Which firewall is best to use with Komodo firewall. Installing and configuring Comodo Firewall

Home / Freezes

Summary of previous articles: an example of setting up and using Comodo Internet Security 8

Attention! The article is addressed to users who have experience using the Comodo Internet Security complex and have read previous articles about it. “Beginners” are advised to study this product first. For familiarization and relatively effective use, the following setup procedure is suggested:

  1. disconnect your computer from the Internet and/or local network;
  2. install CIS;
  3. open “Main window” > “Tasks” > “Advanced tasks” > “Advanced settings”;
  4. on the “General Settings” > “Configuration” tab, double-click on the “Proactive Security” line;
  5. on the “Protection+” tab > “Sandbox” > “Auto-Sandbox”, disable the “Use Auto-Sandbox” option;
  6. on the “HIPS” tab > “Protected objects” > “Protected files”, add any file through the context menu;
  7. via the context menu, replace the added line with ?:\*
  8. Click “Ok” to close the settings window;
  9. open “Main window” > “Tasks” > “Firewall tasks” > “Hide ports”;
  10. select the “Block incoming connections” option;
  11. perform a reboot;
  12. connect your computer to the network.

Preliminary remarks

This setup procedure is given in abbreviated form. The purpose of the article is to give readers a guide to the variety of configuration options for Comodo Internet Security. It is assumed that readers are familiar with previous articles and understand the reasons for certain recommendations. Only the most general setup details are given here. Additional measures, for example, against firewall bypass (through inter-process memory access, DNS queries and BITS), protection against ransomware or against keyloggers are described in the article on using proactive protection; about access to the local network - in the article about firewall, etc.

I would like to emphasize that this configuration is not “maximum”, but more or less balanced in terms of protection and ease of use. Unidentified programs are automatically virtualized without notification. HIPS alerts are possible, but they will occur very rarely.

The proposed option is intended for personal use by an experienced user, but it is not difficult to adapt it for “beginners” or users with advanced limited rights. You can, for example, turn off all notifications, or replace the automatic virtualization of unidentified programs by blocking them, or set the firewall to " Safe Mode"etc.

If following these instructions leads to any problems, I ask readers to report in the comments. Messages supported by configuration export files, a list of files and each CIS log for the entire period, as well as video recording and/or provision of remote access for diagnostics.

Installation and configuration

Installation

It is advisable to install CIS on a system that is guaranteed to be free of malware. Let me remind you that you need to update the system and do it backup copy. It makes sense to disable " Windows Firewall» via the «Control Panel».

If the system is clean of malware, it is advisable to “familiarize” CIS with the files on it. To avoid conflicts, you can disable the protection components at this time: antivirus, Auto-Sandbox, HIPS, firewall and Viruscope. First, let's perform a “Reputation Scan” (“Main Window” > “Tasks” > “General Tasks” > “Scan”) and after it is completed, we will make all found files trusted. Then we will launch various installed programs and their components. Let's reboot. In the advanced settings window, on the “File Reputation” > “List of Files” tab, mark all files and use the context menu to set them to a trusted rating.

Basic setup

After installation, open the “General Settings” > “Configuration” tab in the advanced settings window and enable the “Proactive Security” configuration. When prompted to reboot, we’ll respond “Postpone.”

If you have previously configured CIS, import the initial “Proactive Security” configuration from the program catalog under a different name and activate it.

If a notification appears about choosing a network status, select the “Public place” option.

On the “Content Filter” > “Rules” tab, make sure that the “Blocked Sites” rule is located at the bottom, and change it: add the categories “MVPS Hosts list” and “Symantec WebSecurity” and set the type of restrictions not to “Block”, but to “Ask” "

Context Menu Extensions

To copy files blocked by the antivirus, add the appropriate item context menu. All materials necessary for this with instructions are given in the archive.

Usage

If an unidentified program is detected, we do not make any concessions in protection without making sure that it is safe. The easiest way to check the program is through the context menu. I note that the absence of antivirus detections is not an absolute guarantee of security. But you can more or less confidently judge the safety of a file if it has been known for a long time and leading antiviruses do not recognize it as malicious.

