially made several screenshots of Comodo for this article, for which I had to go into WinXP, where I have the latest version of Comodo installed, which I haven’t visited for probably six months.

I won’t talk about all the Comodo settings. You can decide for yourself whether to leave any updates, messages, or notifications or not. I will tell you only about the most basic settings, as well as some tricks in these settings.

What to do if your browser is infected? Read about it.

This Comodo differs from the 5th version in its improved and beautiful interface.

In my opinion, despite its beauty, the 5th version is still more convenient. There, all the settings are better grouped and informative.

For example, in the new version of Comodo it is not clear when the anti-virus database was updated; no date. In version 5 this is indicated by the update date.

The settings for anti-virus scanning profiles and exclusions are hidden in such a way that they can only be found if you have a good understanding of the structure of the Comodo interface in previous versions.

More on this below. Although, let's start right there.

As for the antivirus, you can leave the setting to scan the computer's memory at startup. The default option is to scan archives. I always remove it, because there are often tablets in the archives, and the antivirus mercilessly removes them.

As for cumulative scanning, this mode will scan those files that have changed since the previous scan. You can select "Scan on Access". It's up to you to decide. I always choose cumulative scanning.

The American developers, in my opinion, were clever with the list of scans. The fact is that if you do not know how to set up an antivirus, an antivirus scan will occur every time you start your computer. Not everyone needs this and not always. And to disable this automatic scanning, you need to know where to do it. The Comodo developers made this non-obvious for some reason. In general, to set it up as we need, we go to the “List of scans” and there we see the default list, and at the bottom there is a barely noticeable arrow.



This is what we need. We drag it up, the “Add”, “Edit”, etc. windows appear, where we can already do something. We cannot delete default scan list profiles, but we can change them or add our own. In the “Graph” line, set the desired position so that scanning does not start automatically when the system starts. If we need a scan, we can always launch it manually from the main antivirus window by clicking on the “Scan” button.

However, profiles can be configured so that scanning is activated once a week, for example, at night or during the day. The idea itself with a schedule for “Full” or “Quick” scans is good, but it should have been done more clearly, and not hidden far into the depths of the program from the user.

The situation is similar with “Exceptions”. The developers also managed to hide the setting of this extremely important item behind this arrow, which is visible at the bottom of the main window when you go along the path “Antivirus ---> Exceptions”.

We drag this arrow up and a window with actions will appear, thanks to which we can already fully work with exceptions.

We add to the "Exceptions" all those files and folders that, in our opinion, should be ignored by Comodo.

A few words about the Proactive Protection Mode. This is a proprietary feature of Comodo, which they consider almost the main one in protecting your computer. The version we are reviewing has a HIPS setting (Host-based Intrusion Prevention System or simply “intrusion prevention system”). The settings are below on the screen. You can select "Safe Mode". In it, all unknown actions on the computer will be under control. If you know/are sure that there are no viruses on your computer and it is clean, then you can set the “Clean PC” mode. In this mode, all files are recognized as trusted, and we receive fewer alerts from Comodo. I set the settings to "Clean PC".

It is not necessary to use HIPS; you can disable it. But if you use it, then I recommend that you check the box next to “Create rules for secure applications”, specifically highlighted in green. This will make it easier for you to continue interacting with Comodo. It will create rules and once you confirm them, you will not receive messages from Komodo for the same reason.

Well, setting up a firewall, or simply a firewall. Comodo's firewall is one of the best on the market. This is recognized by all specialists and ordinary users. Some people specifically download only the Comodo firewall in order to use it with a third-party antivirus. There is nothing complicated about the settings.

Just like in the screenshot above, be sure to check the box to create rules so as not to receive constant messages from Comodo. The rest is up to you. I set it to "Safe Mode". Even with the default settings, the firewall does its job perfectly.

