Hello, dear readers of the blog site! In this article, I continue the big topic I touched on protecting your computer from various types of threats. In my last article on this topic, I started talking about protecting your access to the Internet and program control using a special protection component - Firewall, which is part of Kaspersky's advanced protection - Kaspersky Internet security. In another way, Firewall is also called - " Firewall” or “Firewall”.

And now I will again talk about Firewall protection, but from another developer and which can be installed separately along with any anti-virus product, without specifically installing comprehensive protection from one manufacturer. The product I want to talk about is called Comodo Firewall. Its most important advantages are free and high quality traffic protection!

In one of the previous articles, I already mentioned that Comodo also offers free antivirus(read about it here: ) or completely free comprehensive protection: Comodo internet security. However, the antivirus itself from this developer is not as reliable as, for example, Kaspersky Anti-Virus or Avast, so I recommend installing only a firewall from Comodo and, separately, a reliable antivirus from another developer. Or use the Kaspersky Internet Security package.

Consider the installation and basic settings of the firewall from Comodo.

Comodo Firewall installation process

Installing a standalone Comodo Firewall product is pretty much the same as installing a Comodo antivirus, so I'll go through the process more briefly without commenting on each customizable option.

You can find more detailed installation comments at the beginning of the article, the link to which is given above.

So let's start:

Configuring Comodo Firewall

Setting up Comodo's Firewall is simple and almost everything will already be configured optimally by default. We just have to check and, if necessary, correct something. Before configuring the Firewall component itself, let's do some actions with the main Comodo settings:

    Immediately after installing the Firewall, a pop-up window will appear in which you need to select which network you are connected to. Select "I'm at home":

    Now we launch the main Comodo Firewall window by clicking on the tray icon (the area near Windows clock) and see a big Exclamation point(which reports that some component is not working) and an active "Fix" button. In this case, we only need to reboot, because after installation, not all protection components were launched.

    Just click the "Fix" button:

    The computer will restart and after the system boots, the Firewall components will already be enabled and the warning icon will disappear.

    If you have Windows 7, then an absolutely unnecessary widget from Comodo will flaunt on the right side of the desktop :) This is how it looks like:

    Let's take it away. To do this, click right click mouse over the Comodo tray icon, select the "Widget" item, and then click on the button marked with the "Show" checkbox:

    As a result, the widget will disappear and will no longer be an eyesore, and will also consume system resources :)

    Now we launch the main Comodo Firewall window again from the desktop or from the tray and update the databases by clicking the appropriate button (see the image below):

    The database update will start and if there are new versions, they will be updated. The window will then close automatically after a few seconds.

    Even if you set latest version antivirus or firewall from the official website of the developer, I still recommend checking for updates immediately after installing the product.

    Now we proceed directly to checking the settings of the component - the firewall. For convenient access to all settings, switch to the extended mode of the main window. For this, on the left upper corner click on the little button as in the image below:

    Now the main window of Comodo Firewall is being transformed a little and we will see more features. But the main thing is that now we can easily go to the settings of the firewall itself. To do this, simply click on the "Firewall" link in the upper left corner:

    As a result, we get to the first Comodo firewall settings window.

    As soon as we go to the settings, we will see the very first menu from the “Firewall” category - “Firewall Settings”.

    These settings are optimal, but I will make some comments.

    The “Enable Firewall” checkbox, of course, is responsible for enabling or disabling protection. In no case do not uncheck the box, otherwise there will be no sense from the installed Comodo Firewall immediately, since the firewall itself will simply be turned off :)

    Next to the checkbox to enable / disable the firewall, there is a list where you can select the security mode. Let me tell you briefly about these modes:

    • Complete blockage. By selecting this mode, the firewall will block absolutely all connections, both incoming and outgoing, and from any networks. Your computer will be isolated as if you turned off all networks on your computer and unplugged the network cable.

      This mode, in principle, is not needed as such, since the expediency of its use can only be when working in extremely dangerous unsecured networks, in which various virus threats walk in crowds.

