Comodo Internet Security 10 : Installation, Settings and Usage

Comodo config

  • HIPS :  Disabled
  • FIREWALL :  Safe mode

 

  • comodo-internet-security-10-interface_04-01-2017_22-11-11

comodo-internet-security-10-interface_04-01-2017_22-15-43

 

INSTALLATION

comodo-internet-security-10-install_31-12-2016_18-11-52

  • Untick “enhance my web experience

comodo-internet-security-10-install_31-12-2016_18-12-10

  • Select “install free version

comodo-internet-security-10-install_31-12-2016_18-12-17

  • Untick component that don’t want to install

comodo-internet-security-10-install_31-12-2016_18-12-56

  • Untick “Enhance my web experience

comodo-internet-security-10-install_31-12-2016_19-26-40

ADVANCED SETTINGS

  • Tick “Scan computer after the computer starts

comodo-internet-security-10-settings_04-01-2017_18-21-05

  • Untick “Do not show popup alerts

comodo-internet-security-10-settings_04-01-2017_18-26-55

INSTALLING/UNINSTALLING SAFE APPLICATIONS

  • Even if you try to install a safe application, Comodo may sandbox it because the application is categorized as “Unrecognized
  • When the installer asks for unlimited access as shown below, click “Run Unlimited

comodo-internet-security-10-installing-application_04-01-2017_18-50-43

FIREWALL ALERT

  • When an unrecognized application tries to connect to the internet, comodo firewall shows this alert
  • If you know that this application is SAFE, then click “Allow” to allow this application access the Internet.
  • If you are don’t recognize this application click “Block” to block this application from accessing the internet

comodo-internet-security-10-firewall-alert_04-01-2017_18-55-58

  • To create a rule to automatically allow safe application to access the internet,
  • Tick “Remember my answer
  • Select “Treat as” and “Outgoing only

comodo-internet-security-10-firewall-alert_04-01-2017_18-56-09

comodo-internet-security-10-firewall-alert_04-01-2017_18-56-32

  • To create a Firewall Rule to automatically Block an application from accessing the internet,
  • Tick “Remember my answer
  • Select “Treat as” and “Block Application

comodo-internet-security-10-firewall-alert_04-01-2017_18-56-44

BLOCK AN APPLICATION FROM ACCESSING THE INTERNET

  • To block an application from accessing the Internet, Click “Add” as shown below

comodo-internet-security-10-firewall-block-an-application_04-01-2017_19-03-24

  • click “browse

comodo-internet-security-10-firewall-block-an-application_04-01-2017_19-03-29

  • Select “files” and select the application that you want to block from accessing the internet

comodo-internet-security-10-firewall-block-an-application_04-01-2017_19-03-44

  • Click “Add” as shown below

comodo-internet-security-10-firewall-block-an-application_04-01-2017_19-04-00

  • Next to “Action:” select “block

comodo-internet-security-10-firewall-block-an-application_04-01-2017_19-04-28

  • Enter the description.
  • click “OK

comodo-internet-security-10-firewall-block-an-application_04-01-2017_19-04-58

  • Click “Ok” to create the firewall rule.

comodo-internet-security-10-firewall-block-an-application_04-01-2017_19-05-11

  • Click “OK

comodo-internet-security-10-firewall-block-an-application_04-01-2017_19-08-09

 

FILE LIST

  • click “purge” to purge non-existant applications in the list

comodo-internet-security-10-file-list_04-01-2017_19-11-21

  • click “OK

comodo-internet-security-10-file-list_04-01-2017_19-11-25

  • Tick all applications rated as “unrecognized
  • click “Submit” to submit those applications to Comodo

comodo-internet-security-10-file-list_04-01-2017_19-12-20

  • To Change the file rating of “unrecognized applications” which you know are safe application,
  • click “rating” tab
  • Tick all safe applications rated as “Unrecognized
  • Right click on it
  • Select “Change file rating -> Trusted
  • Click “OK

comodo-internet-security-10-file-list_04-01-2017_19-15-33

SUBMITTED FILES LIST

  • Regularly check the “submitted files list
  • Click “clean” to clear the list

comodo-internet-security-10-submitted-files_04-01-2017_19-30-25

FILE GROUP

  • you may add applications installed the computer to certain predefined file groups.

comodo-internet-security-10-file-group_04-01-2017_19-18-38

  • Add applications which download files from internet into group “file downloaders
  • Select “File downloaders
  • Run the file downloader application.
  • Click “Add -> running processes

comodo-internet-security-10-file-group_04-01-2017_19-18-43

  • Find the file downloader process
  • Select it and click “OK

comodo-internet-security-10-file-group_04-01-2017_19-18-51

comodo-internet-security-10-file-group_04-01-2017_19-19-08

comodo-internet-security-10-file-group_04-01-2017_19-19-18

  • Similarly, add “media players” applications which is used to play video & audio files

comodo-internet-security-10-file-group_04-01-2017_19-19-39comodo-internet-security-10-file-group_04-01-2017_19-19-49

