Comodo Internet Security v10.0.2.6346 - BETA

Hi All,
We are pleased to announce availability of Beta version of Comodo Internet Security for your review and feedback.

Following are changes:

AV component optional in offline installer:

There was a request from users, who wanted to have offline installer for Firewall and didn’t want to install Antivirus component together.
Now during installation, user can select both or either of the two. Please check enclosed AV_Optional_In_Offline_Installer.png.

Crash Reporting:

In case any CIS component crashes and if user is not participating in sharing application usage and statistics (Option: General Settings–>Logging → Send anoymous…),
he will see example alert CrashReporting_Alert.png requesting user to allow to upload crash dump to Comodo server for further analysis. This will enable us to find out crashes in the wild and every release down the road, will include fixes of the same. We introduced this feature in CCAV and has greatly helped.

Automatic Update Download and Installation in Critical Situations:

Considering Windows 10 is evolving very fast, we have seen in recent past that there had been incompatibilities between Comodo and Windows 10.
Even after releasing CIS updates, some of users do not read releases notes and do not update to latest program version, however Windows may update automatically. This creates a situation where even though we offered update, user declined the update and could run into difficulty.

In order to avoid these situations, we have decided to introduce an option “Automatically install program updates…” under “Settings → General Settings → Updates” section. Please have a look at enclosed AutoInstallUpdates.png. It will be selected by default and if that is selected, updates will be automatically installed and if applicable, user will be requested to re-start system on his convenience. We will use this only in critical situations.

Right click scan to use Cloud (New ‘Manual Scan’ Profile):

At the moment, right click scan uses settings from “Full Scan” profile, where cloud lookup is disabled by default for performance reasons.
When user right clicks and scans, user really expects file to be thoroughly scanned. So we are introducing “Manual Scan” as a new scan profile with cloud lookup enabled by default.
This new profile “Manual Scan” will be used whenever user right clicks and scans a file or folder. Please check enclosed New_Manual_Scan_Profile.png

Trusted Root Certificate Scan:

In order to protect against Man in the Middle (MitM) attacks, now under Quick Scan, there is an additional item “Trusted Root Certification Authorities”.
This will scan installed root certificates against master list from Microsoft and will list the differences as suspicious in scan results, where you can either remove or trust or ignore listed differences . This scan is also available in Comodo Firewall. This scan is also integrated in Rating Scan.
Please check Trusted_Root_Certificate_Scan.png

Compliant to Cloud Files Feature:

This version is fully compliant with latest Cloud Files Feature being introduced in Windows 10 RS3 release, due on 17th Oct, 2017.

Improved Auto-Sandbox notification:

Now when an application is auto-sandboxed, notification has an option not to isolate again. Please check enclosed Improved_Auto_Sandbox_Notification.png.

Improved System re-start reminder alert:

Earlier, when alert was shown, it used to steal focus and inadvertently user could end up re-starting system while in the middle of other work.
Now reminder dialog will be shown on top but without being as active window and even if active for some reasons, default active button will be “Postpone”.

Improved “Unblock Applications” interface:

Now you have ability to:

  • Unblock a blocked application from respective blocked component or from all components.
  • You have a Purge button as well to clean up non-existent files related entries.
    Please check enclosed Improved_Unblock_Applications_Interface.png

Other Changes:
“Scan Exclusions” section has been moved from “Antivirus” section to under “Advanced Protection” and it also has a new tab for “Excluded Certificate Authorities” as may have been added to exception during certificate scan.

“Detect shellcode injections Exclusions” present under “Settings → Advanced Protection → Miscellaneous” has been renamed to “Disable shellcode injection detection for these applications” to reflect exactly how it is implemented.

Changes in Secure Shopping (CSS):
This version installs new version of CSS as v1.3.427860.115 with following changes in it:

When CIS is installed, you will see Comodo Secure Shopping shortcut on Desktop. We want to highlight this great feature as user can use it as starting point for secure browsing.

When you launch Secure Shopping, you will see a welcome window. Please see enclosed SecureShoppingWelcomeWindow.png
This is to highlight benefits of Secure Shopping, with check box not to show again selected.

In standalone mode i.e. when Comodo Internet Security is not installed, you will see following changes:
We are avoiding alert model and now if you define a website in Setting, and if website is browsed in supported browser, it will be opened in Secure Shopping environment. Please have a look at enclosed CSS_Setting.png

Following bugs are resolved in this CSS release:

BETA - Warning:
Following setup is a BETA setup and it is not recommended to test on production machine and it is intended only for beta testers.
So please try at your own risk.


Online Setups:
In order to install online setups, please ensure you have following entries in Windows hosts (c:/windows/system32/drivers/etc/hosts) file:

Comodo Internet Security Premium
Size: 5.2M ( 5,446,400 bytes )
MD5: ae7e9d4e4b38e9b73d31b57a351dafca
SHA1: 88e71b095c5bc09161a52e5a31d7cb70badc507d

Comodo Antivirus
Size: 5.2M ( 5,446,400 bytes )
MD5: 661b16c72cfe410a888bc0bbad2dc1fc
SHA1: b1102f051d4e010dc43a605ada3bbdbf8a4c451d

Comodo Firewall
Size: 5.2M ( 5,446,400 bytes)
MD5: 142c9c2350f2e1932f53517429cca7e8
SHA1: da2418af045869aa074c73557f216d8c32839e4b

Offline Setup:
Comodo Internet Security Premium (Comodo Firewall and Comodo Antivirus only)
Size: 63M ( 65,345,376 bytes )
MD5: a79b5e1c5e2ed9d0b698af673dfc4b4f
SHA1: 94497f50054abdfc94b8bd5a563c9536dce2de93

Please give a try and any feedback will be highly appreciated.
Apart from testing new features/fixes, we would like you to test this build on latest RS3 preview builds.