If you want to make your computer invisible on the network, you can use the Hidden Ports Wizard to enable the mode of blocking all incoming connections and hiding your ports for all incoming connections. But, if you are using a home network, which is most often the case, it is better to activate the alert mode for incoming connections and make a separate decision for each port. For the particularly advanced: in the advanced firewall settings, you can check the boxes everywhere except for NDIS monitoring, other than TCP/IP.

A little about Sandbox mode. This cool thing, if enabled, isolates all unknown files and runs them in itself (sandbox). In this mode, files, if they are dangerous, will not harm the system. Not every paid antivirus has a sandbox. The free Comodo has it. So, take advantage.

You should know that the Sandbox and Protection Plus (Proactive) modes are not required to be activated. Without them, just with an antivirus and a firewall, you can normally secure your system. But the above modes make the protection even more reliable and powerful.

And I would also like to say something about configurations. There are three of them by default. These are: Internet Security, Proactive Security and Firewall Security. For many, these things are incomprehensible, but there is nothing complicated here. These are, in essence, a kind of presets, ready-made presets. Firewall Security gives priority to protection on the network, the activity of the antivirus seems to be reduced: it seems to be working, but it doesn’t seem to be. In general, it is almost invisible and inaudible in this mode. In other modes it’s the same: In Proactive, priority is given to proactive protection; in Internet Security, priority is given to antivirus and network protection. I usually set it to Internet Security. In any mode, if anything, you can tweak the settings to achieve the desired functionality.

As they say, the flight is normal, only the product is paid and after 30 days it will stop working and ask for money. Tell me, is there any free firewall of the same quality?

Hello friends! Today's article is about the popular and free firewall Comodo Firewall.

Security software from the developer company Comodo Group has gained popularity in the software market due to the presence of three important components in software products - a popular field of application, simplicity and convenience of the interface, and free distribution. It is especially worth noting the flexibility of the developers’ approach. Thus, a software package for protecting a computer, consisting of an antivirus, a firewall, a Sandbox and other modules, can be installed either entirely or selectively by installing only individual modules of either the Comodo AntiVirus antivirus or the Comodo Firewall into the system. It is the latter that will be discussed in more detail below. Let's look at the features of the Comodo Firewall, how to install this program and how to configure it.

Tasks and features of Comodo Firewall

Comodo Firewall, despite the fact that the product is free, provides complete protection of your computer from online threats. Moreover, it has more than once become the winner of various tests conducted by Internet software resources in order to identify the best software solution of the Firewall class. Comodo Firewall is able to protect against attacks from hackers and malware spreading over the network at the same level as paid advanced firewalls such as Outpost Firewall Pro. To put it simply, you won’t find software of the same quality and especially free on the market..

Comodo Firewall analyzes suspicious program activity on your computer and checks all of its active components, blocking the launch of anything that could harm your computer. The program's Stealth Mode makes your computer invisible to port scanning by malware. Comodo Firewall automatically detects the trusted zones of your computer, that is, those folders and files that are authorized to be shared over a home or local network.

Unlike its counterpart, which does not work well with every antivirus on the same system, Comodo Firewall is more loyal in this regard. Even if you do not like the specificity or effectiveness of the Comodo AntiVirus antivirus module, you can install any other antivirus, since Comodo Firewall, as a rule, does not conflict with third-party security software.

Several operating modes and flexible settings of Comodo Firewall will allow both beginners and more experienced users to configure the desired behavior of the firewall.

Installing Comodo Firewall

Run the downloaded Comodo Firewall installer.

The installation process is somewhat different from the standard one, since it initially involves setting some parameters for the program. After selecting the program language, we will see the installation wizard window, where you need to select some options. It is not necessary to indicate your email.

You can leave all the preset options without changing anything only in the following cases:

When it comes to a powerful computer or laptop and a high-speed Internet connection;

You fundamentally want to participate in the improvement of security software, in particular Comodo products, so that the company improves user protection;

You don't trust your ISP's DNS.

