CCAVRelease Notes
Fix:
Fixes:
New:
i.e. C:/FOO.exe and C:/foo.exe will be differentiated by Antivirus on detection and also on quarantine.
New:
- Like CIS, now you have a new option "Monitor only the applications running in the Sandbox" under "Sandbox --> Sandbox Settings".
- Now you have following additional options under "File Rating Settings":
Do cloud lookup for trusted vendors (selected by default)
Do cloud lookup for malicious vendors (selected by default)
Do not update local list upon program updates (de-selected by default)
- And you have additional options to import and export Trusted Vendor entries under "File Rating --> Trusted Vendors" section.
Above advanced options allow you to fully control trusted vendor list. You can export, import and then control update and online look up of vendor list.
Improvised:
- You will see break up of file verdicts
- Applications files, which are absent in Comodo back-end and need to be uploaded will appear under "File Rating --> Submitted Applications" section rather waiting on right click analysis dialog to finish submitting all absent files.
- You have two additional options: Lookup and Purge. You can select one or more entries and use "Look up" button to see latest Comodo rating of submitted files, while "Purge" will remove entries no longer present in system.
Fixes:
New:
Improved:
New:
Fixes:
Improvements:
New:
Changes:
Changes:
Improvements:
Earlier you could not copy-paste in and out of Sandboxed applications. We have made two changes in this regard:
a) You should be able to copy text from sandboxed application to outside Sandbox. This is by default.
b) If you want to paste text from application running outside sandbox in application running inside sandbox, we have added a new check box in Sandbox Settings as "Enable clipboard access to Sandboxed applications", de-selected by default, as we don't want a Sandboxed applications to have access to passwords from outside. So if you want to paste text in a sandboxed application, you can select check box and be able to paste in.
We had two problems in there:
a) When PDF executed in Sandbox, e.g. launched from email client, user had no idea as why pdf will be Sandboxed.
b) When PDF running in Sandbox is saved, it ended up saved as in Sandbox itself, so user could not find it. And it could be very confusing.
In this release, we have improvised the message user sees when pdf is sandboxed and also, in case you save PDF, it will always be saved outside Sandbox. The reason is, if you trust the PDF, natural reaction would be to save it, that means user trusts the PDF.
This version uses a server based configuration file allowing to define list of applications, which can be excluded from CCAV in case of conflict as a quick fix; while team can resolve conflict in next releases. This will be internal list and be updated when program updates are checked.
Fixes:
New:
Changes:
Fixes:
New:
Changes:
Fixes:
New:
a) Like before, you can define folder which can't be modified, now contents inside those folders will be invisible to Sandbox apps. So neither read nor write is allowed.
b) You can define any file path and it won't be visible to Sandboxed applications.
Changes:
Fixes:
Fixes:
New:
Fixes:
Improvements:
Fixes:
Improvements:
Changes:
Fixes:
Fixes:
Improvements:
New:
Fixes:
Fixes:
Improvements:
Fixes:
Improvements:
New:
Improvements:
New:
New:
Fixed:
New:
Fixed:
Fixed:
New:
Improvement:
Fixed:
New:
Improvement:
Fixed:
New:
Fixed:
New:
Improvement:
Fixed:
New:
Improvement:
Fixed:
Improvement:
Fixed:
New:
Improvement:
Fixed:
New:
Improvement:
Fixed: