How to Install Comodo Firewall

toggle-button

 

This guide was written for version 8.0 of Comodo Internet Security (CIS). This guide will work equally well for configuring Comodo Firewall, but the screenshots are from CIS.

 

Please note that in terms of system protection this article is not really meant to be viewed in isolation. Please read my article about How to Stay Safe While Online in order to get an overview of what you can do to protect your computer. Comodo Firewall provides rock solid protection and is entirely free. If you like you can even download Comodo Internet Security, which comes with Comodo Antivirus. This is also completely free.

Recent Changelog:

6/10/2014-Replaced http links with https links wherever possible.

9/14/2014-Updated advice to show how to remove messages from COMODO Message Center

11/17/2014-Updated article to reflect the newly released CIS version 8.0

 

Index

1. Installation

2. Changes To Configuration

    A) General Tweaks To The Configuration

    BConfigure Antivirus

    C) Configure Defense+

    D) Configure Firewall

3. Advice On How To Use Comodo Internet Security

4. What To Do If You Have Further Questions

 

1. Installation

 

Before installing security software designed to protect your computer I find it's best to first ensure that your computer is already free of malware. I know it sounds like strange advice, but this can prevent many problems further down the road. To do this please follow the advice I give in my article about How to Know If Your Computer Is Infected. Note that, as mentioned in that article, I would advise that you submit all unrecognized files to Comodo to be whitelisted. That article explains how to do this. If all of the files on your computer are whitelisted you will find Comodo Internet Security to be very quiet, except when there is a possible threat.

 

After this is done you can download the installer. Here are the download pages for Comodo Internet Security and Comodo Firewall. Please download whichever you would like to install. If, at a later time, you decide that you want to switch from one to the other you can accomplish this by going to the start menu, finding Comodo, and selecting the option to "Add and Remove components".

 

Options During Installation

During installation you will first see a scren which asks you whether you want two options to be enabled. I would recommend leaving the box to "enable 'Cloud Based Behavior Analysis'..." checked. I would strongly advise that you leave this option checked. This will upload all active unrecognized programs to Comodo for analysis. These files will then either be added to the whitelist or added to the definitions for the antivirus. This will make Comodo Internet Security both easier to use and more powerful against threats. The other box, to "Send anonymous program usage...", you can uncheck if you desire, or you can leave it checked. It's entirely up to you.

 

Before going to the next screen select the option in the lower left-corner called "Customize Installation". In addition you should select the small option near the bottom of the window that says "Customize Installer". This will give you the option to choose which components, and additional programs, you would like to install. You may wish to consider leaving the option to install Comodo GeekBuddy checked. This is a free trial program through which Comodo technicians can remotely diagnose, but not fix, problems with your computer. This trial period will only start once you first use it. If at a later date you decide to purchase the product then the technicians can also remotely fix any problems with your computer. However, if this does not sound useful you can deselect it. Also, if you do choose to install it you can always choose to uninstall it later.

 

You are also given the option to install the Comodo Dragon browser. If you do not wish to install this then deselect this option as well. You can also uncheck the option to "Install PrivDog...". This is an adblocker similar to Adblock Plus. However, it replaces most ads with ads which are verified to be safe, but which may still be able to provide the site you are viewing with some revenue. Personally, I use Adblock Plus, but the choice is yours. Once you're done, click on Back and then click Next.

 

On the next screen you are given the choice to change your DNS servers to Comodo Secure DNS Servers. This will automatically block any websites that Comodo knows to be dangerous. However, I have noticed that Comodo DNS sometimes tends to block legitimate sites. Thus, if you would like to use the security of a secure DNS serverI would recommend following the advice I provide in this section of my article about How to Stay Safe While Online, or just use the default one from your ISP. Thus, my recommendation would be to uncheck the option in this installer about enabling Comodo Secure DNS. You can also uncheck the option to change your home page and search engine to Yahoo. Leaving it checked will help to support Comodo, but it is very easy to opt out if you do not wish to use Yahoo. After that you can click "Agree and Install" and the installation will begin.

 

2. Changes To Configuration

 

Not long after the installation is complete, assuming you installed CIS, it will download the virus database and begin running a quick scan of your computer. Let this scan complete. Unless you have a slow internet connection this process should only take about 5-15 minutes. Either way, I would suggest letting it complete its scan. After the initial scan is completed any subsequent scans will be much faster due to Comodo's new caching technology. Once it's done you can close the scan window. However, note that once you close the scan window it will ask you to restart your computer. Do not yet allow it to restart your computer.

