CIS 5.3
Windows XP Pro SP-3
Under the Defense+ configuration, the following conditions are listed when I select “Safe Mode”:
- Computer security policy is applied.
- Every action of safe executable files is learned.
- Every action of unknown executable files is alerted to the user.
In which order are these conditions excercised. Is it top-down (as I assumed) when has policies enforced first before anything about safe files is excerised? Or is it bottom-up which means safe files will get their behavior learned first and only afterward are policies enforced?
I ask because I’ve installed programs that were considered safe by CIS; however, they added startup entries to the Run registry key. I never got notified that there was a change to the Run key (for another data item added under it). Yet the Run key is a protected registry item. If the order of conditions exercised was bottom-up (which would be a non-intuitive ordering) then, yes, the safe program would be allowed to modify the Run key without alerting the user and the policies would get exercised too late.
While I like the idea of using the whitelist of safe programs to eliminate having to deal with lots of prompts, I still want to know when a program is modifying the startup behavior or load state of Windows. Even for safe programs, I want to know when they add, for example, a startup item under the Run key, in the Startup folder, as a WinLogon event, as a scheduled event on login, etc. Just because Comodo considers, for example, Quicktime to be safe program doesn’t mean that I want it adding a Run key to run its superfluous qttask.exe program on Windows login. If a safe program defines an NT service or adds a web browser add-on, I’d still like to know about it. I don’t want to reinstall WinPatrol to overcome this deficiency.
Does this mean I have to go to the more painful and nuisancesome paranoid mode for Defence+? Since most of the changes to which I want to be alerted occur during the installation of the program, can I configure CIS to not condsider any installer as a safe program? That is, use the safe program whitelist to reduce prompts but NOT for installers?
Even if this were possible, some programs modify the startup items when they are executed. For example, Quicktime may re-add its qttask Run key when you modify its configuration settings (or maybe it gets re-added by an update which comes back to not trusting installers but still trusting safe programs). There is no Untrusted Files section to Defense+ to alert me anytime that particular program violates my security policies, and I don’t want it listed as an Unrecognized File to gthen get sandboxed (iis not an unrecognized file but I don’t fully trust trust it, either).
I figured if the conditions listed for Safe Mode were exercised in the top-down order in which they are listed, enforcing the policies would occur first and alert me to changes on protected registry keys before anything regarding the condition of whether a program was safe or not got exercised. Doesn’t seem to work that way though since installers known as safe programs get to make changes that violate the policies.
I don’t want to trust installers. For them, I’d like Paranoid mode. I do want Safe Mode after the program has been installed and is considered safe - except for some programs that I want to remain untrusted (and NOT unrecognized). I don’t want to be manually switching Defense+ modes for installers since that is error prone (not rememberbering to do it) and then having to remember to return to Safe Mode (and still doesn’t handle the case of untrusting specific programs).
How do I remove just installers from Comodo’s safe list? Or, how do I get installers (and not already installed safe programs) to run under Paranoid mode?
How to I untrust (or not trust) a program (which is known, not unrecognized)? Do I have to contrive a policy for it? If so, will that policy get enforced despite the program is in the safe list? It doesn’t happen that way for safe installers.
NOTE:
I just looked around again inside CIS. I noticed when defining a policy (rule) for a program that you can pick from pre-defined policies (which can be edited). One of the selections was “Installer or Updater” pre-defined policy when defining an app rule. Yet when I looked under the PreDefined Policies tab for Defense+ settings, there was no such pre-defined policy defined there by that name. So there is a pre-defined policy selectable when defining an app policy (rule) but no way to edit that policy (so I could change it to alert on the protected areas). The one pre-defined policy that I’d like to change but can’t. I figured that policy got used by default for installers on the safe list but maybe not. So I still haven’t found a means to remove installers from the safe list or to modify the policy under which they are controlled.
NOTE #2:
There is no documentation that I have yet found to defined just what conditions or criteria are covered by the “Installer and Update” policy. This is a HIDDEN predefined policy which users cannot not review its settings to see how it manages installer or updater programs. Users can’t edit a predefined policy they can’t see or select. I don’t want to use Paranoid mode for installed programs, only for installer/updater programs. Having to manually flip to Paranoid mode for an installer and remeber to flip back to Safe mode after the install is not just too much hassle but error prone.
Since the changes to which I want to be alerted are those typical of installers, and since Comodo appears to include installers in their safe list, and because I cannot edit the predefined but hidden “Installer or Updater” policy, it looks like I have to reinstall WinPatrol to tell me when these changes have been made. CIS Defense+ in Safe Mode would cover the non-safe programs while WinPatrol catches the changes made by installers that CIS refuses to alert on (unless I choose to get really super nuisanced by D+ by using Paranoid mode).
The changes are prevalently experienced during an install. CIS won’t issue alerts for installers. I have to use WinPatrol for that. I was hoping to get rid of WinPatrol when I elected to use CIS.