We plan to release CIS by mid of Oct, 2017.

This is going to be the beginning of continuous CIS releases and every month you can expect release improving upon previous releases to improve usability and stability to finally reach a point where we have zero open issues.


Does this version fix the COMODO Firewall Snoozing in Windows Action Center?

Looks nice, thanks for the update :-TU
installing now. :slight_smile:

Hi Protected_PC,
We will look into that but seems a re-installation has helped people and it’s just not Comodo Firewall:
Firewall Snoozed

Please see if you could try this version out as it’s kind a issue that is rare and can’t be easily produced.



I would like to have an option to be available to unblock multible programs att the same time (with different rules).
So you can pre configure the the rule and later to click apply, to apply the rules.

Edit: i also think that a apply button would feel more responsive/intiative for the user.

Added 2 pic, for example.

Minor Feedback

Would like to have a option so you could pick between CIS 10 UI and w10 UI for the sandbox alert/notifications.
(i prefer to have 1 UI for all the alerts/notifications)

would like to have so that Auto-Sandbox alert would popup ever time you execute an unknown program. (not just the first time. Like CCAV)

Hi BlueTesta,
Thanks for input, keep them coming please.

As per Windows 10 compliance, if a product shows a notification, which doesn’t require any action, it must confirm to Windows 10 notification to achieve symmetry across notifications from various applications. So that’s not a choice.

It has my vote! May you please tag it as wish list item?
i would like to hear if other users also have same opinion and if they would like it to be default behavior, like in CCAV.


Sorry, didn’t quite get it.

Please give an example of rule and how will you select which row uses which rule?

i have :slight_smile: old one

My bad
Edit: unblock applications are alot better now then b4 :-TU, but still think it could be fine tuned.

Added color as a example, to keep track of the rules you have picked for those applications.

So you can click on the checkbox on 1 application and then pick “Unblock for components shown in Blocked by column” (Green)

and you scroll down and you click on 2 applications and and then pick “Unblock for all security components” Blue.

so when you are done you can look over what settings that you picked for those applications (indicated with color or text) and to reconsider before you click on apply and later click apply. when you are sure you want to do this.

instead of you click on a checkbox and then click on “unblock for…” and it will auto apply this for the selected application.

1, you click on a checkbox on a application (or multiple applications).
2, you click on Unblock.
3, you pick on 1 of the 2 option.
4, the rule now visually applied to that application (with text or color)
5, add more rules to other applications if you want, same as step 1-4.
6, Look over the option you picked and press apply when you are satisfied.

An optional way, simpler layout (witch i prefer)would be to have the same layout as Sandboxed Applications inside CCAV,
Action: Select
Dont sandbox again
End Task

But for Unblocked Applications inside CIS
Action: Select
Unblock for components shown in Blocked by Column.
Unblock for all security components.

added pic for example

also with an apply button, so you can pick what you want to do with the applications and look over it before you are apply.

Best regards //Bluetesta

A: Some user visualise it in their head what they are gona do before they do it.
(so auto apply works for them when they click on Unblock… etc)

B: some users need/prefer to Visually see it infront of them layed out before they decide to do their choice.
(like when programs run inside the CCAV sandbox, they can pick their choice and see it and click apply.)

My original post was bad, so I will rephrase it,

CCAV have CCAV UI for all their alerts/notifications.

CIS have CIS UI for all their alerts/notifications exept Auto-Sandbox and when AV is configured with quarantine witch use w10 UI,
I would like to have CIS to use the CIS UI skin for the Auto-Sandbox And AV Auto-Quarantine instead of w10 UI skin.

I prefer if all alert have the same UI as the main interface (match)
and that they all have consistent UI for all their alerts.

ok, why doesnt CCAV sandbox follow this, and use Windows 10 UI like CIS does for the sandbox?

I have an old wish that could help with that (maybe)


CIS Rating Scan dosent recognice the correct Trust Level, Trusted Cerificates arent counted as good.
See pic


CF install only i.e AV not installed, when Cloud detect malware, there is no alert (Stable version on Windows 10)
Is it fixed in the beta?

I think no need “Hide these alerts” on AutoSandbox alert
Provide options in the settings like “Show alert every time on execution of unknown program” & “Show alert first time on execution of unknown program”

Aren’t the CIS’ AV alert w10 style as well?
Personally I like them - they are small, clean and not invasive.

Your right, i forgot about that one, Thanks
They have it when the av is set for quarantine or block
Edited my original post

Hi Umesh,

A quick thanks to you and the team for the release and considering Wish List item among others.

The Improved_Unblock_Applications_Interface.png is much appreciated as a good improvement over what we were given to work with.

Unfortunately I cant check the beta itself this time around to confirm behavior specifics hence am working off the screengrabs shared.

The implementation still doesn’t completely satisfy the use case shared on my wish item since if 2 components block the application. Suppose I wanted to only add a rule for HIPS but none for the Firewall it would be better to have given granular selection rather than unblock on (both) components shown as blocked or perhaps can that selection be made after clicking on that list item ?


Sent an old feedback to BuketB about Unblocked Applications some time ago, its layout may work for you. Edit: if you need a layout Suggestion for a wish.

A couple of problems I have:

Kill Switch doesn’t install

I can’t test the Logitech fix in Secure Shopping as I still can’t install CSS with the same errors showing as before

Proxy and host.

Unfortunately I’ve already tried that. I’ve had a few problems with the installation of CIS in the last couple of months, so I’m about to bite the bullet and reset Win 10 on this machine . . . .

Wish me luck - I will return (hopefully)!