      Custom set of rules. By selecting this mode, the firewall will work and block traffic only according to the rules for programs and networks that we set ourselves. In this case, the firewall will not take into account that the program is trusted and has a digital signature. He will make decisions only on the basis of the rules we set.

      Safe mode. This is the mode I recommend. When working in this mode, the firewall itself creates most of the rules for trusted applications that have valid digital signatures. Based on this, he chooses which connections to allow a particular application, and which not. When it detects unidentified and untrusted programs, Comodo will give the user the choice to allow or block the connection, telling what action the application was going to perform.

      Learning mode. In this mode, the firewall will not show any notifications and will itself create rules for all applications, allowing them network requests. The mode can only be used if you are 100% sure that the applications installed on your computer are reliable. As a rule, this cannot be, so I do not recommend using this mode :)

    In the firewall menu "Rules for applications" we can set rules for any applications or see the rules already created earlier.

    All already created rules will be visible immediately if you click on the "Rules for applications" menu. In order to add your own rule, right-click on an empty area in the window and select the "Add" item:

    Now I will show by example how to block access to the network of any of the programs.

    To do this, in the window that opens, first of all, you need to select the program for which we are creating the rule (as I indicated for the example: block access to the network). We click on the "Browse" button, after which you can select many files at once by selecting the "File groups" item and marking the appropriate group. You can also select one of the running in this moment processes in the system and create a blocking rule for it. But it is more convenient to select the "Files" item:

    After we select "Files", the explorer will open, where you need to select the program for which we will create the rule. For example, I will block access to the Internet to a well-known browser - Mozilla Firefox. I look for the folder where Firefox is installed and select the file responsible for launching (firefox.exe). Then I click the "Open" button in the explorer:

    Now we will automatically return to the previous window and see that the path to the program we specified has now appeared in the “Name” field. We mark the item "Use a set of rules", then on the right from the list of ready-made rules we select "Blocked application":

    After all the settings in this window are set, click the “OK” button below to save them:

    As a result, we will return to the window with a set of rules for programs and in the list we will see a newly added program (in my example, Firefox) with the “Blocked application” rule. In order to immediately check the result, you need to apply all the changes in the rules and click the "OK" button at the bottom again:

    To test my action, I run Mozilla browser Firefox and try, for example, to open our favorite blog - site :) As a result, I get the error "Connection attempt failed":

    And this is exactly what we needed for the example :) Connections for Firefox are blocked. It is clear that, seriously, Firefox, of course, should not be blocked. This was just an example :) It is possible and necessary to block programs that do not need access to the Internet or programs that are untrusted.

    The created rule is even easier to delete. You need to go back to the firewall menu - "Rules for applications" and, by right-clicking on right rule, select "Remove from list":

    In our chosen "Safe Mode", Comodo Firewall will be very good at picking up rules for applications and we rarely have to dig and configure the rules ourselves. Basically, this is where it ends. important settings firewall from Comodo for beginners. I do not recommend making any settings in the rest of the firewall menus, since they are already intended for much more experienced users those who understand computer networks and have a more complete knowledge of working with networks in operating systems.

The settings that I showed are quite enough to protect the computer from hacker attacks and block access to the Internet for untrusted applications or those that we ourselves choose.

Surely you noticed that in addition to the "Firewall" section, there are other sections in the settings, for example: "Protection +", "File rating", " General settings». Required settings of these sections, I have already described in one of my previous articles - "Another good free antivirus - Comodo", so if necessary, you can read about them in that article by clicking on the link above.

And with this, I conclude the last of the articles planned by me at the moment.

Ahead of you is not a single article on computer topics, for example: backup data, remote control computer and others :) I think that a periodic deviation from the topic of surfing and earning money in the direction of technical issues is even useful. Thus, on the same favorite blog, in addition to continuous information about earnings, we also study our computer and everything connected with it :)

See you soon! Good luck to you;)

Good day dear readers.

