If they are not safe, they are added to the 'My Pending Files' for users to review and possibly submit to COMODO. というのは、安全と確認できなければ ひとまず全部My Pending Filesに入るという意味じゃないんでしょうか?
>>4 の System は、 Action : Block Protocol : TCP or UDP Direction : In/Out Description : Souse Address : Any Destination Address : Any Source Port : 137-139 Destination Port : 137-139 上記でよろしいのでしょうか?
Welcome to the Comodo Forum =>Desktop Security Products =>Comodo Internet Security - CIS =>Feedback/Comments/Announcements/News - CIS =>Comodo Internet Security Release History
Online Armor Personal Firewall 3.0.0.190 93% 10+ Excellent Comodo Internet Security 3.5.55810.432FREE 90% 10+ Very good ← Outpost Firewall Pro 2009 6.5.2358.316.0607 89% 9 Very good Privatefirewall 6.0.20.9 82% 10+ Very good Jetico Personal Firewall 2.0.2.7.2311 72% 10+ Good Webroot Desktop Firewall 5.8.0.25FREE 54% 7 Poor Sunbelt Personal Firewall 4.6.1861.0 5% 1 None Mamutu 1.7.0.23 2% 1 None
Products tested against the suite with 73 tests
Online Armor Personal Firewall 2.1.0.131 FreeFREE 89% 10 Very good Kaspersky Internet Security 2009 8.0.0.454 87% 10+ Very good Netchina S3 2008 3.5.5.1FREE 86% 9 Very good ZoneAlarm Pro 2009 8.0.020.000 86% 10+ Very good PC Tools Firewall Plus 4.0.0.45FREE 85% 10+ Very good ← Norton Internet Security 2009 16.0.0.125 71% 7 Good Lavasoft Personal Firewall 3.0.2293.8822 70% 7 Good Comodo Firewall Pro 2.4.18.184FREE 55% 7 Poor ←
Just wanted to let you guys know, what you can expect in the next version of CIS 3.5, hopefully by the end of the year.
・Heuristics This will be added to the Antivirus Component. The Heuristic will be similar to CIMA ・Threat Cast ・Extended Whitelist & Blacklist for the Firewall & Defense - This will provide even greater usability! If the AV in CIS detects a malware for example for blacklisting, D+ will not bother alerting for it. Whitelisting, same thing, theoretically you should not get a D+ Alert. Over 1 million whitelisted executables will be added. ・Brand new AV Signature Format The signature format will improve for speed & efficiency, Due to so many malware getting sent to Comdo. ・Comodo Memory Firewall, full developed & integrated ・Comodo BOClean
Defence+の Block all unknown requests if the application is closed にチェック入れると OS起動時にATIのCatalystControlCenterが起動してくれません。 CCC関連のMOM.exe、CLI.exe、CCC.exeをsystemappにしても変りません。 どう設定したらいいですか?
---------------------------------------------------------------------- GRC Port Authority Report created on UTC: 2009-01-04 at 09:53:59 Results from scan of ports: 0-1055 0 Ports Open 1017 Ports Closed 39 Ports Stealth --------------------- 1056 Ports Tested NO PORTS were found to be OPEN. Ports found to be STEALTH were: 23, 75, 80, 137, 138, 139, 445, 1024, 1025, 1026, 1027, 1028, 1029, 1030, 1031, 1032, 1033, 1034, 1035, 1036, 1037, 1038, 1039, 1040, 1041, 1042, 1043, 1044, 1045, 1046, 1047, 1048, 1049, 1050, 1051, 1052, 1053, 1054, 1055 Other than what is listed above, all ports are CLOSED. TruStealth: FAILED - NOT all tested ports were STEALTH, - NO unsolicited packets were received, - NO Ping reply (ICMP Echo) was received. ---------------------------------------------------------------------- こんな結果になっちゃいます。これじゃcomodo使ってる価値はあんまりないんですよね? やっぱ自分には難しすぎるかなあ。
気になったのは、>4でNICを選択しろという部分。NICの頭文字が拾えるWordを 探しましたがないため、初期設定の一番上のままNextへ。 i would like to trust an existing My Network Zoneのチェックを生かして 初期登録時にダミー名称のまま登録したZoneName「Local Area Network #1」を 選択してFinishしました。これで良かったんでしょうか。 >4のFirewall編+以降は全然分かりませんでした。
・Firewall Behavior Settings Safe ModeかCustom Policy Mode、HighかVery Highにする This computer is an internet connection gateway (i.e. an ICS server)はインターネット接続共有してなければ外してもOK
・Attack Detection Settings Protect the ARP CacheとBlock gratuitous ARP framesは任意でチェック(ネットワーク管理者ならチェック推奨) Do Protocol Analysisも任意でチェック
・Stealth Ports Wizard 基本的にDefault(Alert me to incoming connections - stealth my ports on a per-case basis)でOK 任意でDefine a new trusted network - Stealth my ports to EVERYONE elseでNICを選択しルールを作る
複数のアドレスやポートでルールを作りたい時はMy Network ZonesとMy Port Setsでまとめる Predefined Firewall PoliciesのDefaultルールなどを活用して自分なりのルールを作ろう!