A window will open with options for installing the program, where the developer, hoping that you will quickly complete the installation and not delve into the installation settings, has prepared, in addition to the Comodo Firewall, the automatic installation of two more programs - this is the technical support client from the developer Comodo GeekBuddy and the browser with enhanced web surfing protection Comodo Dragon. There is no point in contacting the first program for those who do not know English and do not intend to pay for technical support from Comodo at the end of the free period. You can download another program - the Comodo Dragon browser based on Chromium - for free on the Internet and install it at any other convenient time when the question arises about changing the browser.

Now you can safely press the “Forward” button.

In the next window, we are forced to install Yandex elements along the way and the omnipresence of this search engine in the browser. Let's refuse this service, since it can hardly be called a missed opportunity in life. Click the start installation button below.

The program will install. After launching it, we will see that the computer needs to be restarted. Click the “Fix” button.

Launching Comodo Firewall

The computer will reboot, and we will find a lot of Comodo Firewall windows on the desktop - information about Comodo technologies, a program gadget and a firewall pre-settings window, where we need to indicate which network the computer is connected to - home, work or a public network location, for example, with a Wi-Fi access point.

After this, Comodo Firewall will minimize to the system tray, from where the program interface can be called up at any time.

For any actions performed on the computer for which the firewall has not yet created a rule, you need to give it approval, unless, of course, we are talking about an unauthorized launch.

You will have to approve the launch of every program unknown to Comodo Firewall on your computer until the firewall develops rules of conduct for each of the programs launched. Of course, at first you will have to tinker, but this is actually a small price to pay for the ability to control network connections.

Setting up Comodo Firewall

Comodo Firewall is designed for a wide range of users, including beginners, and the computer will be safe even with the settings preset by the developer. But more experienced users will certainly be interested in using the capabilities of Comodo Firewall for enhanced computer protection.

We launch the firewall using its shortcut in the system tray. In the main window that opens in front of us, we see the program status - the computer is protected. We also see the number of network intrusions, the number of blocked intrusions, and software updates.

Using the button in the upper left corner, we can switch to the program displaying a detailed summary. And then return to the summary view again.

In the main window of Comodo Firewall there is a "Game Mode" option. Game mode is essentially a full-screen mode not only in games, but also when watching videos, as well as in any other applications that are displayed in full screen. When we switch to this mode, the firewall will not bother us with its notifications and will make all decisions itself.

To open advanced firewall settings, in the main Comodo Firewall window with a detailed summary, click the “Firewall” link.

Detailed firewall settings will open, where you can change certain preset parameters.

You can, for example, at the top of the settings window, change the preset “Safe Mode” of the firewall, when the network activity of programs in the list of trusted ones is allowed, and Comodo Firewall does not jerk on every occasion, to other modes. For example:

“Full blocking” - in this mode, any network activity is excluded. This mode is simply irreplaceable if your computer is infected with a virus.

“Custom set of rules” - as the name of the mode implies, it provides for strict control and user participation in decision-making for each network request for which there are no previously defined rules.

“Learning mode” - in this case, Comodo Firewall does not interfere with the activity of running programs, but only monitors events.

Comodo Internet Security (CIS)- this is an antivirus + firewall. Comodo Internet Security also has a SandBox (sandbox), in which you can run applications so that they do not affect the system (in an isolated environment). It is possible to filter all traffic through Comodo's DNS servers, minimizing the threat of viruses and malicious sites. There is a virtual desktop, in the virtual desktop you can safely run programs and surf the Internet, and it also protects against keyloggers. You can use tablet mode and Windows desktop mode.

There is also an intrusion prevention system called HIPS (Host-based Intrusion Prevention System), which analyzes the behavior of programs.

Comodo Internet Security (CIS) is the best free antivirus and firewall.

Download Comodo Internet Security available on the official website comodorus.ru/free_versions/detal/comodo_free/8.

During installation, the program can also be installed:

- Comodo Dragon(enhanced security Internet browser from Comodo). I did it earlier.
- Comodo Antivirus(antivirus)
- Comodo Firewall(firewall)
- Comodo Geekbuddy This is a shareware service (limited 60 days). It works on the principle of 24/7 technical support. Communication takes place using the Internet messenger built into the program)

You can choose what to install and what not to install during the installation process of the program package.