It has long been no secret that any modern person cannot do without a computer and the Internet. The World Wide Web has become an integral part of most of our lives. This is a storehouse of information, a way (or means) of communication and much more. The computer is the tool by which we gain access to world wide web. Therefore, everyone has a natural desire to protect their iron friend from the dangers that she is fraught with.

One of these tools is Comodo Firewall - a program that will help us protect our computer from various computer infections, which are many on the Internet.

Questions in the style of “what is a firewall and why is it needed” have already been discussed earlier on the site in the articles: Protecting yourself from hackers, worms and other riffraff, How to protect ports and a computer from hacking. Part 1., "Outpost Firewall - installation, configuration, description" or "Internet protection and network security" and other others.

The same article will be entirely devoted to a separate product - Comodo Firewall. This program is free, and many rightly consider it the number one among such products. At the same time, the product in question copes with its tasks no worse than most paid analogues from other manufacturers. software. At the same time, it is important that there is an excellent Russian version this firewall.

Installation and initial setup.

Installing Comodo Firewall is not fraught with any special difficulties, but still there are some nuances in it.

After downloading, run the previously downloaded file (if you downloaded it from the link above, it should be called cfw_installer.exe). Next, you will be prompted to select the installation language, naturally leave "Russian - By COMODO" and click "OK", after which we will see the following in front of us:


Item "Enter the address of your Email“We miss. Then boldly uncheck the box "Change DNS settings servers on COMODO SecureDNS” (you can read about why here). Next, also uncheck the box "I want to use Cloud Application Analysis, transferring unidentified programs to COMODO in compliance with the Privacy Policy". Now look at the very bottom of the dialog box and click on "Installation options" (see screenshot above)


First of all, we are interested in the "Installation options" tab. As you can see, by default we are offered to install two products, the Comodo Firewall itself, as well as the Comodo GeekBuddy service. The latter is a conditional free service, which within 60 days offers the implementation technical support users. The idea is that you can at any time ask for help or just advice from Comodo employees directly from the program itself. But this is true only for those who know well English language, since Russian-language support is not provided. And why do we need it, because we want to figure it out ourselves using this article (), and if you have any questions and difficulties, you can always turn to such an interesting FS forum [free computer help] (who would have thought). Therefore, we boldly uncheck the box next to "Installing Comodo GeekBuddy", - it is unlikely that you will ever use it in practice, and besides, there is absolutely no need for the service of this service to lie, as they say, dead weight in our operating system.

Leave the rest of the settings unchanged and click the "Back" button, which will return us to the already familiar window, in which we click "Agree, Install". We are waiting for the installer to complete all the necessary operations, and click "Yes" on the offer to restart our operating system.

After the reboot, we will see a welcome window in which we need to check the box "Do not show this window again".


And calmly close it so that it does not bother us in the future.

Almost simultaneously with the welcome window, we will see another window. The smart program will detect your network and prompt you to give it a name and pre-configure it.


For example, if you have a laptop that you use both at work and at home, then you can name the networks "Work" and " home network”, or somehow at your discretion. If you need to be able public access to folders and (or) printing on network printer, then put a checkmark on the item "Make the computer fully accessible to other computers on this network". If this is not necessary, then it is better to leave this option disabled, as this significantly increases the security level for your computer. Next, simply confirm your choice by clicking the "Yes" button, and this completes the installation.

Advanced configuration of Comodo Firewall. We bring protection to mind.

So, the program is already installed on your computer and, in principle, can work with the default settings that the manufacturer has set. But to increase your comfort, you need to bring the firewall to mind a little more. To do this, let's get acquainted with the main features of the program. What kind of animal is this, this Comodo Firewall? We can say that it consists of two main modules: the firewall itself (the "Firewall" tab) and the proactive protection module (the "Protection +" tab). Basic information on the operation of these modules can be viewed in the "Summary" tab.


