In settings, I see only a setting that enables/disables the “sandbox”. There is no separate setting to enable/disable the auto-sandbox and another separate setting to enable/disable the Always Sandbox feature. Under Defense+ → Defense+ Settings → Sandbox settings, they mixed together the auto-sandbox and always-sandbox configuration. It’s confusing when Comodo mixed access restriction (what they call auto-sandbox) with the real sandbox (that employs virtualization) under the one “sandbox” term while also mixing their settings together. This was maybe meant to simplify the interface to noobs but it doesn’t take expertise in the alternate protection schemes to end up getting confused by what Comodo is trying to define.
It is unfortunate that Comodo use the term “sandbox” so loosely. Comodo’s auto-sandbox is an access restriction scheme where privileges are reduced, perhaps interprocess communication is throttled, and other methods already provide within Windows. This is like GeSWall which is also a policy enforcer that reduces privileges. This access restriction scheme does NOT prevent malware files from getting on your host nor keeps them from running but throttles what they can do when running. The manual sandbox (because you manually add entries to the Always Sandbox list) does include the file & registry virtualization.
If I disable the “sandbox” under Defense+ tab → Defense+ settings → Sandbox, does that only disable the auto-sandbox (the employs access control, privilege reduction, etc but nothing of virtualization)? Or does it also disable the Always Sandbox function?
I ask because I currently use Avast (free version). The free version includes their auto-sandbox which DOES include virtualization to layer the untrusted process away from the file system and registry. Unknown or suspicious processes get sandboxed (correctly termed this time). There is no manual sandbox in the free version of Avast to equate to the Always Sandbox in Comodo’s suite. So I can force a program to always be sandboxed (virtualized) using Comodo’s Always Sandbox list but I’d like to use Avast’s sandbox (virtualized) feature for unknown/untrusted/suspicious processes. I don’t want to use Comodo’s auto-sandbox (access restriction scheme) since a lot of that can be done already using SRPs (software restriction policies) already included in Windows. I already restrict web browsers using SRPs to force them to run under a Basic account which means they run under a LUA (limited user account) token.
So I’d like a security matrix as follows:
Yes: Avast’s (free) auto-sandbox (virtualization)
No: Comodo’s auto-sandbox (access restrict)
Yes: Comodo’s always sandbox ← yes
I’d like to use the auto-sandbox from Avast with the always sandbox from Comodo so both are actually sandboxes that are virtualizing the unknown/suspicious or specified processes. I’d like to get the best of both.
Note: Please don’t suggest using Sandboxie. Their free version is nagware, I don’t bother with nagware, and I’m only investigating free-only (freeware) solutions.