Because all inbound connections are blocked by default, I would like to see an option that would alert the user that an inbound connection is being made. Are there reasons why the Network Monitor does not prompt (unlike Application Monitor) for inbound connections?
My request would be to make it more informative. By that I mean, the most frustrating experience when it comes to firewalls has been ānot knowingā what applications/services connecting and most of all I donāt know if I should allow or deny all these alerts about all the āapplication behavior analysisā protections. I just donāt have enough expertise to know which dll or parent programs for example is safe to allow and which ones is bad. I am more then willing to read and learn, so maybe provide link within the alert menu to comodo site where it gives description of that file/service/dll/process and etc. So instead of just pressing allow or deny like right now when weāre not 100% sure what weāre doing, we will be educated about what weāre doing.
if i let the firewall allert me for port IP application (i think the maximum alert level)
it display a IP in the alert⦠this should be as a link to a good WhoIs site wich can give more information about the specific IP something like here http://www.ip-plus.net/tools/whois_set.en.html
also maybe the same with ports like here http://www.auditmypc.com/freescan/portsearch.asp
I would like to do more specific zones i.e. #Zone A
#ā¦192.168.0.1-192.168.0.10, 192.168.0.20, 192.168.0.30, 192.168.0.40-192.168.0.50
Maybe Applicationmonitor can de done with a treeView for each Application
there should be a usermode and a passwordsaved adminmode, and it should be possible to block users fom setting static rules
sometimes if i block something nonStatic i have to restart the PC to get it unblocked again, this should be refreshable without rebooting, something licke clear-cache
maybe its possible to definie optional some settings in alert-popup, things licke zone or anyPort or allowAllForApp or maybe like in some other firewals āact as a serverā whatever it means" :SMLR
I would like to see all of the Network Monitor default rules have the āCreate an alert if this rule is firedā checked when the firewall is installed. This would give log entries for troubleshooting. purposes.
Here I am with another suggestion, selfcreated groups for Application Control Rules, so under one ony app Path item all the sub parent apps could appear.
I am not sure if this is worded differently on your list or not, but I put it on here: I like the āinternet lockā like ZA has. It would be a timer that blocks all after a designated period of inactivity. I suppose it would be nice if rules could be added to allow certain programs inbound/outbound connections for updates that run overnight. An internet lock feature would be a nice security addition, especially for those who have computers that are always connected to the internet.
I have not seen this feature in wishlist, but it would be very nice - allow to edit rule for new application before apply it.
For example, if I see popuped question, that application āABCā initialize outside connection to 10.1.1.1/UDP:53, I want to edit it right there, to allow any IP address/UDP:53. In current version I have to go to config window, find rule and edit itā¦
Currently in Registry, this leads to increased Reg Size and slows down entire computer.
Propose to store in a file, preferable text like CyberArmor, in a table format (e.g., comma delimited).
2. A change in way the log file is stored:
Currently in either binary or unicode(?) format. (Displays a lot of square boxes with the text.)
Propose to store in a file, preferable text, in a table format (e.g., comma delimited).
3. Log file should include DNS Name of IP Addresses.
IP assignments may change, so Name time of connection is nice.
WHY?
These two suggestions will allow easy manipulation of the rules in a text editor/spreadsheet/database, etc.
Also, #2 allows easily mining the logs to identify new rules, etc.
My default install is to block everything and only allow as needed. This leads to a huge number of Parent/Application/IP/Port rules. An easy way to analyze the logs is essential.
Easy backup - simple XCOPY in a batch file.
Other alternative ways to achieve the same results are also fine.
Although the latest betas have registry protection for the Comodo specific registry keys, you can still readily delete the registry key that starts the user interface. This key should be added to the protection list.
This has probably been suggested b4 but iām gonna reitorate - CPF needs some way to inform the user of what apps are whitelisted so that they donāt think CPF isnāt working when e.g. Ad-Aware gains access to the internet and CPF doesnāt display any warnings.
Is there a webpage with a list of all the trusted apps?