We are happy to announce release of Comodo Cloud Antivirus v1.11.417572.505.
The primary goal of this release has been to be able to detect crashes in the wild and have them reported. This will allow us to provide even more stable product in future releases that works for all.
Following are changes:
1. Microsoft Edge Browser Support in Sandbox: Edge browser is now fully supported in Sandbox for all versions of Windows 10, including latest creators update.
2. Crash Reporting: Comodo Cloud Antivirus will detect crash of one of it’s applications and offer user to upload crash and other diagnostic data by showing dialog as shown in enclosed snap Crash_Reporting.png
3. Improved Potentially Unwanted Applications (PUA) Detection: We have created a back-end infrastructure that is analyzing domains in the wild and able to classify some of domains as PUA domains, which are short lived and mainly generate PUA files. You will see such detection via that cloud driven heuristic as shown in enclosed snap: PUA_Detection.png
4- Copy any shortcuts created by Sandboxed applications to my desktop: This check box is present under Sandbox settings. This feature has been enabled by default. Now you have a control over this and can de-select if you don’t want that default behavior.
5. Controlling Network Activity of Sandboxed Applications: As a first towards providing some form of network control over applications running in Sandbox, we have introduced following two check boxes under Sandbox settings:
- Block incoming connections to Sandboxed applications
- Block outgoing connections from Sandboxed applications
These are disabled by default and best suited for Advanced users at the moment:
Above options are confined to TCP traffic only and thus focusing on controlling data oriented network traffic only.
So other protocols like UDP/ICMP, are still allowed.
In next sprints, based on feedback, we will be aiming:
- To cover all protocols
- Allowing applications based exclusions
- Creating Advanced installation option where user can change these defaults
This is without introducing network Firewall and still letting Advanced users control to some extent network activities of Sandboxed applications.
Aim has been to keep things light and still provide a degree of control.
6 - “Ask for Unknown Applications” setting in Sandbox was not working as expected in Windows 10 Creators update, as had been reported in below post:
7 - Sometime setups couldn’t be cancelled in Sandbox as reported here.
You should be able to cancel now. Please report if you still come across cases where setup can’t be cancelled.
8 - Sandbox alert layout has been changed as per following wishlist item, thanks BlueTesta:
9 - Jump to Folder: When you see file path listing, this option was not available in some of places e.g. “Being Analyzed” section, now you should see it across all places.
Size: 8.71 MB (9,138,496 bytes)
We will be releasing updates to existing users next week.
Thank you very much for all your feedback during Beta testing.
As always, your feedback is extremely valuable to shape this product further, where we have been making it fastest, lightest and simplest endpoint protection with default deny and direct valkyrie integration.