Just downloaded the installer. Got through everything and started downloading, but ended up finished as soon as it downloaded the Live PC Support. Nothing else was installed or downloaded.
Hi Rambo. I think i know what you mean. Cis 4 is supposed to suppress pop ups but i too have experienced situations where it continually repeats what it has just done, allow or block!! over and over on the same subject. Got to be a bug of some sort.However i will personally put up with it until its fixed as i do not know of any application that does and will do more effeciently than Cis does at present security wise and with the other additions to come in 4.1, i think for now its a price worth paying. Just my opinion mind you.
Can you post this in the Release post?, such replies don’t belong in the Bug Report thread.
Unless you provide the requested details, and explain what’s really going on.
OS: Windows XP SP3 32bit updated to the latest post-sp3 Service packs
CIS Version: 4.0.132838.716
D+ configuration: Comodo Proactive Security Defaults
D+ mode: Safe mode
General information:
[ol]- Some protected paths in My protected files defaults include a leading ?:\ wildcard to specify all drives (C:, D:\ , etc.) though D+ was unable to trigger “Protected File/Folder” access rights alerts for paths that pertained USB removable devices (FAT USB-key disk).
All applications policy blocked section of “Run an executable” access right include a ?:\Recycle?* rule though D+ is unable to silently block execution of application launched from paths that pertained USB removable devices (USB-key disk) but will display execution alerts.
Non removable HD are not affected. I’ve not tested if other access rights that apply to USB removable devices paths might be affected [/ol]
Description:
If an USB removable device is assigned a drive letter (eg. I:):
[ol]- It is possible to use a non-safelisted (Comodo lookup result: unknown) notepad application to create a new I:\autorun.inf without alerts.
If sandbox is disabled, launching an application whose path is I:\Recycled\app.exe will trigger an alert regardless if a related “All applications” rule is meant to silently block execution from ?:\Recycle?*
If sandbox is enabled, launching an application whose path is I:\Recycled\app.exe won’t be blocked and won’t l trigger an alert (regardless if a related “All applications” rule is meant to silently block execution from ?:\Recycle?* )
[/ol]
Workaround:
Previously mentioned workarounds (see past reports for details) for protected-file access-rights do not appear to work anymore
OS: Windows XP SP3 32bit updated to the latest post-sp3 Service packs
CIS Version: 4.0.132838.716
D+ configuration: Comodo Proactive Security Defaults
D+ mode: Safe mode
General Information:
In CIS installation folder (%ProgramFiles%\COMODO\COMODO Internet Security) there are configuration defaults backups in a new XML config format:
COMODO - Internet Security.cfx
COMODO - Firewall Security.cfx
COMODO - Proactive Security.cfx
Description:
It is possible to import any of the above listed xml configs using More…\My configurations\Import… but these configuration files will result in a corrupt/erroneous Firewall rule-set (picture attached)
The incompatible XML configs (this list might be incomplete):
[ol]- Do not have SourcePort tags when required
Add non-conformant untagged data before termination tags;
Thiis data corresponds to attributes (Protocol,Days,StartHour,StartMinute,StopHour,StopMinute,etc.) which are missing from the opening tags
Do not have <?xml version="1.0" encoding="utf-16"?> at the beginning[/ol]
NOTES: The above mentioned configuration files feature a proper “Temporary Files” group.
All the registry representations of CIS default configurations do not have a trailing asterisk (*) for the Internet Explorer “Temporary Internet Files” folder (eg. C:\Documents and Settings\username\Local Settings\Temporary Internet Files)
The above mentioned XML config files instead include a properly formed wildcarded path for Internet Explorer “Temporary Internet Files” (eg. C:\Documents and Settings\username\Local Settings\Temporary Internet Files*)
As soon as installation had finished there was a continuous stream of pop ups which lasted for 3-4 minutes by which time i had had enough,so when it had finished i uninstalled
This is not a RC.
Operating System: Windows 7
AV : Avast
Windows Defender
OS: Windows XP SP3 32bit updated to the latest post-sp3 Service packs
CIS Version: 4.0.132838.716
D+ configuration: Comodo Proactive Security Defaults
D+ mode: Safe mode
Account type: Administrator
Description:
Running Comodo Leak Tests .1.1.0.3 under elevated context (Allow “clt.exe is requesting to run with elevated privileges” alert ) once will negatively impact CLT.exe results when running again (later) in CIS sandbox (rightclick → Run in COMODO Sandbox)
On subsequent runs in sandbox D+ is unable to alert about PhysicalMemory (all subsequent runs), SetWinEventHook (only once) and SetWindowsHookEx (only once) if these exact steps for the 1st run are followed:
1st run.
a. left-click on clt.exe and Allow “clt.exe is requesting to run with elevated privileges” alert
b. double-click on “Invasion: PhysicalMemory” line to fail that test
c. close clt.exe
2nd run.
d. right-click on clt.exe and choose “Run in COMODO Sandbox” context menu verb
e. double-click on “Invasion: PhysicalMemory” line
f. double-click on “Injection: SetWinEventHook” line
g. double-click on “Injection: SetWindowsHookEx” line
Despite the 2nd run was carried using the sandbox D+ fails to alert about these actions:
For we can quicker investigate and handle your problem - could you name at lease several applications for which alerts were shown, also could you tell were those alerts Firewall or Defense+ or Antivirus?
Your patience is greater than mine.
I gave up Comodo a few months ago having been with it since V2.4.
I found that the more bells and whistles there were the more unreliable it became.
They have fallen into the trap of every other security company that i have known.Never mind the bugs,lets have more goodies.
I just thought that for one more time i would try it.You know the result.
Anyway the firewall in Windows 7 does a good job.
Regards
Hello, thank for your feedback.
‘Create rules fro safe applications’ not affect to silent allow. It only save all actions as rules for application that already detected as safe (e.g. from trusted vendor).
So if you have alerts from application it means that this is not safe applications.
If you want to save all actions of not trusted application as rules without alerts try to switch D+ to ‘Training mode’. It suitable only for clean systems, please notice that.