Contacts

Installing and configuring programs (Overview): Firewall (Firewall) Comodo Firewall. Optimal Comodo Internet Security Settings Why Windows 10 blocks the Firevol Installation

Farwall Comodo Firewall 3.5 included in the comprehensive protection of Comodo Internet Security and can be installed as a separate component.

Comodo Firewall is designed to protect PC users running Windows, it is practically not inferior in its capabilities, including individual commercial developments.

The interface is extremely simplified, but at the same time provides all the necessary features and functions.

Basic Components Comodo Firewall

COMODO Firewall

Multifunctional Firewall - Network Screen

Comodo Firewall provides a high level of protection against incoming and outgoing threats. Thus, you get the most efficient protection against hackers, malware and theft of personal data. Now the firewall has been improved by adding new features:

  • Stealth Mode mode to make your computer completely invisible to scan ports;
  • Automatic determination of trusted zones based on a wizard;
  • Predefined firewall policies allow you to quickly apply the necessary security rules;
  • Diagnostics for analyzing the system for possible conflicts with firewall and much more.

Behantic blocker

  • Checking the integrity of each program before allowing its download to the computer's memory;
  • Performs a "cloud" analysis of behavior for immediate detection of malicious programs;
  • Warns you every time unknown or unreliable applications try to start or install;
  • Blocks viruses, trojans and spyware before they can access your system;
  • Prevents unauthorized changes in critical system files and Windows registry entries;
  • Includes automatic sandbox function that completely isolates unreliable files from the rest of the computer.

HIPS intrusion prevention system

  • Practically impenetrable protection against rootkits, introduction into processes, keyloggers and other threats of the "zero day".
  • Free Farwal Comodo controls the activities of all applications and processes on your computer and allows you to start files and processes if they comply with the prevailing safety rules.
  • Blocks malware activities by terminating any actions that can damage the operating system, system memory, registry or personal data.
  • Allows you to experience experienced users by quickly creating user policies and sets of rules using a convenient and powerful rules interface.

Virtual kiosk

  • Virtual Wednesday "Sandbox" to launch programs and work on the Internet, isolated from your real computer. Applications and web browsers work inside the kiosk, not leaving cookies or history on the real system, which makes it a secure environment for Internet banking and online stores.
  • Prevents installations from malicious websites of viruses, rootkits and spyware on a computer and provides protection against hacking.
  • Includes a virtual keyboard that allows the user to safely enter credit card numbers and passwords, without fearing programs for intercepting entered data (keyloggers).
  • A virtual Kiosk in Comodo Firewall allows you to run the Beta version of programs in an isolated medium that does not break the stability or file structure of the real system.

Viruscope.

This is a system that allows you to conduct a dynamic analysis of the behavior of running processes and record their activity. Viruscope controls the activity of processes running on your computer and warns you if they are trying to perform suspicious actions.

Internet Security Essentials.

SSL certificate verification tool protects from fake (phishing) sites that are trying to steal confidential information.

This lesson is a continuation of the article: Network screen.

So, we found and downloaded the latest version of Comodo Firewall. Only one firewall can be installed on the computer. Therefore, in order to avoid inter-program conflicts, the embedded Windows firewall must be disconnected. How to turn off Windows XP and Wiindows 7 firewall, you can see in previous lessons: and. But when we install Comodo Firewall, this is not necessary. The firewall installation wizard will turn off the built-in Windows Firewall.

The firewall controls application attempts to exchange data on the network. The illustration shows how the firewall intercepted the Nokia phone software attempt to enter the Internet. This is the desired application, so click the "Allow" button:

One of the first to be allowed to allow the connection with the system components "Windows ALG.EXE" and "svchost.exe". They are needed for fostering to the network. After installation, Comodo Firewall will again and re-set alerts for various programs. If we know the application, allow the connection request. If there is doubt and the program seems suspicious, press the "Block" button. Noting the check box Check box "Remember My Choice", we fix our choice for this application. And the next time you connect the alert window for this program will not appear. It is necessary to act neat. Allow connections and consolidate the selection can only be magnificent programs. If you click on the name of the application, the Program Properties window will open.

Also, the firewall notifies the incoming connections:

The following illustration shows how Comodo Firewall intercepted the incoming package for the popular client of the peerge networks:

First, the alerts of the firewall are somewhat bored. But we make our choice and over time they are becoming less and less.

Malignant programs can be masked for harmless software to deceive the firewall and get permission to connect. Therefore, you need to regularly scan the machine with an antivirus program. You can read more about the choice and work of antivirus.

We turn, now, to the Faervol settings.