Basically, from here you can get fast access to some basic settings and statistics: see how many incoming and outgoing connections you have and intrusion statistics; evaluate which applications show the greatest network activity; change the operating modes of the firewall and the "Protection +" module and even stop all connections. There is no need to be afraid if the number of connections is very large: for example, if any torrent client with a large number of distributions is enabled, the total number of connections can reach several hundred and even thousand.

Separately, it is worth dwelling on the operating modes of the firewall modules and the proactive protection module. By default, the mode of operation of both modules is set to "Safe Mode", which implies strict control over all network activity and executable files. I suggest leaving these modes as they are for a start, but in reality such control can be quite tedious. You will need each manually determine whether to allow or deny us the activity of applications that are not included in the list of trusted ones, as well as monitor each launched file.This issue may especially concern the "Protection +" module, which will consider all unfamiliar files that you run as suspicious from your computer. In such a situation, you will often see a similar window.


If you are completely sure that the application you are running is safe, then when such a window appears, select the items "Allow this request" and "Remember my choice", then click "Yes". You can make things a little easier for yourself and translate the "Protection +” in “Clean PC Mode” (in the “Summary” tab in the “Protection +” section, click on “Safe Mode” and select the desired mode).


I would like to note that this can only be done if you have Comodo Firewall working in conjunction with some kind of antivirus and you are completely sure that your system is healthy. Otherwise, you run the risk of automatically giving permission to launch some kind of virus from your computer, because "Clean PC Mode" implies full trust in the "Protection +" module to the files that were on your hard drive at the time of its installation.

Now let's move on to the "Firewall" tab. As you can see, there are many different possibilities here, and if you stop at each one, then one article will obviously not be enough. Each item is provided with a sufficient number of comments so that you can understand what it is about. currently interested in the item "Hidden Port Wizard".


First of all, it is useful for us to be able to secure our computer from outside intrusions. Therefore, here we click on “Block all incoming connections and hide my ports for all incoming connections” and confirm our choice by clicking “OK”.


Now we click on "Firewall Settings", and in the dialog box in the "General Settings" tab, check the box "Create rules for secure applications". Then we confirm our choice by clicking the "OK" button.


Now, for all applications that are on the firewall's safe list, allowing rules will be automatically created, which will save us from unnecessary confirmations and manual permissions.

On this we will finish with the “Firewall” tab and move on to the next one in a row - “Protection +”. The points in it are largely similar to the previous ones. And here we are only interested in the item "Proactive Defense Settings".


By analogy with the firewall settings in the dialog box in the "General settings" tab, check the box "Create rules for safe applications".


The "Miscellaneous" tab is not directly related to the operation and configuration of the firewall. It contains settings related to the program interface, updates, saving configurations, as well as its technical support. We will not change anything here.

This concludes bringing to mind. With this configuration, Comodo Firewall is quite capable of reliably protecting your computer from external threats.

What you need to know to get ahead.

So, the main work is finished, your firewall is installed and configured. Now let's try to consider a number of basic questions that you may have in the process of using it. In the previous section, we only briefly walked through the main tabs of the program, touching only on those points that interested us in the light of preparing Comodo Firewall for full-fledged work. Now we will try to consider the main features that may be useful to you later, because you must also be able to manage the program, and not be limited to just installing it.


I think the first question that may arise when working with a firewall is how to allow (prohibit) network activity of individual applications (groups of applications). To do this, go to the “Firewall” tab and pay attention to the items “Add a trusted application” and “Add a blocked application”.

Let's say that you have a need to disable the network activity of an application. To do this, go to the item "Add a blocked application" and then click "Select":


As you can see from the picture, there are several options to choose from. Firstly, it is possible to block a group of files (applications) at once. The developers of Comodo Firewall have grouped the most needed applications into groups so that we do not have to do everything manually. For example, from here you can turn off the network activity of all applications that are included in autoload or generally prohibit access to the network completely to all executable files. Secondly, from here you can disable any of the processes running on your computer. When you select " Running processes” You will see a similar picture.