So let's start installing Comodo Internet Security. We launch the installer and the files for installation begin unpacking.

If User Account Control comes up with a question: should I allow the following program to make changes on this computer? Click yes.

Select the installation language for Comodo Internet Security Premium and click OK.

You can enter your email address (optional).

You can check the box " I want to provide additional security on the Internet by switching to COMODO Secure DNS service, minimizing the threat of viruses and malicious sites so that all requests are filtered and processed on Comodo servers and malicious sites are blocked and other threats do not reach you.”

You can check the box “I want to use Cloud Application Behavior Analysis, transferring unidentified programs to COMODO, subject to the terms of the Privacy Policy.”

You can check the box “Anonymously send application usage data (configuration information, crashes, errors, etc.) to COMODO to make changes that improve the operation of the program.”

Push forward.

Uncheck the following items:

Install Yandex elements
- make Yandex the home page (applies to all supported browsers)
- make Yandex the default search engine (applies to all supported browsers)

Click agree. install.

The installation of Comodo Internet Security Premium begins. The Comodo Dragon browser is installed first.

The installation of Comodo Internet Security Premium then begins.

After installing Comodo Internet Security Premium, the Comodo Internet Security Premium widget appears on the Windows desktop, which shows system security, Internet speed, and quick launch of Internet browsers.

When you first launch Comodo Internet Security Premium, it scans your computer for threats.

You can stop it or continue scanning in the background (which will take longer to scan but use fewer resources and put less strain on your computer). This is called a hidden task - a task that requires fewer resources to complete than an active task.

This is what the main window of Comodo Internet Security Premium looks like.

This window will also pop up with a brief description of the Viruscope, content filter, and GeekBuddy programs. Check the box at the bottom left to not show this window again and close it.

Network detected. Please indicate your location:

I am at home. Select if you have connected your computer to your home local network
- I am at work. Select if you have connected your computer to an office LAN
- I'm in a public place. Select if you are in a public place, such as a cafe, hotel, school, etc.

I chose I am in a public place.

By clicking on the tasks at the top right, we will switch to tasks.

You can switch back by clicking on the main window.

In Tasks, you can enter Firewall Tasks and select advanced settings to configure various aspects of the firewall.

Firewall settings. You can enable or disable the firewall and select its operating mode. Do not show alerts, automatically detect private networks, show alerts, trustconnect, show animation on the CIS icon in the notification area, create rules for secure applications, configure alert frequency level, display alert time on screen, enable IPv6 traffic filtering, block fragmented IP traffic, analyze the protocol.

Global rules.

The following global rules are active on this computer:

Allow IP Outgoing from MAC Any to MAC Any
- allow ICMPv4 Incoming from MAC Any to MAC Any
- block IP Incoming from MAC Any to MAC Any

You can add a new firewall rule.

Sets of rules.

Here you can configure which sets of rules are used on this computer.

Content filter.

This option configures the firewall to filter access to sites in accordance with the rules and profiles specified below.

Antivirus monitoring.

Perform real-time scanning (recommended).
Continuous anti-virus monitoring is carried out in parallel with the execution of user tasks.

Form a cache if the computer is in standby mode, scan the memory when the computer starts, do not show alerts, unzip and scan files: .jar, .exe, configure the level of heuristic analysis, search for potentially unwanted applications.

Interface.

You can change the interface to Classic Theme, Tile Theme, Modern Theme. Also show notifications from the COMODO message center, show informational messages, show a greeting on startup, show a widget on the desktop, show informational messages when task windows are minimized or tasks are running in the background, accompany notifications with a sound signal, protect settings with a password.

Updates.

Check for program updates.

Automatically download program updates. If the option is enabled, program updates will be downloaded automatically. When to install them is up to you to decide. Check for anti-virus database updates every 6 hours.