As additional check You can run an unknown program in a virtual environment and then send the contents of the VTRoot directory to VirusTotal. You can independently examine the behavior of the program in a virtual environment by enabling Viruscope with the option “Apply Viruscope action only to applications in Sandbox" and opening the activity report. Viruscope also sometimes automatically classifies program behavior as malicious.

To install a new safe program, call up the context menu on its installer while holding down the Shift key and select the “Run as installer” item. If a HIPS alert occurs during installation, disable the “Remember selection” option in it and select the “Install or update” policy. After installing the program, we perform its first test run through the context menu item “Run as installer without elevation of rights” and close the program. Then, on the “File Reputation” > “List of Files” tab, we transfer the unidentified files of this program to trusted ones. We also add the directory with the new program to the trusted ones.

To update installed program we launch it using the “Run as installer” context menu item, perform the update procedure and similarly transfer new files from unidentified to trusted.

It is possible that a program runs in isolation even after it has been added to the trusted list. Typically, this happens when the program size exceeds 40 MB. The solution is to add the path to such a program to the “AllowedProgs” group.

If you need to temporarily run a program without restrictions, open the context menu on it while holding Shift and select “Run as installer without elevation of rights.” It is important to remember that such a program and its child processes will be able to run any unidentified file without interference.

When any unidentified file is isolated for the first time through Auto-Sandbox, a pop-up notification appears. I remind you that it is dangerous to press the “Don’t isolate anymore” button in it.

If any data needs to be carefully protected from damage, for example, by encryption viruses, we add the word “WriteProtected” to the end of the name of the directory containing it. The contents of directories like “C:\Docs\My Projects - WriteProtected” will be prohibited from being changed by any program except Explorer. When you need to change the data, we will either temporarily rename the directory, or move the data to another directory, and after finishing the work we will return it to protection.

You should look at the event log from time to time, especially the firewall and proactive protection (“Protection+”). There you may find that a certain program requires additional permissions, for example, to carry out an update. Then you will need to adjust the configuration accordingly.

When a program is blocked by an antivirus, first of all we send it to VirusTotal through the context menu. If we are completely confident in its security, we add this program to the trusted ones. If, despite doubts, the program must be used, copy it to the exceptions directory. To do this, open the context menu on it while holding Shift, select the item “Copy infected file...” and save it to the C:\Exclusions directory. From this directory the program will be launched as a normal unidentified program in a virtual environment.

If you are concerned that the program you are running will block the OS interface and prevent you from clearing the sandbox, you can limit its execution time. A convenient way to do this is the context menu item “Run in Comodo sandbox as restricted”, suggested in the article about the virtual environment.

If you need to run a dubious program in a real environment, we do this through the extended context menu item “Run without restrictions Auto-Sandbox”. We monitor program activity through HIPS alerts. To avoid a large number of them, you can immediately select the policy “ Limited application" or "Isolated" (by enabling the "Remember selection" option). Attention! Malicious program can start a trusted one, and HIPS will no longer monitor the activity of the child process, which can cause damage. As a mitigating measure, you can temporarily enable Viruscope in order to observe in more detail the activity of not only the dubious program, but also its child processes, and, if necessary, roll back changes.

Typically, HIPS alerts in this configuration will only occur when using the "Run without restrictions Auto-Sandbox" menu item or, less commonly, the "Run as installer" and "Run as installer without elevation" options. However, if HIPS alerts you to activity unidentified programs in other cases are a red flag. It may mean that an unidentified program ran before CIS or received SYSTEM privileges. I recommend selecting the “Block and complete execution” option in such an alert (disabling the “Remember selection” option in it), and then checking the system for vulnerabilities.

optimally, with a minimum of pop-up notification windows, quickly andconfigure it yourself . The author's version of the program's advanced settings largely coincides with that recommended in the Russian part of the International COMODO Forums (thread "CIS/CFP for beginners in firewalls"). These forums can be visited by clicking on the "Miscellaneous" tab and clicking "Visit Support Forum". The only thing is that you will be taken to the main English page, so in order not to search, here is the directlink to the forum "In Russian / Russian". Useful information There is a lot on the topic - those who wish, of course, can “dig into it.” And for convenience, point by point, I will proceed to what I promised.