Open Comodo Firewall, like any other application, double click on the icon on the desktop or on the icon in the notification area. The main window of the program with the open tab "Summia" appears:


Here reflects traffic information and system status. By clicking on the numbers of the connections, you can see detailed data of active network connections. Pressing the "Stop all connections" button will stop any network activity. You can apply this function in the case of inadequate behavior of the system - suspicion of interference with the work of programs. For example, the system is long freezing and does not respond. This may be a consequence of the network activity of any malicious application. By blocking traffic, you can find out the reason and determine the program representing a threat. All connections are turned on by pressing the same button "Restore all connections".

Firewall mode You can change by opening the drop-down list with the "Safe Mode" button.

"Block all" - a mode that does not allow any network activity - the "Stop all connections" buttons.

"Custom Policy" is a hard mode in which the network screen will display an alert for each program connecting with the Internet. Here, it is necessary to create program policies yourself - clearly understand what applications can be resolved.

"Safe Mode" is set by default and is universal. The firewall applies user policies - performs the user settings for individual programs, and also itself allows the network exchange of applications that it considers secure. Alerts will be a little and the firewall will not distract much.

"Training Mode" appoint when you need to watch various applications without interfering with their work. Here, Comodo Firewall independently defines the policy policies without outputing any alerts.

In the "inactive" mode, the network screen is turned off. It is necessary to turn off the firewall in the case of an explicit inter-program conflict, for example, with an anti-virus program or other network screen.

On the next tab, the firewall settings are located. "Log of Firevola Events" - "Log" reflects all events - firewall reactions on network activity of various programs.

"Add Trustee" allows you to select the desired application and add it to the permitted.

"Add a blocked application", on the contrary, makes it possible to add the selected application to the forbidden to connect.

The "Network Security Policies" section opens a window where you can choose one of the pre-installed policies for applications or create your own.

In the Active Network Connections window, programs show currently network activity.

"Master of Hidden Ports" - you can hide certain ports with these settings and make the computer invisible in the selected networks.

"Faervola Settings" is a window for selecting a working mode that duplicates the drop-down list on the Summary tab. Also, install the slider "Safe Mode" and set the checkbox in the check box "Create rules for secure applications":


The following "Protection +" tab is located proactive protection control functions. When installing a firewall, proactive protection is activated by default. Protective protection is another layer of protection that controls the behavior of programs and preventing the system to infection. Settings for proactive protection, mostly similar to the installation of the firewall.

The item "Run the program in Sandbox" makes it possible to launch a dubious application in a kind of sandbox. Working isolated in this protected area, a malicious program will not be able to harm the system:


The "Proactive Protection Settings" item opens up the operation mode of proactive protection. And, in short, let's go through these settings.

The "paranoid" mode implies paranoid suspicion of protection against any network activity. Protective protection will give an alert for each attempt to establish a connection.

In safe mode, protection applies policies installed by the user, and also permits the performance of applications that consider secure.

In the "Pure PC" mode, protection certainly trusts all the programs installed on the computer and requests permissions on connections only for newly installed applications.

"Training Mode". In this mode, protection does not give any alerts and monitors independently.

"Protection is disabled." In this mode, proactive protection is disabled. Disable protection is not worth it. The optimal solution will be setting protection to safe mode.

The "Miscellaneous" tab contains additional firewall settings. They can be viewed alone. Review, and so it turned out volumetric. The main thing is that Comodo Firewall, it is very reliable, flexible in management, Russian-speaking and free network screen. Comodo Firewall in conjunction with a good antivirus program will provide a comfortable and safe operation on the network.

Details, about work and the choice of antivirus program read.

Instructions for installing Comodo Firewall on a PC with Windows OS.

1. At the very beginning of the installation, you must select the Russian language from the list of proposed, to understand the complex program settings.

2. In the next dialog box, remove the options for additional functions and do not enter the email address.
In addition, you need to click on the "Configure Upgrade" button and spend some manipulations.

3. In the upgrade settings, remove the checkbox from Geek Buddy and Dragon Web Browser.

Geek Buddy. - Excessive reason to smile, if you know English and can translate this expression. This is a small application "for Lamers", which will provide you with a 60-day free help from the technical support of this firewall.

This means that when any questions occur - you can safely write \\ call in the United States and consult in English with their team.

Since we are also well done, and you can ask questions on our site site - we will not use this opportunity :-)

Dragon Web Browser. - This is a browser that provides allegedly secure surfing network.
In fact, we do not need it, because the safety of surfing will be satisfied with the Farwall, so we remove the daw from this point.

Click "Back" -\u003e "I agree. Install "and start installing a firewall.