 

At this time you may also choose to disable User Account Control (UAC). Personally I do disable it. However, there are some reasons to leave it enabled. One problem is that disabling this will turn off protected mode in Internet Explorer. It will also disable file/registry virtualization for Windows Vista and Windows 7. In general, UAC controls who can run specified applications that require elevated Administrator privileges. For more information please read this article.

 

A) General Tweaks To The Configuration

Change Overall Configuration

One of the most important changes it to change the default configuration to Proactive Security. For an explanation of the differences between the configurations please see this page. To do this open the main window for Comodo Internet Security. Then click on the green task icon on the upper right hand corner of the Window. This will flip the screen to show you the task window, which contains the configuration options. Click on the section for "Advanced Tasks" and then select the option to "Open Advanced Settings". Make sure the dropdown menu under "General Settings" is shown and then click on the Configuration option.

 

Now right-click on the option for "COMODO-Proactive Security" and select Activate. It will ask you whether you want to save changes, but at this point you can select no. It will then ask you to restart your computer. Make sure you select OK on the Advanced Settings Window. Then, you can either restart your computer now or you can postpone it again and continue making changes.

 

Other General Steps

After this again open up the main screen for CIS. This time click on the icon on the upper left hand corner of the screen, as shown in the picture to the right, to switch CIS to advanced view.

 

Then click the icon at the bottom of the windows labeled Scan. Those with CIS installed should select the option to run a "Rating Scan". Note that if you did not install the antivirus component clicking on scan will automatically begin running a rating scan. Allow this scan to complete. Unless you have a slow internet connection it should not take more than a few minutes.

 

What this is doing is scanning the critical areas of your computer and compiling a list of which files are already known to be safe, dangerous, or unknown. No action is required on your part as long as you already followed my advice about how to ensure that your computer is not infected. The only reason I ask you to do this now is that it will help make Comodo Internet Security a little bit faster and less resource intensive than it otherwise would have been. Once the rating scan is complete you can close the rating scan window without selecting any action for the files, unless you would like to remove some bad files or trust some unknown files which you know to be safe.

 

Once the scan window is closed please once again look at the main window for CIS. For the section labeled Auto-Sandbox left-click the text next to HIPS which reads "Safe Mode" and change this to Disabled. My configuration will actually not require you to enable the HIPS. This version of Comodo Internet Security is designed in such a way that you can achieve the same amount of security without enabling the HIPS. Everything we will need is actually now contained within the Auto-Sandbox , which will provide far fewer popups.

 

Then once again flip the screen to get to the Tasks window. Then go to the section for "Firewall Tasks" and click on the option for "Stealth Ports". In the window which pops up click the option to "Block Incoming Connections". Then go to the section for "Advanced Tasks" and once again click on the icon for "Open Advanced Settings". Under the section named "User Interface" deselect the box named "Show messages from COMODO Message Center". This will prevent CIS from displaying any advertisements. While in this same area you can also choose to disable the sounds which CIS now plays when an alert is shown, if you wish. When you are done select OK to save your changes and close the window. Then leave this window open and continue to the following steps. We will use this window to complete the rest of the changes which will be made to the configuration. I have broken the rest of the advice into that which is applicable for each of the main components of Comodo Internet Security.

 

B) Configure Antivirus

Assuming you chose to install Comodo Internet Security you also installed the antivirus component. Please open the Advanced Settings again. Then, make sure the dropdown menus under "Security Settings" are shown. Click on the one for Antivirus. Then click on the one for Scans. If you do not want your computer to run scheduled scans you can slide the toggle for both scans to deactivate them. Other than that there are not really any other changes which need to be made to the antivirus component.

 

Also, as strange as this may sound, any scans run from right-clicking on a file or folder use the settings for the Full Scan. Thus, for example, if you would like for right-click on-demand scans to check all files against the cloud, you should first right-click on Full Scan and choose edit. Then go to the Options section. Under here you would check the box for "Use cloud while scanning". However, do note that making this specific change will make any Full Scans you run take much longer. You can also make any other changes you like to these settings. Once you are done make sure that you select OK to save the changes.