In order to block desired process, select it by pressing the left mouse button (in the example in the picture, this is the VBoxService.exe process) and click "Select". Then click "Apply". After that, the firewall will add a rule to its lists, according to which all network activity The VBoxService.exe process will be blocked.

Also in the "Add blocked application" window, using the "Browse" button, you can select any application (file) yourself and add it to the list of blocked ones.

Add if necessary desired application to the allowed list, use the "Add a trusted application" item of the "Firewall" tab. The principles of operation here are the same as in the paragraph "Add a blocked application", so we will not dwell on this in detail.

I think many will now have a question: how then to remove the desired process (application) from the list of blocked ones? So, it was already mentioned earlier that when added to the list of blocked (trusted) applications, Comodo Firewall creates rules that determine the behavior of the firewall regarding applications. We create some rules ourselves (as we did a little earlier for the VBoxService.exe process), and some are already added by default during installation. The list of such rules is part of the firewall's network security policy. These policies are accessed through the “Network Security Policies” item of the “Firewall” tab.


As you can see, in the "Rules for Applications" tab, the rule "Blocking and logging all requests" has been created for the VBoxService.exe process, which we blocked earlier. If desired, you can always delete or correct the desired rule using the buttons located on the right. You can immediately add rules for any application by clicking the "Add" button. All rules in this tab are created either on the basis of predefined policies for various application groups (that is, you simply select which group your application belongs to, and then it will be rules defined for the entire group) or based on user settings (here you can either create new rules or simply duplicate the rules created for another application, if any).


The "Predefined Policies" tab contains several standard policies (sets of rules) that you can use to create application rules.


Also here you can add your policies. This is useful when you need to apply the same rules to several applications at once. Then you only need to add the rule set here once, and then use it every time you add a new rule for the application.

Another interesting and necessary element of a network security policy is the "Port Set" tab. What is a port, as well as other terminology basics computer network you can read in the article: "Computer network terminology or what is what".


This lists the sets of ports that are currently open on your computer. You can always add a single port or a group of them using the buttons located on the right side of the window. Many applications use their ports to work on the network, this is where you can add them to the list of open ones by clicking the "Add" button.

So, we have considered the main features of the firewall. Now let's move on to the "Protection +" proactive protection module. In fact, this module controls all files that run on your computer. Now we will return to the "Protection +" tab and consider the main points regarding this module.


In the "Trusted files" item, you can access the management of the local database of executable files on your computer. A number of system files, as well as those files that you yourself declare safe will be added.


All files that are detected, but the program cannot determine whether they are safe, are added to the list of unrecognized files. This list can be accessed in the "Unidentified files" item. This list is managed in the same way as the "Trusted files" list. All files that fall into the unrecognized will run in a virtual "sandbox" Sandbox. It can be said that this is a security mechanism that creates a virtual file system and registry to run suspicious files and applications. Thus, any application launched through the Sandbox will be affected only to its virtual environment, and will not affect your operating system. virtual sandbox disabled. In order to enable it, go to the "Proactive protection settings" item.


Personally, frankly, I am not a big fan of this thing, so I usually turn it off, but see for yourself: if you are very worried about security and constantly suffer from viruses, then maybe Sandbox makes sense for you. If yes, then here you need to put the "Sandbox mode" switch to the "Active" position, and also check the boxes next to "Activate virtualization file system” and “Activate registry virtualization” and click “OK”. Now all files included in the "Unrecognized files" list will be launched in a virtual environment. Also, if you want to run any application or file in a virtual environment, you can use the "Run a program in Sandbox" item. If, like me, you are a supporter of optimization and adequacy, then on the contrary, all the checkboxes here should be unchecked, and the slider should be moved to the "Inactive" position.

Afterword.

So this heroic epic about the brave struggle of the valiant firewall against the overwhelming army of computer pests has come to an end. With your skillful control, this struggle will always end in victory for the forces of good.

On this I say goodbye to you. Let viruses and other malware bypass you!

As always, if you have any questions, additions, thanks, etc., I will be glad to hear them in the comments to this post.

