I see nearly all (or all) of my HIPS rules have “Inactive” set on protection settings, meaning from my understanding that Comodo only detects the “outbound” (if you can call it that) from an application but never the inbound (Which in most cases would be handled by the outbound configuration).
Are there any documents with suggested setup for the “Inbound” protection settings used.
Say for example setting “Process Termination” on TASKMGR.EXe to Actively protected with an exclusion from “TAskMgr” itself?
I see these rules also only allow “Active” or “Inactive” with no ‘ask’ implementation so it can learn as you go along. Which I would think could be highly dangerous if activated for Windows system processes and applications unless they have their configured list of allowed appliations already.
Is there anywhere that documents this in more detail and provide sample configurations and explain why it doesn’t seem to be used much in default rulesets (can they even set it?).
I’m thinking a Ruleset with “Core Windows Files” should have the applications already defined as a group and have both inbound/outbound protections set or would that cause performance issues, potential errors and or be unfeasible or pointless?
Basically what I want to know is.
- Should I use it
- On which application should I use it
and 2b How should they be configured
Cheers ![]()
Scenarios I think this could be usefull is say you allow one of the many gaming rootkits to spy on you when you play a game, you might give them “Interprocess Memory Access” to *, but then you might say on Thunderbird that the protection setting for Memory access is Active and only Thunderbird itself is allowed to access it (or is that a default rule, so all the thousand of Electron and other application packages will function without being explicitly configured to allow themselves to read their own memory). (and many other scenarios). (otoh, since they are rootkits perhaps they bypass Comodo anyway since they are both in ring 0?).
Speaking of which, would it be possible to block specific os/win calls, so an application can use all functions but those that enumerate a list of all running processes, list mutexes, or similar. Or are there tools that do this?