 

C) Configure Defense+

All of the most important changes I would recommend for the Defense+ component have already been made. However, there are some optional changes which you may want to consider.

 

Optional Change

 

If you like you can make sure that Defense+ is selected. Then, under this click on Sandbox and then Sandbox Settings. From this you may choose to disable the option to "Show privilege elevation alerts for unknown programs". What this will do is ensure that the only popups you get are to let you know that an application has been sandboxed. The program will not ask you whether you want to allow an application or not. Thus if you select this option you will not have to answer a single Defense+ alert. Every program, even if it is an installer, will automatically be sandboxed.

 

If this is not disabled running most unknown installers will prompt an unlimited rights popup, which would ask you whether you trust them. However, do note that if sandboxed none of these programs would be installed on the real computer. They would be installed in the fully virtualized environment. Thus, disabling that option will ensure that you receive fewer alerts, although you will still receive a few from the firewall component, but it will also mean that all unknown programs will always be run in the fully virtualized environment. Thus, I would recommend making this change only if you are an advanced user and are prepared for the consequences.

 

D) Configure Firewall

Strongly Recommended Changes

Now open the dropdown menu for the Firewall component. Click on "Firewall Settings" and check the boxes for "Filter IPv6 traffic", "Block fragmented IP traffic", "Do Protocol Analysis", and "Enable anti-ARP spoofing". Selecting these will likely not have any negative side-affects on your browsing experience. However, if you do find that you are having trouble with your internet/network connections please try unchecking these options as they are likely the culprit. Also, although it's preferable to leave it checked, in some cases the option to "Filter loopback traffic" may cause certain DNS services to not work correctly. This is rare, but if this happens you can uncheck the option to "Filter loopback traffic". However, as long as there are no problems I would advise that you leave it checked.

 

Optional Change

Also, if you do not want any unknown programs to be able to access the internet you can check the box for "Do NOT show popup alerts" and then change the behavior to "Block Requests". This will automatically block all unknown applications from accessing the internet. Thus, if you select this option, and the optional one for the Defense+ component, the only popups you will see are those for the sandbox. Also, note that the sandbox popups do not require any user input. Thus, Comodo Internet Security will now be entirely automated and will require no user input at all.

 

However, making this change to the firewall configuration will cause some unknown programs to not be able to operate correctly and will also result in any unknown installer, which must download files from the internet, failing. Thus, I would recommend making this change only if you are an advanced user and are prepared for the consequences. Note that if you do run into problems with this change, you should just uncheck the option.

 

When you are done making your changes select OK. This will save all changes and close the advanced settings window.

 

3. Advice On How To Use Comodo Internet Security

 

How To Answer Defense+/Sandbox/Firewall Alerts

In terms of how to use this program it's really quite simple, at least for the most part. The main problem is that although there are very few alerts which you will have to answer, there are still some decisions which will have to be made. For ordinary sandbox alerts no action will be required on your part. CIS will just show a small popup on the lower right-hand corner of the screen to let you know the application has been sandboxed. However, this popup will provide you with the option to trust the application.

 

For any popups, regardless of which component they are from, it is very important that you do not just allow an application because you want to get rid of the alert. If you do this you greatly decrease the protection offered by Comodo Internet Security. In general, regardless of what the alert is asking, you should only allow a program access to your computer if you are absolutely sure that it is safe.

 

If you're not sure whether an application is safe or not I would advise that before allowing it you take some time to check it by following the advice I give in my article about How to Tell if a File is Malicious. However, if you're not sure what to do I would advise that you select the option to block the request or, if it is a sandbox alert, do nothing and leave the application sandboxed. If you do otherwise you may inadvertently allow a malicious program access to your computer.

 

Overview of What Game Mode Is

CIS also has an option called "Game Mode". If you choose use this no Defense+ alerts, Firewall alerts, update popups, or scheduled scans will be shown or run. Thus, these cannot interfere with what you are doing. However, what enabling this will also do is create automatic allow rules for all running applications. Thus, running your computer in game mode will essentially put your computer in training mode, which I would not advise as I consider it to be dangerous. Thus, I would advise that you do not use "Game Mode".

 

Brief Overview of How the Auto-Sandbox Works

Also, I would quickly like to briefly mention the way in which Comodo's sandbox component works. If a piece of malware is not yet detected as dangerous by Comodo it will automatically be sandboxed. When in the sandbox it may be run in a fully virtualized environment where it is not able to harm, or affect, the real system.

