Thank you sirio for the post. I looked at the images you provided. It seems that you were not actually using the special Installation Mode though, because the whole purpose of Installation Mode is the suppression of alerts for installers, yet your images show that many alerts occurred. By the way, I have tried v3.8 in a virtual machine, so I did get to see its default configuration.
I have made an error, I have told you that the configuration of CIS was that of default, it is not really this way: from the v3.5 in CIS have been add more configurations for the various demands

, the active configuration after the installation is the
COMODO - Internet Security (
2), however with this configuration some of the options of D+ are disabled, to have D+ at the most of its potentialities needs to pass to the
COMODO Proactive Security (
3).
The approach I have outlined is geared more towards prevention of malware execution in the first place than detection within CIS itself of malware that has or is executing, although my approach has some detection capabilities as well. Malware that isn't allowed to execute cannot harm you. My approach also hopefully prevents the installation of rootkits by malware that has already executed, via device driver installation detection. Behavioral blockers such as ThreatFire can do an excellent job of detecting malware that is already running, and thus I recommend using one with my approach. Running NIS Filecheck, Autoruns, What's Running, and HijackThis as described in a prior post serves as a detection mechanism of malware that has already executed. On-demand antivirus scanning is another detection mechanism; I recommend Avira Antivir and Avast for free antivirus. On-demand anti-rootkit scanning is yet another detection mechanism; I recommend Panda Anti-rootkit, Rootkit Unhooker, GMER, and RootRepeal for anti-rootkit scanners.
Right, however for me it is a contradiction to limit D+ and then to have to install other softwares to cover the lacks gotten modifying the policy.
Regards,
sirio.
