查看: 3238|回复: 6
收起左侧

懒人必看:修改默认规则,实现最大安全及最少弹窗

[复制链接]
zxyzhlly
发表于 2011-1-16 22:54:24 | 显示全部楼层 |阅读模式
本帖最后由 zxyzhlly 于 2011-1-17 12:57 编辑

在COMODO官方论坛看到chiron的一篇文章,非常好,讨论的是如何设置毛豆的默认规则以达到最大安全防御,同时保持最少弹窗。这对于想用毛豆又不想折腾的很有用。现予以转贴,供豆油们参考。我的英文水平一般,只能看懂个大概,希望英文好的能帮翻译下。
原帖见:http://www.techsupportalert.com/content/how-install-comodo-firewall.htm

简单翻译下要点:
毛豆的默认规则已经是很强大了,但是仍然可以通过改变一些设置以进一步增强安全性。
首先,启用默认规则中“Proactive Security”。具体怎么做不用翻了吧。
然后,打开防火墙设置,点击“端口隐藏向导”,选择“拦截所有进入连接并对其他人隐藏我的端口”,但如果程序联网出现问题,改选“当有人连接时警告我并根据情形隐藏端口”
再打开“防火墙行为设置”,选“警告设置”,除非你共享网络连接,不要勾选“这台计算机作为INTERNET连接网关”;
打开“高级设置”标签,选择“执行协议分析”。如果你的计算机处于局域网中,再勾选“保护ARP缓存”及“拦截GARP帧”。
下面设置D+:
打开“D+设置”,点“可执行控制设置”,系统默认的是“部分限制”,建议选“限制性级别”,这可以拦截已知的所有攻击。

不当之处,请指正。tlcyeah 的英文水平显然比较高,偶献丑了。

How to Install Comodo FirewallUpdated 9. January 2011 - 17:14 by Chiron
This guide was written for version 5.3, also known as 2011, of Comodo Firewall. If you are instead using Comodo Internet Security you should be aware that the free version is now called Comodo Internet Security Premium.



If you're concerned about your PC's security using a Host Intrusion Prevention System (HIPS) is a great addition to your protection regime. A HIPS prevents unknown programs from altering any part of your system without permission. Therefore, malware is automatically prevented from doing any damage.


In this way HIPS is superior to detection-based software, such as traditional antivirus applications, because it will stop any type of malware. It will even protect you against zero-day malware, i.e. malware that has just been created and for which no detection signature yet exists. It is able to do this because it automatically blocks any files that have not been verified as safe and asks you if they should be allowed access to your computer. Of course the obvious downside to this approach is that just as there are millions of malicious programs there are also millions of safe ones. As HIPS vendors cannot instantly analyze every possible legitimate program, it's quite possible that you will receive questions about some safe programs, as well as malware.

In response to this, HIPS vendors have developed extensive whitelists, i.e. databases of known safe programs. If a program is known to be safe, or is produced by a trusted vendor, then you won't have to answer any questions about it and the program will be allowed complete access to your computer. Thus the number of alerts you get for everyday applications is, thankfully, very small.

You may be wondering if you still need to run traditional antivirus software alongside a HIPS. While you can theoretically do without one, if you know which programs to allow or block, my advice is that it's still a good idea to install an antivirus. With a traditional AV in the loop most threats will be eliminated before the HIPS can even examine the suspect file. Thus if a signature for the particular malware already exists, which is not always the case, you will be protected from making a bad decision. There are pros and cons to both HIPS and antiviruses, but I find that they complement each other very well.

Comodo Firewall is one of the best known HIPS firewalls, and for good reason. In addition to providing rock solid protection, it's also completely free. If you like you can even download Comodo Internet Security, which includes Comodo Antivirus. This is also free. Regardless of the AV you choose to install alongside Comodo Firewall you won't need to worry about any compatibility problems. However, remember that it's very important to never run more than one antivirus program at the same time. They can cause conflicts or even crash your computer.

Installing Comodo Firewall
Before installing security software designed to protect your computer, I find it's best to first ensure it's clear of malware. I know it sounds like strange advice, but this can prevent problems further down the road. Assuming you already have an antivirus scanner installed, run a full scan of your computer. It’s also a good idea to scan with a few alternative programs like Hitman Pro and the programs reviewed here.
If these scans don't find anything suspicious then you can proceed to download the installer. Here are the download locations for both Comodo Firewall and Comodo Internet Security. When installing either program please follow the advice given in these installation instructions that is pertinent to your situation. Trust me when I say that it will help avoid many problems and make life altogether easier for you. (As a disclaimer I'm only talking about installing Comodo Firewall. The rest of your life is up to you.)

After installation is complete you can now safely disable User Account Control. The same protection is included, and improved upon, in Comodo Firewall.


Configuration

Configuring Comodo Firewall actually isn't that difficult. The default configuration is quite robust, but there are still some changes that can be made to increase the protection even further.

First you should change the default configuration to Proactive Security. To do this right click on the icon in the taskbar and select the option for "Configuration". Select "Proactive Security". This is the most secure configuration of Comodo Firewall available. Also, I'd like to break the flow of this paragraph to point out that my screenshots are from Comodo Internet Security. The configuration steps will be the same for Comodo Firewall, but some of the screens may look slightly different.

