1 restart needed? Yeah right, 1 to install update and 2nd to finalize installation and CIS does initial scan.
Also so very “nice” that update cleared Whitelisted programs (started Seamonkey and immediately CIS was asking can it access to things a-z). CIS sent Renpy-game to Container and previously it started just fine and also that other PIA game (worked fine in older CIS but prev. version wanted to prevent it running outside Container) CIS popped few questions about it
Who knows how many of current games I need to answer to 20 questions and add to Whitelist to get those work properly.
You should always do a fresh install for any major CIS update. There was a certificate issue with the previous version which is probably why your having issues with having upgraded rather than doing a clean install. I’ve not had any issues at my end.
That doesn’t sound good for anyone that has 8140 installed and just expect an in place upgrade as per other programs. Some are not technical / experienced users.
Unless it has changed in the last day ( 27/11/2024 ), the one downloaded from the COMODO website is still the version with the certificate issue !!
Website needs clarification as downloading from https://antivirus.comodo.com/ downloads the Premium version and that one’s certificate is fine as indicated in my earlier post.
P.S. Microsoft Defender now detects Killswitch as a PUP which is easy enough to just allow. and definitely a False Positive and only the temporary file when installing Killswitch. Amusingly, it installs anyway despite the MD pop-up
My post was in reference to a False Positive. KIS protection is on par with CIS so if you have paid for a KIS subscription and enjoy using it, you’re just as well protect.
You can block the containment bypass by several means.
Simply setting Auto-Containment to Block
Enabling HIPS (just be sure you know what you are allowing with the alerts)
Disabling UAC completely (as recommended by @cruelsister )
it can even be fixed with some simple windows hardening if you don’t want to go down the route of disabling UAC. SimpleWindowsHardening Tool
Whatever you decide, the likelihood of malware actually deploying such a mechanism is very very rare and I’ve not seen a real world example. The videos showing such an bypass are running it already allowed onto the system and any parent unknown would be blocked either by Comodo or KIS in the first place