 

Overview of Comodo Virtual Desktop

Comodo Virtual Desktop creates a fully virtualized environment on your computer. It can be accessed by going to the tasks window, going to the "Sandbox Tasks" section, and clicking on "Run Virtual Desktop". This starts the fully virtualized environment which is mainly meant to be used for web related activities. It is not really designed for installing other programs, although many programs will install correctly inside of it. In addition, any programs which are installed on your real computer, and have a shortcut sitting on the desktop, will be able to be launched from inside the Virtual Desktop. However, note that in order to access them you will need to switch from the tablet screen to the desktop screen. This is done by flipping the window by clicking on the orange icon, just as you would with the CIS window.

 

Also, please do be aware that due to restrictions, which help protect you from dangerous malware, there are certain types of programs which will not be able to run inside the Virtual Desktop. Also, note that if the Virtual Desktop is closed and then started again no applications will initially be running. This would include any malware which may have been running. Thus, I would recommend that before performing sensitive actions such as online banking you at least close the Virtual Desktop and then open it again just before you go to the banking site. If you like you can even choose the option to "Reset Sandbox", which will delete all information which was inside it and provide you with an entirely fresh sandbox the next time you run the Virtual Desktop.

 

Also, the shared space folder, of which a shortcut is placed on your desktop during installation and an icon is placed in the main window for CIS, is the folder which is shared by both your actual computer and the Comodo Virtual Desktop. Thus, any files placed in there will be shared between the two environments.

 

Optional Cosmetic Changes

If you would like to run your browser sandboxed, but would prefer not to use the Virtual Desktop, you can instead use the widget. This is the small window which has been added to your desktop. This will automatically detect and display all browsers currently installed on your computer, along with other useful information. Clicking on the icon for that browser will cause it to be run sandboxed with full-virtualization. Note that you can also right-click on the CIS icon and either add or remove information from the widget.

 

Please note that any changes you make to the browser while sandboxed, such as bookmarking a page, will not be saved to your unsandboxed browser and will in fact be deleted when you reset the sandbox. Note that if you do not want to use the widget you can remove it by right-clicking on the CIS icon, selecting Widget, and unchecking the option to Show. Personally, I use it often, but if you find it an eyesore it is easy to remove.

 

If you like you can also open the Advanced Settings again. Then, under General Settings make sure that User Interface is selected. In this area you can choose between different themes which come with CIS. From here you can choose the Theme which suits you best.

 

The main window of Comodo Internet Security also provides you with the option to add task shortcuts to the task bar at the bottom of the window. To add additional task shortcuts you can flip the screen to the task window, navigate to the task you want to make a shortcut of, right click on the icon for it, and select "Add to Task Bar". I would suggest you do this for any tasks which you find you are using often. Note that you are also given the ability to drag the icons around on the main window.

 

4. What To Do If You Have Further Questions

 

Note that if at any time after installing this product you encounter serious problems with it, which running the diagnostics cannot fix, it may be helpful to reinstall it. If you do decide to reinstall Comodo Internet Security it's best to do this by following the steps I outline in my post on this page.

 

If you do have any other questions please peruse the online help files, which can be found on this page. If you still have questions then I would advise that you search the Comodo Forums for a solution. If someone hasn't already created a post with the same problem please feel free to join the forum and create a post of your own. The community will do their best to help you with any problems that you may encounter.

 

 

 

 

Please help by rating this article. Also, if you believe this article deserves anything less than 5 stars, please leave a comment below explaining how you think it can be improved or where you find fault. This article is written by me but fueled by the community. Thus your opinions and advice are not only much appreciated, but actually necessary in order for this article to grow and improve.

 

If you found this article useful then perhaps you'd like to check out some my others.

Best Free Antivirus Software

How to Avoid Spam

How to Clean An Infected Computer

How to Fix a Malware Infected Computer

How to Harden Your Browser Against Malware and Privacy Concerns

How to Know If Your Computer Is Infected

How to Protect Your Online Privacy

How to Report Dangerous Websites

How to Report Malware or False Positives to Multiple Antivirus Vendors

How to Report Spam

How to Stay Safe While Online

How to Tell if a File is Malicious

How to Tell If A Website Is Dangerous

 

This software category is in need of an editor. If you would like to give something back to the freeware community by taking it over, check out this page for more details. You can then contact us from that page or by clicking here

 

Please rate this article: 

Your rating: None
4.77066
Average: 4.8 (593 votes)
toggle-button

Comments

I just updated this article to contain the most up-to-date information for the newly released CIS Version 7.0. Please let me know what you think.

