My Trusted Software Vendors
In Comodo Internet Security, there are two basic methods in which an application can be treated as safe. Either it has to be part of the ‘Safe List’ (of executables/software that is known to be safe) OR that application has to be signed by one of the vendors in the Trusted Vendor List (TVL)).
Comodo Internet Security can validate digitally signed applications from Trusted Vendors. Trusted Vendors are those companies that digitally sign 3rd party software to verify its authenticity and integrity. This signature is then countersigned by an organization called a Trusted Certificate Authority. By default, Defense+ detects software that is signed by a software vendor and counter-signed by a Trusted Certificate Authority. It then automatically adds that software to the local users’ Trusted Vendor list.
Defense+ allows the administrator to define a local Trusted Vendors List for individual CIS installations in the endpoints to complement the default Trusted Vendors List.
Important Note: The Trusted Vendors List generated from this option is specific for each computer and can be generated and applied for a single endpoint at a time. It cannot be created as a global Trusted Vendor List to apply for all or selected endpoints in a network.
In order to set a global Trusted Vendor List, the administrator needs to create a Task containing a Sequence with an action 'CIS – Set Trusted Vendors' and execute it on selected computers. Refer to 'The Sequence Manager Window > Table of Actions – Definitions and Usage > CIS - Set Trusted Vendors ' section of CESM Administrators Guide for more details
The 'My Trusted Software Vendors' is available only on right clicking a computer from the Computers Window and selecting internet Security > Configuration > Custom from the context sensitive options and is not available in the configuration interface that appears when creating a sequence with the action CIS – Config.
- Click on My Trusted Vendors in Defense+ > Common Tasks to open the 'My Trusted Software Vendors' interface.
Many software vendors digitally sign their software with a code signing certificate. This practice helps end-users to verify:
Content Source: The software they are downloading and are about to install really comes from the publisherthat signed it.
Content Integrity: That the software they are downloading and are about to install has not be modified or corrupted since it was signed.
In short, users benefit if software is digitally signed because they know who published the software and that the code hasn't been tampered with - that are are downloading and installing the genuine software.
The 'Vendors' that digitally sign the software to attest to it's probity are the 3rd party software developers. These are the company names you see listed in the first column in the graphic above.
However, companies can't just 'sign' their own software and expect it to be trusted. This is why each code signing certificate is counter-signed by an organization called a 'Trusted Certificate Authority'. 'Comodo CA Limited' and 'Verisign' are two examples of a Trusted CA's and are authorized to counter-sign 3rd party software. This counter-signature is critical to the trust process and a Trusted CA only counter-signs a vendor's certificate after it has conducted detailed checks that the vendor is a legitimate company.
All files that are signed by the listed 'vendors' are automatically trusted by the Defense+ module of Comodo Internet Security. (if you would like to read more about code signing certificates, see http://www.instantssl.com/code-signing/).
One way of telling whether an executable file has been digitally signed is checking the properties of the .exe file in question. For example, the main program executable for Comodo Internet Security is called 'cfp.exe' and has been digitally signed.
Browse to the (default) installation directory of Comodo Internet Security.
Right click on the file cfp.exe.
Select 'Properties' from the menu.
Click the tab 'Digital Signatures (if there is no such tab then the software has not been signed).
This displays the name of the CA that signed the software as shown below:
Click the 'Details' button to view digital signature information. Click 'View Certificate' to inspect the actual code signing certificate. (see below)
It should be noted that the example above is a special case in that Comodo, as creator of 'cfp.exe', is both the signer of the software and, as a trusted CA, it is also the counter-signer (see the 'Countersignatures' box). In the vast majority of cases, the signer or the certificate (the vendor) and the counter-signer (the Trusted CA) are different.
Click the Add... icon . The 'Trusted Vendor Name' dialog will open.
Type the name of the vendor in the Trusted Vendor Name text box and click OK. The Trusted Vendor will be added to the list.
To edit a Trusted Vendor Name
Double click on the name or select the name and click the Edit icon . he 'Trusted Vendor Name' dialog will appear. Edit the name in the 'Trusted Vendor Name' text box.
To remove edit a Vendor Name from the list
Select the vendor name and click the Delete icon and click 'Yes' in the confirmation dialog.
Comodo Endpoint Security Manager | © 2010 Comodo Security Solutions Inc. | All Rights Reserved.