Setting it up Comodo Firewall

1. At the beginning, I suggest changing the default gray and sad “face” of Comodo Firewall to something more interesting. To do this, in the same “Miscellaneous” tab, click “Settings” > “ Appearance"> "Theme" change the gray theme of COMODO Default Normal to, say, COMODO Blue Normal and, "dressed up", move on.

Antivirus with advanced network protection Comodo Internet Security is loved by many advanced users, but is traditionally considered complex and inconvenient to set up initially. And the number of alerts that require immediate resolution significantly exceeds that of automatic security packages like Norton Security or Bit Defender. But if you spend a little time on the initial fine-tuning Comodo, they can also work with it regular users who do not want to delve into the intricacies of work network protocols or antivirus protection technologies. This is what we will try to figure out today.

After Comodo is finalized, ordinary users will be able to work with it

What to pay attention to when installing

  1. Check the box “I want to use cloud-based application behavior analysis...”. Thus, you will delegate routine decisions about allowing/prohibiting many operations to the user community. This will somewhat reduce the level of safety, but will make the work much more comfortable.
  2. Whether or not to send statistics about the use of the application depends on your desire. But many users prefer to do without it.
  3. On the screen for selecting components to install, check the boxes for “Comodo Antivirus” and “Comodo Firewall”. The rest can be safely turned off.
  4. Be sure to disable the "If possible, do not show alerts that require the user to make a security decision" option.

What to do immediately after installation

  1. Update your anti-virus databases (the “Update” icon at the bottom of the main screen).
  2. Select the “InternetSecurity” configuration (“Basic settings” – “Configuration”), then click the “Enable” button in the bottom pop-up panel.
  3. There, click the “Export” button and save the settings in a safe place.
  4. After that, click "Import", select the settings you just saved and give a name to your own option. Then select it in the list and click “Enable”. This is necessary so that the original configuration from the manufacturer remains intact.

After updates, restart your computer

  1. Disable the desktop widget that is of little use (click right click mouse on the tray icon, select “Widget”, uncheck “Show”).
  2. Reboot your computer.

"Security Settings", section "Antivirus"

Leave the heuristic analysis level at “Low”

  • Selecting the “Do not show notifications” option will help inexperienced users quickly get used to the program settings, but it is better not to use it constantly.
  • Leave the heuristic analysis level at “Low”, otherwise you risk drowning in a heap of messages and warnings.
  • Add the folder that contains files downloaded from the Internet, the working directory of the torrent client, and the section with installation packages as an exception. To do this, in the lower pop-up panel, select “Add”, “Folders”, select the desired directory and click “OK”. This will significantly increase the comfort of work during an active online life.

Canceling the desired directory will increase the comfort of work

“Security Settings”, section “Protection+”

  • "HIPS Settings". Recommended operating mode is “Safe”. It is better to leave the “Create rules for secure applications” checkbox enabled.
  • "Sandbox Settings". If you are confident in the security of certain executable files, you can add them to the exception (click the line “Do not virtualize access to specified files and folders"). It is better not to touch the remaining settings.

If you are sure that your files are safe, add them to exceptions

  • Viruscope. A useful and necessary dynamic behavior analysis system running programs. Sometimes it may not work entirely correctly, then until the reasons for the failure are determined, it is better to disable it (uncheck “Use Viruscope”).

Useful dynamic analysis system

“Security Settings”, section “Firewall”, block “Firewall Settings”

This point should be given maximum attention, since one incorrectly set option can lead to serious consequences.