Hello Chiron,

I wanted to say thank you for making this guide. I've used it myself for awhile now, for myself and other people's PCs that I've installed Comodo on. I've been a Comodo user for so many years I've stopped counting. I have a couple questions and I hope you don't mind answering them.

I want to know if there are any changes you would make to this for gaming on a pc? If so do you have another guide or could you list the changes you would make? I do want to add right off the bat that stealthing the ports will make the games not function.

Will checking "Filter IPv6 traffic", "Block fragmented IP traffic", "Do Protocol Analysis", and "Enable anti-ARP spoofing" effect any games and connectivity to them?

If a company is on the trusted vendors list, such as Blizzard(Diablo 3, WOW) why the need to allow it? Shouldn't it be automatically accepted since it's a trust vendor?

If you put a running process(game) as trusted under files would I still need to setup the firewall to allow it to prevent any interference from the firewall?

I have a AMD HD card.If it's trusted then why when I do a rating scan do so many of it's .dlls come up unknown?? I have trusted all of them.. is this a bad move?

And for my last question. It's kind of like the one about only with .Net framework. When I did the rating scan it also came up with unknown for .NET framework and others that were done in Microsoft update. I checked online to make sure the dlls were save and they came back legit. Should I of left them as unknown instead of marking them trusted?

Thank you for your time.

In general I think it should be fine to keep the configuration the same for a computer meant to play games. As long as nothing is sandboxed I don't see any problems, and even if it is sandboxed all you have to do is add it to the Trusted Files List and it should be fine. As for my advice for the Firewall, I would think checking those boxes should not cause issues. However, if you do experience lag please try unchecking them and see if it helps. They may slow down the connection a little bit. If a company is in the trusted vendors list it should be allowed. What problems are you having with Diablo 3? Are the firewall rules you create not being saved? As for the rating scan, although the main exe may be trusted, and as it's trusted so are the dll's it calls on, this does not mean that CIS recognizes the dll files as trusted by hash. Thus, it should be fine to add them to the trusted files list, assuming you are sure they are safe. With your other question about the .NET framework, if you are sure the files are safe it's fine to add them to the trusted files list. It may even help speed up your computer a little. Let me know if you have any other questions. Thanks.

For games(Diablo 3 and others) I've just added them to trusted and under firewall I put them as allowed applications, I don't make any separate rules for specific games. Should I be making specific rules for each game?

Thanks for the feedback =)

If setting them as an allowed application works I don't see a need to create separate rules for each game. If your aim is just to get the games working you appear to be doing this the correct way.

I have a new laptop with windows 7 premium 64 bit. It came with no anti-virus so I tried to install Comodo 6. When prompted to restart during install I did so and computer did not restart. Now power button comes on when pressed but the screen remains black...nothing. The laptop worked before install of Comodo and had no other installs before this. Any help?

Hello,
Thanks for the quick reply.
If only I could get to see anything on the screen. I know the computer is on (I can hear it) but nothing comes up on the screen at all. I have shut it off and powered it up again but the screen does nothing. So to answer your question, no because I can't see anything on the screen.

Presumably you have attempted this routine to access safe mode? "If your computer has a single operating system installed, press and hold the F8 key as your computer restarts. You need to press F8 before the Windows logo appears". The necessary "F" key might be different for your machine. On mine it is not F8 but F11 and I need to press it repeatedly after turning on the power switch. If you still have no joy, please post details of your issue here in our forum as we are unable to provide extended support in the comments sections. MC - Site Manager. http://www.techsupportalert.com/freeware-forum/general-computer-support/

Thanks again,
Tried that, nothing but black screen. I'll move this issue to the support forum.
Cheers

I'm sorry to say I haven't heard of a problem like this before. It's possible that this is either a coincidence, and it's actually caused by a hardware failure or that somehow Windows itself was damaged. It's difficult to diagnose at this point. When you start your new topic please contact me through my contact form and let me know where the topic is. I'd really like to try and help you with this. Sorry.