There are also some changes that can be made to the Firewall component. Open the program and go to the Firewall tab. Click on "Stealth Ports Wizard" and select the option to "Block all incoming connections and make my ports stealth for everyone". In general this is the best choice, but it may interfere with some programs. If you have problems getting a program to connect to the internet, then instead select the option to "Alert me to incoming connections and make my ports stealth on a per-case basis". This will configure the firewall to ask your permission any time there is an incoming connection that Comodo doesn't already know to allow or block.

While still under the Firewall tab, go to the "Firewall Behavior Settings". Select the tab for "Alert Settings". Unless you are using Internet Connection Sharing on your network, and this PC is the "gateway", you can safely uncheck the box that says "This computer is an internet connection gateway". You can read more about Internet Connection Sharing on this site, but if you don't already know what it is chances are very high that you don't have it enabled.

Now open the "Advanced" tab and check the box to "Do protocol analysis". If your computer is part of a network you should also check the boxes to "Protect the ARP Cache" and "Block Gratuitous ARP Frames". If you are not part of a network then you do not gain any security by checking them.
After configuring the firewall portion of Comodo Firewall this is what your configuration may look like.
          
Now open the tab for "Defense+" and go to "Defense+ Settings". Open the tab for "Execution Control Settings". I would recommend changing the option to "Treat unrecognized files as" from "Partially Limited" to "Restricted". Previously I recommended that you keep it set on "Partially Limited", however, due to a vulnerability that is discussed in this post on the Comodo forums I now recommend that you set it to "Restricted". This will protect you from all malware I'm aware of, but will likely cause unknown applications to fail. To learn more about how Comodo's Sandbox works you can read this Introduction to the Comodo Sandbox. If you do notice malware behavior on your computer restart it and the problem should be gone. That's the way the sandbox was designed. Also, if you have unknown programs on your computer, you can join the Comodo forum and post them in this topic. They will be analyzed and added to the whitelist, if appropriate.

There are also other options for how to treat unrecognized files, and one of these is "Blocked". If you're a paranoid person, like me, who doesn't like the idea of malware being able to access any part of your computer, then perhaps this option is for you. Just prepare yourself for the inconveniences that come along with it. If you select "Blocked" then any unknown files will essentially be quarantined until you manually add them to your list of trusted files. This means that if even one file of a program is unrecognized then the entire program could crash. Don't say I didn't warn you. If you choose this option and there are programs in the sandbox that you don't recognize you can follow these methods to check if a file is malicious before you add them to your trusted files list. There are also other options for how to configure the sandbox. You can read about them on this page.

Further Questions
Now Comodo Firewall should be configured for maximum protection and maximum usability. At this point restart your computer and see if there are any problems. If you have any questions then please peruse these FAQ's. If you still find your questions unanswered then you can search the Comodo Forums for a solution. The community will do their best to help you with any problem that you may have.





If you believe this article deserves anything less than 5 stars then please leave a comment below explaining how you think it can be improved or where you find fault. In fact I'd appreciate any feedback, positive or negative, so that I can improve the article. Your opinions and advice will be much appreciated.

This software category is maintained by volunteer editor Chiron






mxf147
发表于 2011-1-16 23:10:18 | 显示全部楼层
本帖最后由 mxf147 于 2011-1-16 23:12 编辑

这贴转的容易,看着好难
哪位帮忙翻译一下呀
h8888
发表于 2011-1-17 00:40:44 | 显示全部楼层
这个问题处理起来很简单。在防火墙方面,无必要连网的程序禁止连网,需要连网的程序设置为询问。在D+方面,把每个应用软件设成询问,看看那个步骤需要允许,以后就设为允许,其余的就设为·阻止。OK!
ying500
头像被屏蔽
发表于 2011-1-17 08:24:02 | 显示全部楼层
谁给翻译一下
tlcyeah
发表于 2011-1-17 10:58:52 | 显示全部楼层
我来翻译
第一段:此介绍是针对comodo防火墙5.3版本,也就是2011版本。假如你使用的是comodo网络安全套装,那请你注意,comodo网络安全套装已经更名为comodo网络安全套装高级版
tlcyeah
发表于 2011-1-17 11:12:42 | 显示全部楼层
如果你为电脑的安全性而担心,那么,使用主机入侵防御系统软件会大大增加电脑安全性。一款HIPS软件可以阻止任何未知程序没有经过你的允许而对系统所造成的破坏行为。因此,恶意软件在HIPS的自动阻止下不会对你的系统有任何的损害~从这个角度来说,HIPS比传统的基于查杀的安全软件(比如说传统反病毒软件)有更大的优越性,因为它可以阻止任何一种恶意软件,它甚至可以阻止零天攻击~(不翻了,太冷了,嘿嘿)
眼睛贝贝
发表于 2011-1-17 14:24:42 | 显示全部楼层
不错的, 懒人专用
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-26 11:31 , Processed in 0.137173 second(s), 17 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表