  • A custom set of rules for filtering traffic provides maximum protection, but at the initial setup stage it requires increased attention from the user. "Safe Mode" provides a slightly lower level of protection, but displays far fewer warnings.
  • The “Create rules for safe offers” checkbox will turn Comodo into a complete automatic machine, so if you are not ready to carefully read every warning, you can check it. In all other cases, the field should be left blank.
  • Activated advanced settings (“Enable IPv6 traffic filtering”, “Block fragmented IP traffic”, “Analyze protocol” and “Enable ARP spoofing protection”) provide additional security, but sometimes lead to problems. Use at your own risk.

Pay maximum attention to setting up this option

“Security Settings”, section “File Reputation”

  • Block “File reputation settings”. Here it is better to trust the default settings, and if you want to get rid of some requests, check the “Do not show alerts” checkbox.

Leave the settings as default

Additional settings

They are not necessary, so they should be used with some caution, and in case of unstable operation, everything should be returned to its original state.

“HIPS” tab, “HIPS Settings” section:

  • We increase the notification time to a maximum of 999 s.
  • Activating the item “Adapt operating mode when system resources are low” increases stability, but negatively affects the speed of the program.
  • The item “Enable enhanced protection mode” makes sense only for 64-bit OSes.
  • If you use software emulators (Daemontools, VMware, Alcohol), add the corresponding directories to exceptions: the “Detect shell code injection” item.

“Security Settings”, “Protection+”, “Auto-Sandbox”:

The efficiency of virtualization technologies implemented in Comodo is quite high, but due to the high resource intensity on weak computers problems are possible. In this case, we do the following:

  • For all objects with the “Unidentified” reputation, select the “edit” item in the pop-up panel, and in the “Action” line select “Block”.

Using a torrent client

For him normal operation It is required not only to give the executable file full access, but also to add a special global rule. Select sequentially “Security Settings”, “Firewall”, “Global Rules”, then click “Add” on the pop-up bottom panel and assign a policy:

  • Action: “Allow”, the “Register trigger in the log” checkbox should remain unselected.
  • Protocol: check the “TCP or UDP” box.
  • Direction: “Outgoing and Incoming”.
  • Description: not important.
  • Destination Port tab. Specify the number specified in the uTorrent settings.
  • When everything is ready, move the newly created rule to the very top of the list.

Attention! If, as a result of erroneous actions, the program ceases to function normally, select “General Settings”, “Configuration”, check the “COMODO–Internet Security” item and click “Enable”.

Hello, dear readers of the blog site! In this article, I continue the big topic I raised about protecting your computer from various types of threats. In my last article on this topic, I began to talk about protecting your access to the Internet and program control using a special protection component - Firewall, which is part of Kaspersky's extended protection - Kaspersky Internet Security. Firewall is also called differently - “Firewall” or “Firewall”.

And now I will again talk about Firewall protection, but from a different developer and which can be installed separately along with any anti-virus product, without specifically installing comprehensive protection from one manufacturer. The product I want to talk about is called Comodo Firewall. Its most important advantages are that it is free and high quality traffic protection!

In one of the previous articles I already mentioned that Comodo also offers free antivirus(read about it here:) or completely free comprehensive protection: Comodo Internet Security. However, the antivirus itself from this developer is not as reliable as, for example, Kaspersky Anti-Virus or Avast, so I recommend installing only a firewall from Comodo and, separately, a reliable antivirus from another developer. Or use the Kaspersky Internet Security package.

Let's look at the installation and basic settings of the firewall from Comodo.

Comodo Firewall installation process

Installing a separate Comodo Firewall product can be said to be no different at all from installing an antivirus from Comodo, so I will analyze this process more briefly - without commenting on each customizable option.

You can find more detailed comments on installation at the beginning of the article, the link to which is given above.