BLOCKING MALWARE

  • When an unknown application or malware runs, it gets sandboxed by Comodo.
  • Sometimes the user will get alerted as shown below.
  • Click “Block”

comodo-malware-alert_06012017_234604

comodo-malware-alert_06012017_234704

  • When an unknown application or malware asks user permission to connect to Internet.
  • Click “Block”

comodo-malware-alert_06012017_234748

comodo-malware-alert_06012017_234848

  • To stop the execution of unknown application or malware, select “Block and Terminate

comodo-malware-alert_06012017_234851

 

comodo-malware-alert_06012017_234944

 

  • To completely block an unknown application from executing in future,
  • Click “Treat As

comodo-malware-alert_06012017_235205

  • Click “Blocked Application

comodo-malware-alert_06012017_235209

Video Tutorial on dealing with malwares 

 

 

 

 

 

 

 

ESET Internet Security 10 : Recommended settings

  • Click “Advanced setup

eset-internet-security-10-recommeded-settings_28-12-2016_19-13-57

  • Enable “integrate into system

eset-internet-security-10-recommeded-settings_28-12-2016_19-15-33

HIPS RULE SETTINGS

  • HIPS rule can be created to protect user files stored in certain folders.
  • Click “Edit” next to Rules

 

eset-internet-security-10-hips-settings_28-12-2016_19-33-36

  • Click “Add

eset-internet-security-10-hips-settings_28-12-2016_19-33-57

  • Set “Rule name” as “PROTECTED FILES
  • Set “Action” as “Ask
  • Under “Operations affecting“, enable “Files
  • Click “Next

 

eset-internet-security-10-hips-settings_28-12-2016_19-34-45

  • Select “All applications

eset-internet-security-10-hips-settings_28-12-2016_19-34-52

  • Enable “Delete file“, “Write to File” and “Direct access to disk” as shown below

eset-internet-security-10-hips-settings_28-12-2016_19-36-58

  • Select “Specific files” as shown below
  • Click “Add

eset-internet-security-10-hips-settings_28-12-2016_19-37-07

  • Click “” as shown below

eset-internet-security-10-hips-settings_28-12-2016_19-37-15

  • Select D:\ partition
  • Click “OK

eset-internet-security-10-hips-settings_28-12-2016_19-37-20

  • Click “OK

eset-internet-security-10-hips-settings_28-12-2016_19-37-24

eset-internet-security-10-hips-settings_28-12-2016_19-37-30

  • Similarly add other partitions as shown below
  • Don’t add C: partition in which Windows OS is installed
  • Click “Finish

eset-internet-security-10-hips-settings_28-12-2016_19-38-19

  • Click “OK

eset-internet-security-10-hips-settings_28-12-2016_19-38-23

  • Click “OK

eset-internet-security-10-hips-settings_28-12-2016_19-38-34

HIPS Alerts

  • When an application tries to access files, ESET HIPS generates alerts as shown below.
  • Allow only safe applications. Deny if you don’t want application to modify protected files.
  • To permanently allow safe application access to files, select “Create rule and remember permanently
  • Tick “Only for operation” and select “All file operations

eset-internet-security-10-hips-alert_28-12-2016_19-40-55

eset-internet-security-10-hips-alert_28-12-2016_19-43-40

eset-internet-security-10-hips-alert_28-12-2016_19-47-02

  • To check the reputation of the application, click “Details

eset-internet-security-10-hips-alert_28-12-2016_20-29-57

  • Next to “Reputation:” you can see the Eset rating of the application.
  • Green color means the application is safe.
  • Yellow color means application is unknown
  • Red color means Application unsafe

eset-internet-security-10-hips-alert_28-12-2016_20-30-08

 

FIREWALL INTERACTIVE MODE

  • Set “Filtering mode” to “Interactive Mode
  • Click “OK

eset-internet-security-10-interactive-firewall-settings_28-12-2016_19-59-55

  • When an application tries to connect to Internet (network), Eset Firewall shows this alert.
  • If application is safe then click “Allow“, otherwise “Deny
  • If you want to permanently allow a safe application to have access to internet, then select “create rule and remember permanently
  • Click “Allow

eset-internet-security-10-interactive-firewall-alert_28-12-2016_20-02-02

eset-internet-security-10-interactive-firewall-alert_28-12-2016_20-03-24

eset-internet-security-10-interactive-firewall-alert_28-12-2016_20-09-35

  • If you want to block access to Internet for an application click “Deny” when Firewall alert is shown.

eset-internet-security-10-interactive-firewall-alert_28-12-2016_20-22-54

  • To see Reputation of an application click “details

eset-internet-security-10-interactive-firewall-alert_28-12-2016_20-29-18

eset-internet-security-10-interactive-firewall-alert_28-12-2016_20-55-27

  • When installing an application, if application tries to connect to internet, then select “Remember until application quits
  • Click “allow” or “deny” as you wish

eset-internet-security-10-interactive-firewall-alert_28-12-2016_21-39-16

Eset settings video tutorial

Freeware applications for Microsoft Windows OS

The list contains freeware and opensource applications

  1. AOMEI Partition Assistant Standard   – http://www.aomeitech.com/pa/standard.html
  2. Macrorit Partition Expert Free Edition
    –  http://disk-tool.com/download/mde/mde-free-setup.zip