Hello,
Just wanted to update on the Laptop black screen issue. New laptop with windows 7 installed, tried to install Comodo 6 anti-virus as the first program on it. Not thinking about all the updates windows need to install to bring it up-to-date and was installing in the background while I was trying to install Comodo. It was a crash waiting to happen and a valuable lesson learned. I was able to get into safe mode by taking the battery out letting it sit, then re-installing the battery and rebooting. In safe mode I was able to uninstall Comodo and reboot. Now I'm installing 130 and counting windows updates, when this is done I'll try Comodo again, fingers crossed.
Thanks for the quick replies and help.
Cheers

Good news. Hopefully things will resolve themselves after the update. This is also a good lesson for those installing Linux. So many times I hear about "issues" that could have easily been avoided if the base install had been updated before installing other software, changing themes or tweaking the system in general. MC - Site Manager.

Hello Chiron, your articles are always fantastic, thanks very much for them!

Sorry me for my English but can you answer me one doubt, please? In the old article, with Comodo Firewall 5, I remember that there was a configuration that you needed to put something with * and other symbols. I remember that in the article you said that command was for blocking everything and to give 100% of protection. In this new Comodo Firewall 6, there are not more need to put this command? This command was put in the Defense+ tab if I'm not wrong.

Thanks again!

Version 6 has been improved such that it is no longer necessary to make that change. Don't worry, you're just as safe with V6 as V5. Thank you and let me know if you have any other questions.

So with the version 6 that command line that has needed to put in version 5 is "enabled by default", let's say in these terms?

Thanks very much for the quick answer, Chiron!

Not quite. However, the protection is now configured in such a way that ransomware can be properly blocked without making the change which was necessary for V5. Making that change for V5 made it more chatty. Now it's possible to get the same level of protection with V6, but with less alerts.

Thanks very much for the answers, Chiron! :)

You're welcome. Let me know if you have any other questions or suggestions. Thanks.

1. Thanks to Chiron for a great article.

2. If it's helpful to anyone: I was about to tear my hair out and order a hit on the Comodo programmers when I correctly guessed that the reason Comodo wasn't installing properly was because of some conflict with Sandboxie. (Not that I was stupid enough to be running a sandbox, it was just the controller). I killed the Sandboxie process, and everything worked well. I don't know who to blame for this, but I will say that as wonderful as Comodo is, the "interface" of the installer is scandalously bad.

3. Should I keep Sandboxie, or is the Comodo sandbox / kiosk good enough?

4. "My configuration will actually not require you to enable the HIPS." Let's suppose I'm really paranoid and leave it on. Any performance hit / conflict / significantly different behavior?

5. This is outside of the scope of the article: I noticed a bunch of other free software at the Comodo site. Assuming they're good, tt would be interesting to see reviews of them elsewhere on this site.

6. Again, thanks to Chiron.

1. And thank you for taking the time to leave a helpful comment. 2. I was not aware of that, and have not heard of any similar situations. I've created a post on the Comodo forum here: http://forums.comodo.com/install-setup-configuration-help-cis/problem-in... I'll find out if it's a common problem, and if it is update this article. 3. That depends on what you want to use if for. The Kiosk is at least as strong as Sandboxie, but not yet as configurable. 4. There will be a slight performance hit (not huge) and you will receive more alerts. Essentially, the HIPS allows you more granular control over applications, but if you follow my advice there is no loss in security by just using the Behavioral Blocker. 5. Agreed. However, in general I don't just do reviews of applications. I believe some are already reviewed, but if there are any in particular you would like to see reviewed please post them in the techsupportalert forum. That's probably the best place to receive feedback about that. 6. And again, thanks to you for bringing up these issues and asking these helpful questions.

After recently having my pc reimaged because of malware infestation, I have followed Chiron’s advice in his outstandingly clear articles on my favorite website: I’m trying suite protection, going with Comodo Firewall (6.2.282872.2847), which I installed according to Chiron’s precise instructions (after first checking the forums for any conflicts with my company-provided AV, Microsoft Forefront Endpoint Protection 2012). Unfortunately after installation, my browsers will open on their own, but not in Comodo’s sandbox mode; nor will the kiosk open (in fact, after trying either one, the computer slows considerably or hangs altogether). Does anyone have any suggestions as to what step to try next? I thought I’d consult you before switching my AV to Avira (that would be my next step, rather than trying the Comodo Antivirus).