We thank him and provide instructions on how to set up the Comodo firewall for maximum protection.

Introduction

According to these settings, I would like to note that, despite their "maximum", working at a computer does not cause any particular paranoia - everything is rather moderate: once you have created rules for a program / application, requests are no longer received for configured programs. It is clear that this mode is more suitable for advanced users.

The second point - testing was carried out, both in tandem with avast! Free Antivirus, and without it. The result, as noted, was 100% in both cases (despite the fact that the screenshots have avast antivirus!, and without it, the Comodo firewall passed all tests 100% on these settings).

Moreover, with avast! and using these settings for Comodo Firewall - the antivirus simply does not have time to start working, since Comodo Firewall performs all the blocking.

In addition, in the "PC Security Test 2011" Сomodo Firewall blocked the first stage of the "Antivirus Proteсtion Test", blocking the possibility of placing virus files in the system, although in fact this is the work of an antivirus (for example, in the Online Armor + avast! this work on passing the first part of this test, avast!).

As a result, Comodo Firewall, so to speak, does not allow the antivirus to work, as it simply blocks the possibility of viruses penetrating the system. Those. it can be noted that the reaction of Comodo Firewall to threats is very fast (although it is clear that this is synthetic). However, the PC Security Test is 100% (as well as the rest of the passed tests) I have not yet passed a single product from many vendors (such as Kaspersky Internet Security, Norton Internet Security, Emsisoft Internet Security, McAfee Internet Security, Bitdefender Internet Security, avast! Internet Security, etc.). I think that although it is synthetic, it is still very significant.

System used in setup testing: Windows 7 PRO 64-bit SP1, 1.65GHz Dual-core AMD processor, 4GB memory (3.6GB available).

With these settings in Proactive Security mode, Comodo Firewall passes 100% synthetic tests such as:

1) Anti-test
2) PC Security Test 2011
3) PC Flank Leaktest
4) CLT
5) SSS
6) FireWallTest
7) Mini Security Test

Comodo Firewall 2013 Settings

1. Advanced settings -> General settings -> Configuration


2. Advanced Settings -> Security Settings -> Security+ -> HIPS -> Behavioral Analysis

Uncheck "Automatically run in Sandbox detected unknown application and handle it like"


Click to enlarge image

3. Advanced Settings -> Security Settings -> Firewall -> Firewall Settings

We switch the firewall to the "Custom rule set" mode so that any network event in the system prompts you to set your own rules manually.

In the "Advanced settings" field, check all the checkboxes opposite:
- Enable IPv6 traffic filtering
- Enable filtering of loopback traffic (for example, 127.x.x.x, ::1)
- Block fragmented IP traffic
- Analyze protocol
- Enable ARP spoofing protection


Click to enlarge image

4. Advanced Settings -> Security Settings -> Firewall -> Global Rules


Click to enlarge image

5. Advanced Settings -> Security Settings -> File Rating -> File Rating Settings

Trust applications signed by trusted vendors
- Trust apps installed with trusted installers


Click to enlarge image

2490 23.12.2009

tweet

plus

Let's start our acquaintance with Comodo Firewall by installing it.

When you run the installation file, a warning window appears about the need to remove other programs of a similar purpose in order to avoid conflict situations

If you already have a firewall installed, remove it, if not, then feel free to continue.
Now click on the "YES" button in the warning window. Further installation is standard for most Windows programs. You just need to click "Next". At the end, the program will offer configuration options: automatic or custom

We leave automatic. To complete the installation, all you have to do is restart your computer.

After the reboot, you will immediately begin to be asked questions about the activity of programs that can use the network connection.

Here it is necessary to understand which of the programs you allow or prohibit activity. When you click the "Allow" or "Deny" button, the firewall will skip or not let the program go to the Internet once. If the program tries to access the Internet again, a window about its activity will be displayed again. If you are sure about the program that is trying to access the Internet, you can check the "Remember my answer for this application" checkbox and click "Allow". Comodo Firewall will henceforth understand that you trust this application and will allow it to run smoothly. In the same way, a ban is set for the program: check the box "Remember my answer for this application" and click "Deny". Comodo will always block this program.