Do not check for updates if these connections are used.

Do not check for updates when running on battery power.

Proxy server settings.

Configuration.

In this section you can import and export configurations, as well as change the current configuration.

Types of scanning.

On this page you can add, delete or edit scan profiles and schedules.

Protected objects.

Objects protected on this computer.

Here you can add a folder or file that needs to be protected from changes that are not made by you, as well as from intrusions by other programs.

Use cloud verification (recommended) so that the file is checked against the database in the cloud. Perform cloud-based analysis of unknown files, allowing you to get quick results and save computer resources. Trust applications signed by trusted providers. Trust applications installed using trusted installers.

The Comodo Internet Security widget on the desktop can be disabled, or a brief summary can be provided, and links to browsers and social networks can also be included. networks and for the widget to show your Internet traffic.

In Comodo Internet Security Premium, you can enable a virtual desktop to surf the Internet safely, for example, without fear that someone will steal your password, or run a virus to test its effect without harming the system, or run an application that will not affect your system in any way. system, but only operate within the virtual desktop.

To use the virtual desktop you need to download and install Microsoft Silverlight. Click yes to begin the download and installation.

Click agree. Install.

Microsoft Silverlight 5.1 is loading.

The virtual desktop is loading.

You can return to Windows again.

You can go to settings...

and change the virtual desktop mode from a tablet PC to a regular PC.

You can freely use the Comodo virtual machine.

Launching in Sanbox is needed in order to isolate the application from the system.

You can clean your computer of viruses and threats with Comodo Cleaning Essentials.

With Comodo Cleaning Essentials, you can start scanning and detect and remove viruses, rootkits, hidden files and malicious items in the system registry.

Checking the MBR (Windows boot area).

A reboot is required to complete the scan.

You can view activity and monitor ongoing processes using Comodo Killswitch.

Allow User Account Control to take action by clicking Yes.

Click agree. Install to download and install Comodo Killswitch.

Comodo Killswitch is loading.

Comodo Killswitch application initialization.

In Comodo Killswitch you can see the activity of all processes in the system and stop them if they seem suspicious and unnecessary to you, and also find an application that is eating up a lot of system resources. You can also see how busy the CPU is and see which application is consuming Internet traffic.

How to find something forbidden in tor

Comodo Personal Firewall designed to protect PC users running Windows OS. It is extremely easy to use and provides all the necessary features and functions. The most important thing is that it “flies” even on the most low-power computers. Another important advantage, especially for beginners, is that it requires minimal intervention from the user.

Why use our Firewall?

Comodo Firewall Pro introduces a new evolution in computer security: Disabled Blocking of Trusted Applications (DDP). What is DDP? Most security programs maintain a list of known malware, and use this list to decide which files and applications should not gain access to the PC. The problem here is obvious. What if the malware list is missing some entries, or is not up to date? DDP eliminates this problem to ensure complete security. Firewall links to a list of over two million known PC-friendly applications. If a file that is not found in the Safe List “knocks” at the “door” on the computer, the Firewall immediately warns about the possibility of a malware attack. All this happens before malware infects the computer. This is prevention-based security, the only way to maintain complete security.


Firewall Features:
  • Easy to understand informative alerts
  • No complex configuration issues - ideal for novice users
  • Lots of configuration options, let the techies configure everything the way they like :)
  • Security DDP, user-informative and PC-safe
  • Quickly adapt users to personalized protection
  • Convenient, attractive graphical interface

One of the first steps in securing your computer is downloading and activating a quality firewall to repel intrusions. Only this free firewall software has access to Comodo, a huge list of PC-friendly applications, a "deny by default" component

Comodo Firewall recognizes more than ten thousand different applications (secure, spyware, adware and others), which is a unique feature unique to this firewall.
Key features of Comodo Firewall Pro
monitoring program components;
program behavior analyzer;
against protocols;
smart alerts;
integration into Windows Security Center;
critical termination protection;
protection during computer boot;
automatic update;
error reporting interface;
detailed journal;
connection monitor;
program database - more than 13,000 programs with their security risks.

