hi,I need help for to comodo it is totally safe
Security Firewall is my config for Comodo
The level of the firewall is Safe Mode
And the Defense+ is the level is safe Mode
Date 23:38:15 - 15/05/2009
OS Windows XP SP2 build 2600
RootkitInstallation: MissingDriverLoad Protected
RootkitInstallation: LoadAndCallImage Protected
3. RootkitInstallation: DriverSupersede Vulnerable
RootkitInstallation: ChangeDrvPath Protected
Invasion: Runner Protected
Invasion: RawDisk Protected
Invasion: PhysicalMemory Protected
8. Invasion: FileDrop Vulnerable
Invasion: DebugControl Protected
Injection: SetWinEventHook Protected
Injection: SetWindowsHookEx Protected
Injection: SetThreadContext Protected
Injection: Services Protected
Injection: ProcessInject Protected
Injection: KnownDlls Vulnerable
Injection: DupHandles Protected
Injection: CreateRemoteThread Protected
Injection: APC dll injection Protected
Injection: AdvancedProcessTermination Protected
InfoSend: ICMP Test Protected
InfoSend: DNS Test Protected
Impersonation: OLE automation Protected
Impersonation: ExplorerAsParent Protected
Impersonation: DDE Protected
Impersonation: Coat Protected
Impersonation: BITS Protected
Hijacking: WinlogonNotify Protected
Hijacking: Userinit Protected
Hijacking: UIHost Protected
Hijacking: SupersedeServiceDll Protected
Hijacking: StartupPrograms Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: AppinitDlls Protected
Hijacking: ActiveDesktop Protected
Score 310/340
Thank you for your understanding
Regards
i want to know which cis version u used while doing this test like for example 3.5, 3.8, 3.9 and if 3.9 then was it 3.9.xxx.507 or something?
best way to fix that is right click on the comodo icon in task bar, go to configuration and select proactive. Now to the test again, I bet you will get 340. ;D
With the configuracion of Proactive Security
Date 11:48:51 - 16/05/2009
OS Windows XP SP2 build 2600
RootkitInstallation: MissingDriverLoad Protected
RootkitInstallation: LoadAndCallImage Vulnerable
RootkitInstallation: DriverSupersede Vulnerable
RootkitInstallation: ChangeDrvPath Vulnerable
Invasion: Runner Protected
Invasion: RawDisk Vulnerable
Invasion: PhysicalMemory Vulnerable
Invasion: FileDrop Vulnerable
Invasion: DebugControl Vulnerable
Injection: SetWinEventHook Vulnerable
Injection: SetWindowsHookEx Vulnerable
Injection: SetThreadContext Vulnerable
Injection: Services Vulnerable
Injection: ProcessInject Vulnerable
Injection: KnownDlls Vulnerable
Injection: DupHandles Protected
Injection: CreateRemoteThread Vulnerable
Injection: APC dll injection Vulnerable
Injection: AdvancedProcessTermination Vulnerable
InfoSend: ICMP Test Protected
InfoSend: DNS Test Protected
Impersonation: OLE automation Protected
Impersonation: ExplorerAsParent Protected
Impersonation: DDE Protected
Impersonation: Coat Protected
Impersonation: BITS Protected
Hijacking: WinlogonNotify Protected
Hijacking: Userinit Protected
Hijacking: UIHost Protected
Hijacking: SupersedeServiceDll Vulnerable
Hijacking: StartupPrograms Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: AppinitDlls Protected
Hijacking: ActiveDesktop Protected
Score 170/340
My Product Version is the last version: 3.9.95478.509
Are you sure that you didn’t have the Leak Test already on your PC and you set “Clean PC Mode”? ???
Clean mode Pc in the firewall or in defense+?
I have tested new with the configuration Comodo Internet Security
OS Windows XP SP2 build 2600
RootkitInstallation: MissingDriverLoad Protected
RootkitInstallation: LoadAndCallImage Protected
RootkitInstallation: DriverSupersede Protected
RootkitInstallation: ChangeDrvPath Protected
Invasion: Runner Protected
Invasion: RawDisk Protected
Invasion: PhysicalMemory Protected
Invasion: FileDrop Protected
Invasion: DebugControl Protected
Injection: SetWinEventHook Protected
Injection: SetWindowsHookEx Protected
Injection: SetThreadContext Protected
Injection: Services Protected
Injection: ProcessInject Protected
15. Injection: KnownDlls Vulnerable
Injection: DupHandles Protected
Injection: CreateRemoteThread Protected
Injection: APC dll injection Protected
Injection: AdvancedProcessTermination Protected
InfoSend: ICMP Test Protected
InfoSend: DNS Test Protected
Impersonation: OLE automation Protected
Impersonation: ExplorerAsParent Protected
Impersonation: DDE Protected
Impersonation: Coat Protected
Impersonation: BITS Protected
Hijacking: WinlogonNotify Protected
Hijacking: Userinit Protected
Hijacking: UIHost Protected
Hijacking: SupersedeServiceDll Protected
Hijacking: StartupPrograms Protected
Hijacking: ChangeDebuggerPath Protected
Hijacking: AppinitDlls Protected
Hijacking: ActiveDesktop Protected
Score 330/340
system
May 20, 2009, 9:12pm
#7
You must have click allow and not block. I have CIS running on 4 machines and they all pass with a 340/340. Keep in mind you need to delete all entries of the test before trying again. Your best bet is delete the test. Do a complete uninstall of CIS and reboot. Install the latest version and you will pass. As long as you click “BLOCK” on all the alerts except for the first one. You need to allow the test to run.
I understand about the block, I tried this on my computer last month and it gave me 340 pass. then I reformatted and it gives me 320, I have deletted my firewall setttings several times and tried and get the same results , when it comes to the 2 that fails it never asks me to allow or block, sending a screen shot, so what is wrong
Since you ran the tests already, try removing any rules created in Defense+ and the Firewall for CLT.exe.
Then, with CIS in Proactive mode, and the firewall and Defense+ both set on Safe, rerun the test.