4. After some time, the program will ask to restart the computer. We save all open documents and click "Yes."

5. As soon as the computer will be rebooted, the program will automatically mean you with your products and capabilities.
To avoid this case in the future, we set the tick on the contrary "no longer show this window" and close it.

Adjust the firewall.

1. After installing Commodo, the firewall will begin to complain that some applications climb on the Internet update. In this regard, you can either allow them to do it or ban.

Your choice will be permanent and the system will remember it, i.e. If you prohibit \\ Allow some application update, after rebooting the computer
The commodo will automatically block \\ give it the ability to update without notice.

If you eventually want to change the anger to mercy and block \\ Allow the connection of a specific program from the Internet, we will later consider how to do it manually.

2. The main thing in setting up any firewall make sure that its work for you is inconspicuous, but in parallel with this he reliably protected your PC from external threats.
To do this, follow:

    we travel to the desktop and click on Firewall in the place where the inscription "safe" (there may be some other inscription).
    The full-fledged program menu opens.

    Go to "Tasks".

    Select "Firevola Tasks". At this point, you can enable the connection to certain programs with the Internet to update their bases.

    If you are confident in the app and know that it climbs into a worldwide web for new bases - then click on the "Allow Connection" button, then select the application file to which you want to open access to the network and click Open.

All other settings can be left by default.

The developers of this application have already worked on to make protection against attacks and the use of the firewall convenient for users.

We thank it and provide instructions how to configure the Comodo firewall for maximum protection.

Introduction

According to these settings, I would like to note that, despite their "maximality", work at the computer does not deliver special paranoid - everything is quite moderately: once creating the rules for the program / application, requests no longer arrive for configured programs. It is clear that this mode is more suitable for experienced users.

The second point - testing was carried out, as in a pair with avast! Free Antivirus. And without him. The result was noted, was 100% in both cases (despite the fact that there is antivirus Avast!, And without it, Comodo's firewall passed all the tests per 100% on these settings).

Moreover, when Avast is enabled! And using data settings for Comodo Firewall - Antivirus simply does not have time to enter work, since the entire blocking is performed by Comodo Firewall.

In addition, in the PC Security Test 2011 test, Comodo Firewall blocked the first stage of the test "AntiVirus Protection Test", closing the ability to accommodate virus files in the system, although in fact it is the operation of the anti-virus (for example, in the ONLINE ARMOR + AVAST bundle! This work on The passage of the first part of this test performs Avast!).

As a result, Comodo Firewall, so to speak, does not allow the antivirus, as it simply blocks the possibility of penetrating viruses into the system. Those. It can be noted that the Comodo Firewall reaction at the threat is very fast (although it is clear that this is synthetic). However, PC Secutity Test is 100% (as well as the other tests passed) I did not have any other product from many vendors (such as, Kaspersky Internet Security, Norton Internet Security, EmsiSoft Internet Security, McAfee Internet Security, BitDefender Internet Security, Avast! Internet Security, etc.). I think that at least it is synthetics, but still very significant.

The system used in testing settings: Windows 7 Pro 64-bit SP1, 1.65 GHz Dual-Core AMD processor, 4GB memory (3.6 GB is available).

With these settings in Proactive Security Comodo Firewall, the result of 100% synthetic tests such as:

1) Anti-Test
2) PC Security Test 2011
3) PCFlank Leaktest
4) CLT.
5) SSS
6) FirewallTest
7) MINI Security Test

COMODO Firewall 2013 settings

1. Advanced Settings -\u003e General Settings -\u003e Configuration


2. Advanced Settings -\u003e Security Settings -\u003e Protection + -\u003e HIPS -\u003e Behavioral Analysis

Take a tick with "Automatically run in the Sandbox detected unknown application and process it as"


Click to enlarge image

3. Advanced Settings -\u003e Security Settings -\u003e Firewall -\u003e Faervola Settings

We translate the firewall to the "Custom Set of Rule" mode so that a request appears on any network event in the system to install your own rules manually.

In the "Advanced Settings" field, we set all the ticks opposite:
- Enable IPv6-traffic filtering
- Enable LOOPBACK-traffic filtering (for example, 127.x.x.x, :: 1)
- block fragmented IP traffic
- Analyze the protocol
- Include protection from ARP spoofing


Click to enlarge image

4. Advanced Settings -\u003e Security Settings -\u003e Firewall -\u003e Global Rules


Click to enlarge image

5. Advanced Settings -\u003e Security Settings -\u003e File Rating -\u003e File Rating Settings

Trust applications signed by trusted suppliers
- trust applications established by the help of trusted installers


Click to enlarge image



Did you like the article? Share it