So let's begin:

Setting up Comodo Firewall

Setting up Comodo's Firewall is simple and almost everything will already be configured optimally by default. All we have to do is check and, if necessary, correct something. Before setting up the Firewall component itself, let's do some steps with the basic Comodo settings:

    Immediately after installing the Firewall, a pop-up window will appear in which you need to select which network you are connected to. Select “I am at home”:

    Now we launch the main window of Comodo Firewall by clicking on the tray icon (the area near the Windows clock) and we will see a large exclamation mark(which reports that some component is not working) and an active “Fix” button. IN in this case We only need to reboot, because after installation not all protection components were launched.

    Just click the “Fix” button:

    The computer will reboot and after the system boots, the Firewall components will already be enabled and the warning icon will disappear.

    If you have Windows 7, then on the right side of your desktop there will be a completely unnecessary widget from Comodo :) This is what it looks like:

    Let's remove it. To do this, right-click on the Comodo tray icon, select “Widget”, and then click on the button marked “Show”:

    As a result, the widget will disappear and will no longer be an eyesore or consume system resources :)

    Now again launch the main Comodo Firewall window from the desktop or from the tray and update the databases by clicking the appropriate button (see image below):

    The database update will start and if there are new versions, they will be updated. After this, the window will close automatically after a few seconds.

    Even if you have installed latest version antivirus or firewall from the official website of the developer, I still recommend checking for updates immediately after installing the product.

    Now let's move on to checking the settings of the firewall component. For easy access to all settings, switch to the advanced mode of the main window. To do this, in the upper left corner, click on the small button as in the image below:

    Now the main window of Comodo Firewall will transform a little and we will see more functions. But the main thing is that now we can easily move on to the settings of the firewall itself. To do this, simply click on the “Firewall” link in the upper left corner:

    As a result, we find ourselves in the first Comodo firewall settings window.

    As soon as we go to the settings, the very first menu from the “Firewall” category will open in front of us - “Firewall Settings”.

    These settings are optimal, but I will make some comments.

    The “Enable Firewall” checkbox, of course, is responsible for enabling or disabling protection. Do not uncheck the box under any circumstances, otherwise the installed Comodo Firewall will be of no use to anyone right away, since the firewall itself will simply be turned off :)

    Next to the checkbox to enable/disable the firewall, there is a list where you can select a security mode. I'll tell you briefly about these modes:

    • Complete blocking. By selecting this mode, the firewall will block absolutely all connections, both incoming and outgoing, and from any network. Your computer will be isolated, similar to if you turned off all networks on your computer and unplugged the network cable.

      This mode, in principle, is not needed as such, since the advisability of its use can only be when working in extremely dangerous unprotected networks, in which various viral threats are circulating in droves.

      Custom set of rules. By selecting this mode, the firewall will work and block traffic only based on the rules for programs and networks that we set ourselves. In this case, the firewall will not take into account that the program is trusted and has a digital signature. He will make decisions only based on the rules we set.

      Safe mode. This is the mode I recommend using. When operating in this mode, the firewall itself creates most of the rules for trusted applications that have valid digital signatures. Based on this, he chooses which connections to allow for a particular application and which not. When it detects unrecognized and untrusted programs, Comodo will give the user the choice to allow or block the connection, telling them what actions the application was about to perform.

      Training mode. In this mode, the firewall will not show any notifications and will itself create rules for all applications, allowing them network requests. The mode can only be used if you are 100% sure of the reliability of the applications installed on your computer. As a rule, this cannot happen, so I do not recommend using this mode :)

    In the “Application Rules” firewall menu, we can set rules for any applications or see previously created rules.

    All already created rules will be visible immediately if you click on the “Rules for Applications” menu. To add your own rule, right-click on an empty area in the window and select “Add”:

    Now I’ll show you with an example how to block access to the network of any program.