During testing, the first questions were asked about alg.exe and svchost.exe.

it system programs and they need to be allowed access. Questions about user programs will be asked as they are launched. If the program is designed to work on the Internet or via the Internet, then it must be allowed. If it is clear that the program is overzealous in taking care of the user and wants to download something from the Internet or transfer it via the Internet, then its access should be denied. Thus, you, who are interested in your safe stay in the global network, after a while will create rules of conduct for all programs installed on your computer.

Having made an erroneous ban or allowing the program activity, you can always use the Comodo Firewall settings and correct the situation. Looking in the lower right corner of the screen, where the clock is located, you will see an icon with a shield. This is Comodo. Right click on the icon and select open. The main program window will open immediately.

The main window clearly shows the basic parameters of the firewall.
At the top of the window, you can choose between the "Summary", "Protection", "Activity" panels.

On the left, icons are lined up for switching between the windows of this panel:

Tasks– In this window, you can quickly allow or deny the program access to the network, as well as select other options, the possibilities of which are well described under the name of each of the options. Unnecessarily, it is better not to touch anything.

Application Monitor– designed to view and edit the list of applications that the user trusts. The window is presented in the form of a table, which indicates:

  • program name (Application),
  • The IP address to which the connection is made (Recipient),
  • port number on which the interaction is carried out (Port),
  • the protocol within which information is received and transmitted (Protocol),
  • Well, the column (Permission), which shows whether access is allowed or denied to the application.

Take a look at the quick options:

  • Enable/disable - you can temporarily disable some of the rules, for example, for testing purposes.
  • Add - A fully customizable option to create a new rule.
  • Edit - Edit the rule on which the cursor is positioned.
  • Delete - Permanently remove the rule from the list.

By double-clicking the left mouse button on the program name or clicking "Edit", you will be taken to the window for fine-tuning (editing) the rule

This window specifies the full path to the program on the disk, the path to the program that is the parent of the custom one. Nothing needs to be changed here.

And looking at the tabs below, you can:
- assign the program action to the application activity, specify the protocol and direction of the program activity (whether the program receives information (Incoming), sends (Outgoing) or both receives and sends),
- specify one or more IP addresses with which the application interacts. One or more ports that an application opens when it communicates.

Component Monitor- designed to monitor the integrity of important files - sometimes viruses try to change files and Comodo can prevent this.

network monitor - Attention! The order of the rules is important here! Comodo Firewall scans rules from top to bottom. On this tab, fine tuning firewall filtering parameters for data transmission by IP addresses and ports. Here you can forcibly close potentially dangerous ports. Here's how to do it:
Click the "Add" button and in the window that appears

select the “block” action and specify “one port” on the “Source Port” tab, and also write down the port number, for example, 137. Click the “OK” button. The new rule will appear in the list.
Use the "Up" or "Down" arrows to set the location of the rule in the list. In order not to make a mistake, for now, you can simply place the rule in the middle.

Bookmark "Additionally" the "Protection" window, you can additionally configure the firewall. These features need to be mastered gradually, as you work with the program, you will understand when the need for additional settings appears.

By going to the panel "Activity" we will see two tabs: "Connections" and "Journal"
AT "Connections" displays a list of programs that are currently active. Here you can see if there is something suspicious among the programs you trust. As well as the amount of transmitted/received data.

AT "Journal" a chronological record of important events is maintained. You can always refer to it when analyzing the actions of some of the programs.

And of course, do not forget to update the program components. By clicking on the "Update" button at the very top, you will launch the wizard for downloading new components. This simple procedure will prevent new emerging malware perform destructive actions on your computer. By default, the settings are set to automatic check updates.

Easy to use and configure, Comodo Firewall will protect your Internet experience and help you learn to understand the processes that occur during the exchange of information over the network.

tweet

plus

Please enable JavaScript to view the