 

  1. IrfanView  –   http://www.filehorse.com/download-irfanview/
  2.  PicPick –  http://www.filehorse.com/download-picpick/
  3.  Greenshot  –   http://getgreenshot.org/
  • Image Annotate  –
  1. PicPick –  http://www.filehorse.com/download-picpick/
  2. Greenshot  –   http://getgreenshot.org/

 

 

Kaspersky Internet Security 2017 Recommended Settings

RECOMMENDED SETTINGS

  • Click on settings icon to go to Kaspersky settings, as shown below

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-12-47

  • Click “File Anti virus

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-12-52

  • Select “Action on threat detection” as “Disinfect,if not possible – delete

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-14-04

  • Click “Web Anti Virus

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-15-13

  • Select “Action on threat detection” as “Block

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-15-20

  • Click on”Private browsing

 

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-19-47

  • Select “Block data collection

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-19-53

  • You may untick “Search for software that is intended to conceal traces of a malicious program in the system

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-22-58

 

Scheduled Scan

  • Select “Scheduled scan -> Quick Scan

kaspersky-internet-security-2017-schedule-scan-27-12-2016_16-27-22

  • Set Run Scan to “Everyday
  • Set the Time at which scan will be done
  • Click “Save

kaspersky-internet-security-2017-schedule-scan-27-12-2016_16-27-49

  • Select “Scan schedule -> Vulnerability Scan

kaspersky-internet-security-2017-schedule-scan-27-12-2016_21-03-00

  • Set Run Scan to “Everyday
  • Set the Time at which scan will be done
  • Click “Save

kaspersky-internet-security-2017-schedule-scan-27-12-2016_21-03-15

 

  • Click “network” as shown below

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-24-42

  • Click “Advanced settings” as shown below

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-24-47

  • Click “install certificate

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-24-50

  • Click “Next

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-25-02

  • Click “Finish

kaspersky-internet-security-2017-recommended-settings-20-12-2016_20-25-06

 

VULNERABILITY SCAN

  • Click “vulnerability scan

kaspersky-internet-security-2017-vulnerablity-scan-20-12-2016_20-44-27

  • Click “Start scan

kaspersky-internet-security-2017-vulnerablity-scan-20-12-2016_20-28-46

  • After the scan the list of vulnerability found in the system will be shown.
  • Click on it as shown below

kaspersky-internet-security-2017-vulnerablity-scan-20-12-2016_20-40-16

  • The list of the vulnerable application installed in the system is shown.
  • You need to update the application with the latest version of that application.

kaspersky-internet-security-2017-vulnerablity-scan-20-12-2016_20-40-53

  • click “vulnerability in the operating system

kaspersky-internet-security-2017-vulnerablity-scan-20-12-2016_20-40-57

  • Select all vulnerability
  • Click “Fix

kaspersky-internet-security-2017-vulnerablity-scan-20-12-2016_20-41-07

 

KASPERSKY APPLICATION MANAGER SETTING FOR BETTER PROTECTION

  • Click “Application Control

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-03-18

  • Click “Manage  applications

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-03-22

  • Click as shown below to collapse the Trusted applications list

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-03-26

  • Under “Network” select “Deny” for “Low restricted”, “High restricted” and “Untrusted”

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-03-41

  • It should look something like below
  • close the window

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-04-03

  • Click “Manage Resources

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-04-19

  • Select category “Personal data
  • Select “Add->Category” as shown below

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-05-04

  • Type “Category name” as “PROTECTED FILES” as shown below
  • Click “Add

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-05-16

  • Select category “PROTECTED FILES” as shown below

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-05-36

  • Select “Deny” for all three “Low restricted“, “High restricted” and “Untrusted”   as shown below

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-06-08

  • It should look as shown below

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-06-18

  • Select category “PROTECTED FILES
  • Select “Add -> File or Folder

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-06-28

  • Add D partition as shown below
  • Name  “D
  • Path “D:\*
  • Click “Add

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-06-51

  • Similarly add E,F,G,H,I,J,K,L,M,N,O,P partitions as shown below.
  • Don’t add C: partition in which windows OS is installed
  • Click “save


kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-08-38

  • If you want any “Low restricted” application to allow access files in “PROTECTED FILES” category then
  • Select the “PROTECTED FILES” category.
  • Select the application you  want to allow and set “Allow” under “Read,”Write“,”Create” and “Delete” as shown below
  • Click “Save

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-25-44

  • If you want to allow any “Low restricted” application allow access to the internet then
  • Select the application and set “Allow” under the “Network” as shown below

kaspersky-internet-security-2017-allpication-coontrol-recommended-settings-20-12-2016_21-25-59

  • If you want to install an application which is place in “Low restricted” then right click on it and set ” Restictions-> trusted“.
  • The run the application installer.

kaspersky-internet-security-2017-application-manager-settings-22-12-2016_19-11-07

  • If you are still unable to install a low restricted application, then disable the Kaspersky application control.
  • Install the application
  • Enable the Application control

kaspersky-internet-security-2017-install-safe-app-02-01-2017_08-42-38

 

kaspersky setting video tutorial