    To do this, in the window that opens, first of all, you need to select the program for which we are creating a rule (as I indicated for the example: block access to the network). Click on the “Browse” button, after which you can select many files at once by selecting “File groups” and checking the appropriate group. You can also select one of the ones running in at the moment processes in the system and create a blocking rule for it. But it’s more convenient to select the “Files” item:

    After we select “Files”, Explorer will open, where you need to select the program for which we will create a rule. For example, I will block access to the Internet known browserMozilla Firefox. I look for the folder where Firefox is installed and select the file responsible for launching (firefox.exe). Then I click the “Open” button in Explorer:

    Now we will automatically return to the previous window and see that the path to the program we specified has now appeared in the “Name” field. Check the “Use set of rules” option, then select “Blocked application” from the list of ready-made rules on the right:

    After all the settings in this window are set, click the “OK” button below to save them:

    As a result, we will return to the window with a set of rules for programs and in the list we will see a newly added program (in my example, Firefox) with the “Blocked application” rule. In order to immediately check the result, you need to apply all changes in the rules and click the “OK” button at the bottom again:

    To check my action I run Mozilla browser Firefox and trying, for example, to open our favorite blog site :) As a result, I get the error “Connection attempt failed”:

    And this is exactly what we needed for the example :) Connections for Firefox are blocked. It is clear that Firefox, seriously, of course, does not need to be blocked. This was just an example :) You can and should block programs that do not need Internet access or programs that are untrusted.

    The created rule is even easier to delete. You need to go back to the firewall menu - “Application Rules” and right-click on the required rule, select “Remove from list”:

    In our selected “Safe Mode” mode, Comodo Firewall will be very good at selecting rules for applications and we will rarely have to dig around and configure the rules ourselves. In principle, this is where it ends important settings firewall from Comodo for beginners. I do not recommend making any settings in the remaining firewall menus, since they are intended for much more experienced users who understand computer networks and having more complete knowledge of working with networks in operating systems.

The settings that I showed are quite enough to protect your computer from attacks by a hacker and block access to the Internet for untrusted applications or those that we choose ourselves.

You probably noticed that in addition to the “Firewall” section, there are other sections in the settings, for example: “Protection+”, “File rating”, “General settings”. Necessary settings Of the listed sections, I have already described in one of my previous articles - “Another good free antivirus - Comodo”, so, if necessary, you can read about them in that article by clicking on the link above.

And with this, I conclude the last of the articles I am currently planning.

More articles await you ahead computer topics, For example: backup data, remote control computer and others :) I think that a periodic deviation from the topic of surfing and making money towards technical issues is even useful. Thus, on the same favorite blog, in addition to continuous information about earnings, we also study our computer and everything connected with it :)

See you soon! Good luck to you ;)

As they say, the flight is normal, only the product is paid and after 30 days it will stop working and ask for money. Tell me, is there any free firewall of the same quality?

Hello friends! Today's article is about the popular and free firewall Comodo Firewall.

Security software from the developer company Comodo Group has gained popularity in the software market due to the presence of software products three important components - a popular field of application, simplicity and convenience of the interface, as well as free distribution. It is worth noting the flexibility of the developers’ approach. Thus, a computer protection software package consisting of an antivirus, a firewall, a Sandbox and other modules can be installed either entirely or selectively by installing only individual modules of either the Comodo AntiVirus antivirus or the Comodo Firewall into the system. It is the latter that will be discussed in more detail below. Let's look at the features of the Comodo Firewall, how to install this program and how to configure it.

Tasks and features of Comodo Firewall

Comodo Firewall, despite the fact that the product is free, provides complete protection of your computer from online threats. Moreover, he has more than once become the winner of various tests conducted by Internet software resources in order to identify the best software solution class "Firewall". Comodo Firewall is able to protect against attacks from hackers and malware spreading over the network at the same level as paid advanced firewalls such as Outpost Firewall Pro. To put it simply, you won’t find software of the same quality and especially free on the market..

Comodo Firewall analyzes suspicious program activity on your computer and checks all of its active components, blocking the launch of anything that could harm your computer. The program's Stealth Mode makes your computer invisible to port scanning by malware. Comodo Firewall automatically detects the trusted zones of your computer, that is, those folders and files that are authorized to be opened by public access over your home or local network.

