As far as I understood, msctf.dll is a “windows text service” that has to do with the language bar. The problem is, that Defense+ is reporting nearly every program that it wants to install that (see screenshot in attachment).
Is there any way I can allow that particular action for all applications?
I’ve added msctf.dll to “my safe files” list, but it didn’t help; I guess the list is intended just for executables, not files they’re accessing.
I can workaround that by selecting “Turn off advanced text services” in language bar settings, but then the language bar itself closes, which is not what I want.
I’ve found the settings you’ve referred to and added “%windir%\SysWOW64\msctf.dll”. Now it seems to be working as expected (although, from my understanding system23 and SysWOW64 folders are actually same)
I know it’s a common Microsoft file, was just wondering if it’s capable doing any harm in wrong hands, i.e. if some evil app tries to use it, cause I’m allowing any application to use it and it wasn’t in the list by default.
It’s a safe file - If an “Evil” File tries to perform a malacious action to, or use it - it will become a different application and Comodo will recognize the modification.
The “All Applications” policy is located in the “Computer Security Policy”
From the main interface go to Defence+/Advanced/Computer security policy
Scroll down the list and you will see an entry for Comodo Internet Security->Below that should be an entry %windir%\explorer.exe then below that %windir%\system32\rundll32.exe
Underneath that is an entry called “All Applications” which should have a custom policy and a branch with a * coming of it.
Double left click on the “All Applications” entry and a new window will appear, click on “Access rights” where you will get the ability to add things to the allowed list for each action.
To add an entry for Global hooks click on “Modify” next to it then on Add then Browse. Now find the entry you wish to add and APPLY to close all windows.
Added a few pics to help.