hi,I need help for to comodo it is totally safe
Security Firewall is my config for Comodo
The level of the firewall is Safe Mode
And the Defense+ is the level is safe Mode
Date 23:38:15 - 15/05/2009
OS Windows XP SP2 build 2600
- RootkitInstallation: MissingDriverLoad Protected
- RootkitInstallation: LoadAndCallImage Protected
3. RootkitInstallation: DriverSupersede Vulnerable
- RootkitInstallation: ChangeDrvPath Protected
- Invasion: Runner Protected
- Invasion: RawDisk Protected
- Invasion: PhysicalMemory Protected
8. Invasion: FileDrop Vulnerable
- Invasion: DebugControl Protected
- Injection: SetWinEventHook Protected
- Injection: SetWindowsHookEx Protected
- Injection: SetThreadContext Protected
- Injection: Services Protected
- Injection: ProcessInject Protected
- Injection: KnownDlls Vulnerable
- Injection: DupHandles Protected
- Injection: CreateRemoteThread Protected
- Injection: APC dll injection Protected
- Injection: AdvancedProcessTermination Protected
- InfoSend: ICMP Test Protected
- InfoSend: DNS Test Protected
- Impersonation: OLE automation Protected
- Impersonation: ExplorerAsParent Protected
- Impersonation: DDE Protected
- Impersonation: Coat Protected
- Impersonation: BITS Protected
- Hijacking: WinlogonNotify Protected
- Hijacking: Userinit Protected
- Hijacking: UIHost Protected
- Hijacking: SupersedeServiceDll Protected
- Hijacking: StartupPrograms Protected
- Hijacking: ChangeDebuggerPath Protected
- Hijacking: AppinitDlls Protected
- Hijacking: ActiveDesktop Protected
Score 310/340
Thank you for your understanding
Regards
i want to know which cis version u used while doing this test like for example 3.5, 3.8, 3.9 and if 3.9 then was it 3.9.xxx.507 or something?
best way to fix that is right click on the comodo icon in task bar, go to configuration and select proactive. Now to the test again, I bet you will get 340. ;D
With the configuracion of Proactive Security
Date 11:48:51 - 16/05/2009
OS Windows XP SP2 build 2600
- RootkitInstallation: MissingDriverLoad Protected
- RootkitInstallation: LoadAndCallImage Vulnerable
- RootkitInstallation: DriverSupersede Vulnerable
- RootkitInstallation: ChangeDrvPath Vulnerable
- Invasion: Runner Protected
- Invasion: RawDisk Vulnerable
- Invasion: PhysicalMemory Vulnerable
- Invasion: FileDrop Vulnerable
- Invasion: DebugControl Vulnerable
- Injection: SetWinEventHook Vulnerable
- Injection: SetWindowsHookEx Vulnerable
- Injection: SetThreadContext Vulnerable
- Injection: Services Vulnerable
- Injection: ProcessInject Vulnerable
- Injection: KnownDlls Vulnerable
- Injection: DupHandles Protected
- Injection: CreateRemoteThread Vulnerable
- Injection: APC dll injection Vulnerable
- Injection: AdvancedProcessTermination Vulnerable
- InfoSend: ICMP Test Protected
- InfoSend: DNS Test Protected
- Impersonation: OLE automation Protected
- Impersonation: ExplorerAsParent Protected
- Impersonation: DDE Protected
- Impersonation: Coat Protected
- Impersonation: BITS Protected
- Hijacking: WinlogonNotify Protected
- Hijacking: Userinit Protected
- Hijacking: UIHost Protected
- Hijacking: SupersedeServiceDll Vulnerable
- Hijacking: StartupPrograms Protected
- Hijacking: ChangeDebuggerPath Protected
- Hijacking: AppinitDlls Protected
- Hijacking: ActiveDesktop Protected
Score 170/340
My Product Version is the last version: 3.9.95478.509
Are you sure that you didn’t have the Leak Test already on your PC and you set “Clean PC Mode”? ???
Clean mode Pc in the firewall or in defense+?
I have tested new with the configuration Comodo Internet Security
OS Windows XP SP2 build 2600
- RootkitInstallation: MissingDriverLoad Protected
- RootkitInstallation: LoadAndCallImage Protected
- RootkitInstallation: DriverSupersede Protected
- RootkitInstallation: ChangeDrvPath Protected
- Invasion: Runner Protected
- Invasion: RawDisk Protected
- Invasion: PhysicalMemory Protected
- Invasion: FileDrop Protected
- Invasion: DebugControl Protected
- Injection: SetWinEventHook Protected
- Injection: SetWindowsHookEx Protected
- Injection: SetThreadContext Protected
- Injection: Services Protected
- Injection: ProcessInject Protected
15. Injection: KnownDlls Vulnerable
- Injection: DupHandles Protected
- Injection: CreateRemoteThread Protected
- Injection: APC dll injection Protected
- Injection: AdvancedProcessTermination Protected
- InfoSend: ICMP Test Protected
- InfoSend: DNS Test Protected
- Impersonation: OLE automation Protected
- Impersonation: ExplorerAsParent Protected
- Impersonation: DDE Protected
- Impersonation: Coat Protected
- Impersonation: BITS Protected
- Hijacking: WinlogonNotify Protected
- Hijacking: Userinit Protected
- Hijacking: UIHost Protected
- Hijacking: SupersedeServiceDll Protected
- Hijacking: StartupPrograms Protected
- Hijacking: ChangeDebuggerPath Protected
- Hijacking: AppinitDlls Protected
- Hijacking: ActiveDesktop Protected
Score 330/340
You must have click allow and not block. I have CIS running on 4 machines and they all pass with a 340/340. Keep in mind you need to delete all entries of the test before trying again. Your best bet is delete the test. Do a complete uninstall of CIS and reboot. Install the latest version and you will pass. As long as you click “BLOCK” on all the alerts except for the first one. You need to allow the test to run.
I understand about the block, I tried this on my computer last month and it gave me 340 pass. then I reformatted and it gives me 320, I have deletted my firewall setttings several times and tried and get the same results , when it comes to the 2 that fails it never asks me to allow or block, sending a screen shot, so what is wrong
Since you ran the tests already, try removing any rules created in Defense+ and the Firewall for CLT.exe.
Then, with CIS in Proactive mode, and the firewall and Defense+ both set on Safe, rerun the test.