I have studied carefully the CIS website and FAQs. I have installed no other security software, so I suppose that it may be the Microsoft AV that is causing a conflict (I also cannot open CCE). I have also tried changing the firewall settings ("Filter loopback traffic," "Filter IPv6 traffic") and restarting, to no effect. I have already accepted all unknown programs and have no unrecognized files in my logs (although CF did successfully sandbox and then approve a program upgrade; so that feature works). Also, I have no infections.

The second question, perhaps of more general interest, is: assuming no change, should I uninstall Comodo and opt for multiple-programmed protection (Sandboxie, WinPatrol, etc), or does CF give me a core of protection, even without sandboxing, on which I can build (but then must I not change Chiron’s recommended settings by enabling the HIPS? and if so, to what setting?)? Thanks in advance for any and all feedback!

Other details: OS Win 7 Enterprise 64 bit (w CF 64 bit), SP 1, UAC never, No VM

As per your first question, this is not intended behavior. There may be a bug you have run into. However, my first advice would be to try uninstalling by following the advice I give here: http://forums.comodo.com/install-setup-configuration-help-cis/most-effec... However, if the problem is still not fixed please create a new topic in the techsupportalert forum and send me a link to it. That's the best place to try and troubleshoot issues like this. For your second question, you can couple this with other programs, although WinPatrol would be redundant. However, you can certainly use Sandboxie instead of the Kiosk. Currently Sandboxie is more configurable and I believe many others are currently using that combination. If you do choose to do that you can still use the settings which I recommend. These will still work just fine. Please let me know if you have any other questions. Thanks.
I just updated this article to contain the most up-to-date information for the newly released CIS Version 6.2. Please let me know what you think.

Chiron, I just wanted to say THANKS SO MUCH for a wonderfully thorough installation guide for Comodo Internet Security. I had used Comodo in the past and just got tired of all the popups, etc., and uninstalled it. After following your guide yesterday, everything is working beautifully so far!

Thank you very much. Please let me know if things stop working so beautifully and I can try and help. Also, feel free to ask any other configuration related questions you may have. The more feedback I get the better the article becomes. Thank you.

Hi again Chiron,

Had to revert back to V5.12.

V.6 caused the following:-
1) Start up to Log on was 3+ minutes. It was about 5 sec, when reverted back to V5.12, now back to 5 sec (Start up settings at 0 sec).
2) Could not log on to wireless internet (limited access) even with connections listed in Firewall Network Zones. Had to disable firewall, repair connections then re-enable firewall.
3) Wireless connections would 'drop' to limited access after a while, sometimes in minutes sometimes hours. Had to constantly do 2) above. Tried different settings for Firewall Settings - Advance, didn't work even with all unchecked.

Now back to V5.12 everything is working fine (with your old V5 guide that is).

Lenovo Y400 XP SP3
Avira Free
OpenDNS DNSCrypt

1) This was a known bug which affected some users of Windows XP. The most recent version solves this issue. 2,3) These seem strange. Did you try reinstalling by following the methods I suggest here: http://forums.comodo.com/install-setup-configuration-help-cis/most-effec... It's possible that the issues you are seeing are from a bad installation. If so then reinstalling by those methods would likely solve the problem. Also, be sure not to import any settings into your new installation. That's another possibility for where the problems came from. Please let me know if that helps. Thanks.

Hi Chiron,

1) Version installed was 6.1.13008.2801

2) Did do most of 'Most Effective Way to Reinstall/Update CIS to Avoid/Fix Problems' except for No.7 on drivers (used Revo - removed all reg & files, reboot then CCleaner-registry cleaner & Eusing). Then new install with V6 guide. This was after update was unsuccessful.

I suspect it was due to OpenDNS dnscrypt-proxy.exe as V5.12 did pop up for action occasionally until I 'trusted' it. V6 did not.

Will wait until further V6 issues has been resolved before trying again, also V5.12 seems lighter on the system.

Thanks.

The new version should resolve the issue you had for problem 1. 2) Did you use the removal tools I recommend. If not please try reinstalling by running these in safe mode after fully removing the program with Revo. If you still experience issues after that then I would recommend that you start a new topic in this section: http://forums.comodo.com/firewall-help-cis-b135.0/ of the Comodo forum. It's likely that someone there will be able to help you. Thank you.

Pages