COMODO Internet Security Beta Wishlist [CLOSED]

Frankly, I would like to have all of the Advanced features that were in 2.0 Beta. I would like to be able to disable from the taskbar icon. Only do scanning on some files (instead of all) (it scans files sent to the Recycle Bin). Generally, I would like to have more scanning options so I can taylor it to my specific needs.

I’m only a little dissatisfied with the AV portion, for me, the Firewall is just the same as in the stand-alone version.

i would like to see:

1: e-mail scanner (that can add notes to bottom of emails)
2: quick scanner (that can be used from explorer right click menu and download managers that can be set to run scans on downloaded files.
3: (i dont know if this is already a feature but i dont think it is) Web scanner (that scans files you try to download or links that you click, and warning you if it is infected).

People need to remember since CIS is BETA, Wishes right now are most likely not to be covered, But some can be. The Developers are dealing with bugs & FP’s.

So hope you all understand. This is the first version of CIS & First Free Security Suite!


So long as the automatic updates keep working, I see it as a daily treat to see what features will be added along the development road to a great Security Suite!

Yes… This is only the beginning. :slight_smile:


Melih Posted reasons:

Most of my wishes are already posted. I would add (though) the auto update feature offer options to auto update program files AND signature files. Also this could be further optioned with user selected time of day.

Found virus threats should have the option for a) auto delete, b) auto quarantine, c) wait for user to view and select either delete, quarantine, or ignore (all files user selectable per choice).

From previous posts, CMF and file right click scan have been requested. Both are needed options. CMF should also have its status displayed in the summary screen.

I know you disaprove, but scanning files downloaded (either from a DL Manager or web browser) does have the advantage of catching (known) viruses before any damage can be done. What I am implying is, if a file DL’d is supposed to be a file from a trusted source, one would allow it to run when Defense + asks one’s permission to allow it to run. If it is viral, one now has the potential of a virus running loose in their computer. By scanning when it is DL’d, one might be able to catch that virus before it does any serious damage. You did state different angles of defense is a good thing, and that is what Comodo is trying to provide. This is one angle that needs to be covered. All users/testers that requested it have valid reasons for asking it be included.
This is my reason: this morning I had a viral attack. Strange to me, as the file has been residing on my HD and in memory since last spring (April I think). The program did nothing it seemed, was supposed to be part of another program. Always loaded with the startup software and just sat there silently.
Avast (on-access AV of choice until CIS) never detected it as viral (and I ran several deep scans over a period of time). Three other AV’s never detected it, and Comodo CIS never detected it.
This morning at 7:00am, it went active. It repeatedly made attempts to connect to the outside world. It also damaged a few other (non critical) software files. CIS blocked every attempt to leave (great, as this is what allowed me to discover it). Upon updating (immediately) my Avast signatures, it was spotted in memory and on the HD as viral (Avast discovered both). CIS never picked it up. It was stopped, and completely destroyed from my system.
Granted, known signatures would/did not help, but many other viruses have been discovered from DL scans, and stopped right there before even being granted a foothold of HD realestate.
I do not wish to have any file reside that is viral. What if the infected file was copied and given to a friend. Without knowing it was viral, I would be contributing to the spread (my friend may not have the protection I have). The stoppage of viruses must be from any angle available.

CIS alerts don’t mention if the digital signature is invalid.

If possible I wish that code-signed executables with invalid signatures will be able to trigger a totally new alert to ask the user if they still wish to apply the existing policies for that app.
Code signing is actually a neglected by many users this would be a good way to increase end-user awareness.

Another wish would be to modify GUID alerts for COM objects to also provide a more informative progid and related InprocServer32 file.
I guess nobody will be able to tell what a GUID mean but a progid an file could do the trick.

If not we should print a cheatsheet of all protected guids. :stuck_out_tongue:

Another related wish would be to add an alternative way to add COM components to protected COM interfaces.

Everytime it takes up to 20 seconds to populate the panels with all COM components (clicking abort close the entire dialog).
A simple way to add an entry directly would prove useful if the user already know the GUIDs or use the registry.

