Please spell check before posting, as I’m unsure of the meaning of a few sentences, such as:
“It everything is created at the first connection. (inquiry of a network)”
I’m unsure what your meaning is by this. If you’re saying that everything is created at the first connection to a network, you’re entirely incorrect. There are rules that are created, however, they’re extremely lenient and almost always allow access to all 65,535 ports, and I explained in detail why this is a horrible idea. If you allow access to all 65,535 ports, instead of just the specific ports the application needs access to, you’re giving hackers 65,535 doors to access your computer and network from… and any user that offers this vulnerability up on a silver platter is not only asking to be hacked, they almost surely will be at some point. Th generic, lenient rules will also allow in/out access from Any to Any, and if the application or file only needs access to the link-local address range on ports 137 - 138, why would you allow it unfettered access to ports and IPs it not only doesn’t need, it will never need access to anything other.
ICMPv4 and v6 should also always be blocked, unless a user uses their computer on an enterprise network which uses ICMP. ICMP is not secure in the slightest and is used too often in attacks to gain access to systems and networks
“I don’t understand it for what?”
Are you asking why you need to create a Network Zone for Loopback (127.0.0.1)? If so, it’s simpler and more efficient as almost every program on a computer will require access to the Loopback IP (if anyone needs clarification why, please google it or look it up on WikiPedia).
How your opinion what is described in this subject?
https://forums.comodo.com/firewall-help-cis/cis-ver5-system4-listening-port-on-445-question-t67464.30.html
Thanks.
Edit: Or you suggest to create all these rules only for process:
“Windows Operating System” ???
I think:
The simple user won’t be able to make all this.
First, and most importantly, I was addressing the issue of this thread, which is no one seems to understand what the CIS classification of “Windows Operating System” is and why it’s requesting access to the network and/or internet… So the answer would be, yes, I am suggesting the specified rules above as only for the “Windows Operating System” category, as this is what this thread is about (which it appears you failed to read). [There are global rules at the bottom of the page, and if a person needs to ask why those should be global rules, please do your due diligence and research why.] Many seem to think it’s due to malware, viruses, and P2P sharing software like uTorrent, which is entirely inaccurate and incorrect.
Second, these rules aren’t difficult to understand… please don’t classify everyone else as being unable to understand, when the issue here is you aren’t able to understand them. That’s okay if you don’t understand them, I’m more than happy to help you, however it appears what you wish to do is argue about this and I won’t indulge that.
I’m also not sure why you crossed out the Link-Local IP range of 169.254.0.0 - 169.254.255.255… if you don’t understand what the Link-Local IP address range is for, please do your due diligence and google it or look it up on WikiPedia. Link-local communication is vital to many programs.
You reference that I wrote “In order to fix what Comodo forgot” and then responded to it as “I want to hear opinion of the advanced users”. I’m a bit perplexed at this… First, let’s review the facts…
- “Windows Operating System” is a category of processes and files within the Windows OS.
- There is no information from Comodo as to what files or processes are contained with the category of “Windows Operating System”.
- The category “Windows Operating System” is not malware or a result of any third party program.
- Due to Comodo not addressing the category “Windows Operating System”, users are confused about what exactly it is, with many telling other users it’s due to malware, viruses, and P2P clients… all of which is entirely incorrect.
So, unless I’m mistaken, it is a factual statement to say “In order to fix what Comodo forgot”, as Comodo forgot to add this category classification to their default rules and is not found under Firewall, Internet, or Proactive configurations. If you wish to wait for “more advanced users” to comment, that’s your prerogative, however I’m not going to indulge your confrontational attitude and give you the argument you appear to really want for one reason or another. I posted not only the rules that should be under the category “Windows Operating System”, I even included a link to download my configuration file for import. I was attempting to help those who were incorrectly informed about what “Windows Operating System” is and if you don’t care to take the help offered, that’s your choice… but don’t sit there and attempt to start an argument due to the time I devoted to the above post to help others… simply move on and disregard if you don’t want the help.