It is obvious now that default Internet Security with Partailly Limited setting can be bypassed…
Switching to Proactive Security setting should also raise the level of Unrecognized files to Restricted or Untrusted.
Partially Limited - The application is allowed to access all the Operating system files and resources like clipboard. Modification of protected files/registry keys is not allowed. Privileged operations like loading drivers or debugging other applications are also not allowed.
Limited - Only selected operating system resources can be accessed by the application. The application is not allowed to execute more than 10 processes at a time and is run with out Administrator account privileges.
Restricted - The application is allowed to access very few operating system resources. The application is not allowed to execute more than 10 processes at a time and is run with very limited access rights.
Untrusted - The application is not allowed to access any of the Operating system resources. The application is not allowed to execute more than 10 processes at a time and is run with very limited access rights.
Blocked – The application is not allowed to run at all.
The Internet Security configuration is the default configuration when you install CIS. The sandbox is enabled in this configuration. The sandbox is only disabled if you switch your configuration to Firewall Security.
I’m confused because your latest post contradicts your original post. Your original post says the sandbox was enabled and CIS was bypassed.
Now you are saying the sandbox was in fact disabled, but when it is enabled, CIS is not bypassed? ???
As a256886572008 pointed out, you probably did not use the default settings. In default settings, CIS can NOT show you execution alerts. You probably used some other mode.
If you don’t install the AV the setting is disabled by default.
I installed CIS FW with default settings (I just choose, not to install the AV, Geekbuddy, and DNS)
The profile active by default is Firewall security.
Why a user that does not install the AV get a lower protection in D+? does not make any sense since is not related at all with the AV
Most of the users who install firewall only are looking for a firewall i.e. network based filtering. They dont want an anti-malware solution from CFW. All they want is a strong firewall which has good indirect internet access control while they let other antivirus solutions to protect them.
COMODO Firewall can well be turned into an antimalware solution with one click configuration switching though if its what you need.
Thats is the excuse to offer a weak and easily to bypass settings using the default settings of CIS fw?
It’s so hard to admit it and change the default settings? I can’t even believe that you wrote all those paragraph to say that instead to spend the same time changing the default settings on CIS FW.
In fact you argumentation doesn’t make any sense, if they want a strong protection (proactive mode) why offer by default the weakest one (fw protection), CIS fw should be configured by default like CIS is the only thing that make sense.