Basically the COM Components… menu entry could be renamed to Browse COM Components… and another menu entry named “Add…” could be added.

Or Maybe The com Component List could be hidden and enabled only sfter clicking a button. This way the user could awoid waiting if doesn’t need that list.

Please improve policy import/export support adding the possibility to import partial rulesets in a text-file format.

Another thing I miss is more aliases. They will make possible to share rules on the forum or to use a baseline configuration on “foreign” computers.

These Registry branches that contains useful alias I hope V3 will support
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folder

These improvements could make support topics more easy and it could be possible to share pre configured policies.
Future development could also make possible to create a centrad DB to index all those policies.

As I used no AV for moths I would like to mantain that light CPU-load usage pattern.

So the options are to manually scan pending file list or enable realtime scanning only when the installation mode is active (possibly only on the installer appchain and related written files).
At the same time I wish to prevent scanning of all applications that have a D+ policy and are not listed in my pending file list (an option to enable my pending file list for other modes would be good)

Maybe this will spare me only few CPU cycles but I see no point to scan the same applications everytime I run them.
IIRC CAVS should already have some kind of features as it was previously reported that CFP3 scan decrease scan time after multiple usage but there is no way to tell was file was just scanned lby Realtime AV ike (eg) avast.

Please ■■■ AV sig DB version to CIS about box

Please add a shortcut to CIS standalone Logviewer to Comodo startmenu folder and a logging menuentry (with f+, D+ and AV+ log submenu) to CIS tray icon menu

In Memory Scanner is still being built…

& Site Inspection Technology is to be built into CIS as well… But your Post is good. Thanks for the Feedback. :-TU


I’d like one string from right-click menu to be removed: “configuration”. I guess config is chosen only once in most cases, so there is no much need in this string especially for those used to CFP’s right-click menu.

[attachment deleted by admin]

will CAVS3 ever have a boot-time scan option? i would really like this.


The context menu scanning is a must!

CIS realtime and scheduled scan have “Automatically remove threats found during scanning” enabled by default.

To my understanding there are few applications that are potentially unsafe(Applicationunsafe, Riskware, Joke) but they could be nevertheless needed by users.

If possible in order to let the users chose if those apps are going to be placed in CIS exclusion list I wish that those automatic delete options could be disabled by default and the default action would be to quarantine those files.

It would be also useful to provide some additional description about the different categories (eg Applicatiounsafe or riskware) in order to give users the infos they need to make a rational choice.

With those info it could be also possible to modify default behaviour(providing additional options) when a particular category is found.

eg: Only log Joke apps but quarantine Trojan apps.

I don’t know if there are some heuristic categories but I guess it would be useful to let the user know if some app was identified using heuristic in order to let them evaluate the possibility to check those apps using Defense+

1)Maybe a option to schedule a boot time scan, like in Avast.

2)Registry Scanning if it isn’t supported.

3)Maybe and integration into windows live messenger to scan files received through it, the 1 care safety scanner that you use with it is a pain and takes for ever to update.

[attachment deleted by admin]

+1 :-TU

I would like to have an e-mail-scanner for thunderbird and microsoft outlook at least.

You really don’t need it.

As I said, In-Memory Scanner is being built in - Adding another “Email Scanner” isn’t needed - Because when you receive a malicious Email and it hasn’t been clicked on or activate, It can’t do any damage - But if does get clicked on & activated, It will be Zapped! Because it’s true that malware needs to hit either the Hard Drive or Memory. We want CIS to be FAST & Efficient as possible.

We also have behaviour simulation & heuristics on the way too to be built into CAV3. This is only the Start.


I would like more extensive logging, like if someone disables real-time scan on a system i manage CIS for i can “track” what happend. Also think of adding “Manual scan” Profile “My Computer” started at … etc
Also true for changing parameters for Firewall and D+ (D+ has a little of it) but i’d like more :slight_smile:

Maybe with a slider a logging level “low/medium/high” ?

And also support for Server 2k8. :-TU

Disable/Enable AV on the systray icon right click menu.
Logviewer on the systray icon right click menu.