I’ve read topics in which some people have expressed frustration about the lack of control of behavior of programs that Comodo has deemed trusted when using Safe Mode. I’ll show you how to get back control by using Paranoid Mode. This topic is intended for advanced users only.
This first post covers creating your own custom list of trusted programs.
Here are the steps:
- Switch to the CIS configuration that you wish to use. If desired, you can create a new configuration by exporting an existing configuration and then importing it using a different name. Information about the configurations included with CIS is found at Comodo Preset Configurations | Comodo Internet Security | Comodo Internet Security v5.9/5.10.
- Use Defense+ Security Level Paranoid Mode.
- Define a new file group called “Custom Trusted Programs without Arbitrary Launching Capability”. Add programs to this group that you wish to be considered trusted. Wildcards such as * can be used to specify all programs in a given folder and subfolders. Programs in this file group can be launched by any other program without an alert, and can perform any action without an alert except launching of programs that you haven’t specified as trusted.
- Add a Defense+ policy for file group “Custom Trusted Programs without Arbitrary Launching Capability”. Give it the predefined policy Trusted Application.
- Add the file group “Custom Trusted Programs without Arbitrary Launching Capability” to the “Run an executable” Allowed Applications of the “All Applications” Defense+ policy. This allows any program that’s running to run programs in the file group “Custom Trusted Programs without Arbitrary Launching Capability” without an alert.
- Use Firewall Security Level Custom Policy.
- Add a firewall policy for file group “Custom Trusted Programs without Arbitrary Launching Capability”. Give it the predefined policy Trusted Application.
You can create additional file groups if you want different policies for different file groups. For example, if you wish to always run installers from folder c:\temp\setup without alerts, you could create a file group called “Custom Trusted Installers” with member c:\temp\setup*, Defense+ predefined policy “Installer or Updater”, and firewall predefined policy Trusted Application. Add the file group “Custom Trusted Installers” to the “Run an executable” Allowed Applications of the “All Applications” Defense+ policy.
There may be programs that you wish to consider trusted and also allow to launch any program, whether trusted or not. To do so, create a file group named “Custom Trusted Programs with Arbitrary Launching Capability”. Add desired programs to this file group. Give it the predefined Defense+ policy Windows System Application and firewall policy Trusted Application. Add the file group “Custom Trusted Programs with Arbitrary Launching Capability” to the “Run an executable” Allowed Applications of the “All Applications” Defense+ policy.
I recommend that you review all existing Defense+ and firewall policies for inconsistencies with your intended goals after implementing this method. In particular, pay close attention to the Defense+ policy (if there is one) of explorer.exe (i.e. Windows Explorer), because it may be allowing execution of any program. Note that Defense+ policies are processed in the order that they are defined.
Periodic rule maintenance is recommended. You may delete a Defense+ policy for a trusted program unless there are Defense+ rules that you wish to preserve. You may delete a firewall policy for a trusted program unless there are firewall rules that you wish to preserve. You may delete any Defense+ policies whose only non-default rule is to launch a trusted program.
I’ve been deliberately vague about the specific user interface actions to accomplish the above steps. Feel free to ask if you need more details.