Unlike its counterpart, which does not work well with every antivirus on the same system, Comodo Firewall is more loyal in this regard. Even if you do not like the specificity or effectiveness of the Comodo AntiVirus antivirus module, you can install any other antivirus, since Comodo Firewall, as a rule, does not conflict with third-party security software.

Several operating modes and flexible settings of Comodo Firewall will allow both beginners and more experienced users to configure the desired behavior of the firewall.

Installing Comodo Firewall

Run the downloaded Comodo Firewall installer.

The installation process is somewhat different from the standard one, since it initially involves setting some parameters for the program. After selecting the program language, we will see the installation wizard window, where you need to select some options. It is not necessary to indicate your email.

You can leave all the preset options without changing anything only in the following cases:

When it comes to a powerful computer or laptop and a high-speed Internet connection;

You fundamentally want to participate in the improvement of security software, in particular Comodo products, so that the company improves user protection;

You don't trust your ISP's DNS.

A window will open with options for installing the program, where the developer, hoping that you will quickly complete the installation and not delve into the installation settings, has prepared, in addition to the Comodo Firewall, the automatic installation of two more programs - this is the client technical support from the developer Comodo GeekBuddy and a browser with enhanced protection for web surfing Comodo Dragon. There is no point in contacting the first program for those who do not know English language and is not going to pay for technical support from Comodo at the end of the free period. You can download another program - the Comodo Dragon browser based on Chromium - for free on the Internet and install it at any other convenient time when the question arises about changing the browser.

Now you can safely press the “Forward” button.

In the next window, we are forced to install Yandex elements along the way and the omnipresence of this search engine in the browser. Let's refuse this service, since it can hardly be called a missed opportunity in life. Click the start installation button below.

The program will install. After launching it, we will see that the computer needs to be restarted. Click the “Fix” button.

Launching Comodo Firewall

The computer will reboot and we will find a lot of Comodo Firewall windows on the desktop - information about Comodo technologies, a program gadget and a window presets firewall, where we need to indicate which network the computer is connected to - home, work, or a network in a public place, for example, with a Wi-Fi access point.

After this, Comodo Firewall will minimize to the system tray, from where the program interface can be called up at any time.

For any actions performed on the computer for which the firewall has not yet created a rule, you need to give it approval, unless, of course, we are talking about an unauthorized launch.

You will have to approve the launch of every program unknown to Comodo Firewall on your computer until the firewall develops rules of behavior for each of the programs launched. Of course, at first you will have to tinker, but this is actually a small price to pay for the ability to control network connections.

Setting up Comodo Firewall

Comodo Firewall is designed for a wide range of users, including beginners, and the computer will be safe even with the settings preset by the developer. But more experienced users will certainly be interested in using the capabilities of Comodo Firewall for enhanced computer protection.

We launch the firewall using its shortcut in the system tray. In the main window that opens in front of us, we see the program status - the computer is protected. We also see the number of network intrusions, the number of blocked intrusions, and software updates.

Using the button in the upper left corner, we can switch to the program displaying a detailed summary. And then return to the summary view again.

In the main window of Comodo Firewall there is an option " Game mode" Game mode is essentially a full-screen mode not only in games, but also when watching videos, as well as in any other applications that are displayed in full screen. When we switch to this mode, the firewall will not bother us with its notifications and will make all decisions itself.

To open advanced firewall settings, in the main Comodo Firewall window with a detailed summary, click the “Firewall” link.

Will open detailed settings firewall, where you can change certain preset parameters.

You can, for example, at the top of the settings window, change the preset “Safe Mode” of the firewall, when the network activity of programs in the list of trusted ones is allowed, and Comodo Firewall does not jerk on every occasion, to other modes. For example:

“Full blocking” - in this mode, any network activity is excluded. This mode is simply irreplaceable if your computer is infected with a virus.

“Custom set of rules” - as the name of the mode implies, it provides for strict control and user participation in decision-making for each network request for which there are no previously defined rules.

“Learning mode” - in this case, Comodo Firewall does not interfere with the activity of running programs, but only monitors events.

© 2024 ermake.ru -- About PC repair - Information portal