A description of the program can be found

Installing Comodo Personal Firewall Pro.
Download the program from the official website.











Attention! Be sure to uncheck “install” and do not check “install COMODO LivePC...”.






installation completed successfully! Restart your computer.

First start.
When you restart your computer, Comodo Firewall will automatically replace the standard Windows firewall. If after the first launch you do not see any shortcuts on the desktop, just reboot again. The program needs to be “taught” which programs you allow to run and which ones you do not. If you are an inexperienced user, then I recommend “not to be clever” but to allow everything (of course, reading the program’s recommendations), for example:

Set the mode to “training”. To do this, right-click the firewall icon in the panel (bottom right of the screen) and select “firewall mode” and then “training” from the menu.

Now the program will remember all your actions, and after training, your actions will no longer be accompanied by the opening of permission confirmation windows.
You can familiarize yourself with the functions of the program. To do this, double-click on the program icon. It’s not particularly difficult to figure it out, but you don’t have to go into it. Just leave all settings unchanged. Once again, the program requires only minimal user intervention.

Leave your comment!

Firewall Comodo Firewall from version 3.5 it is part of the free comprehensive protection of Comodo Internet Security and can be installed as a separate component.

Comodo Firewall is designed to protect users of PCs running Windows OS; its capabilities are practically not inferior to similar products, including some commercial developments.

The interface is extremely simplified, but at the same time provides all the necessary features and functions.

Main components of Comodo Firewall

Key features of Comodo Firewall

Multifunctional firewall - firewall

Comodo Firewall provides a high level of protection against incoming and outgoing threats. This way, you get the most effective protection against hackers, malware, and identity theft. Now the firewall has been improved by adding new features:

  • Stealth Mode to make your computer completely invisible to port scanning;
  • Automatic detection of trusted zones based on a wizard;
  • Predefined firewall policies allow you to quickly apply the necessary security rules;
  • Diagnostics to analyze the system for possible conflicts with the firewall and much more.

Behavior blocker

  • Checking the integrity of each program before allowing it to be loaded into the computer's memory;
  • Performs cloud-based behavior analysis for immediate detection of malware;
  • Warns you every time unknown or untrusted applications try to launch or install;
  • Blocks viruses, Trojans and spyware before they can gain access to your system;
  • Prevents unauthorized modification of critical system files and Windows registry entries;
  • Includes an automatic sandboxing feature that completely isolates untrusted files from the rest of the computer

HIPS Intrusion Prevention System

  • Virtually impenetrable protection against rootkits, process injection, keyloggers and other zero-day threats.
  • Comodo's free firewall monitors the activity of all applications and processes on your computer and allows files and processes to run if they comply with prevailing security rules.
  • Blocks malware activity by stopping any activity that could damage the operating system, system memory, registry, or personal data.
  • Enables advanced users to enhance their security controls by quickly creating custom policies and rule sets using an easy-to-use and powerful rules interface.

Virtual kiosk

  • A virtual sandbox environment for running programs and surfing the Internet, isolated from your real computer. Applications and web browsers run inside the kiosk without leaving cookies or history on the real system, making it a secure environment for online banking and online shopping.
  • Prevents viruses, rootkits and spyware from being installed on your computer from malicious websites and provides protection against hacking.
  • Includes a virtual keyboard that allows the user to securely enter credit card numbers and passwords without fear of keyloggers.
  • The virtual kiosk in Comodo Firewall allows advanced users to run beta programs in an isolated environment that will not disrupt the stability or file structure of the real system.

Viruscope

This is a system that allows you to dynamically analyze the behavior of running processes and record their activity. Viruscope monitors the activities of processes running on your computer and alerts you if they try to perform suspicious activities.

Internet Security Essentials

The SSL certificate verification tool protects against fake (phishing) sites that try to steal sensitive information.