Network ports monitoring

During the operation of Kaspersky Endpoint Security, the Web Control, Mail Threat Protection, Web Threat Protection, Behavior Detection and Exploit Prevention components monitor data streams that are transmitted via specific protocols and that pass through specific open TCP and UDP ports on user computer. For example, the Mail Threat Protection component analyzes information transmitted via SMTP, while the Web Threat Protection component analyzes information transmitted via HTTP and FTP.

Kaspersky Endpoint Security divides TCP and UDP ports of the user's computer into several groups, depending on the likelihood of their being compromised. Some network ports are reserved for vulnerable services. You are advised to monitor these ports more thoroughly because they have a greater likelihood of being targeted by a network attack. If you use non-standard services that rely on non-standard network ports, these network ports may also be targeted by an attacking computer. You can specify a list of network ports and a list of applications that request network access. These ports and applications then receive special attention from the Mail Threat Protection and Web Threat Protection components during network traffic monitoring.

To help ensure the security of the computer, the Behavior Detection and Exploit Prevention components also monitor data streams passing through network ports. The components continuously monitor network traffic for individual processes that may be threatening.

 

In this section

Enabling monitoring of all network ports

Creating a list of monitored network ports

Creating a list of applications for which all network ports are monitored

Exporting and importing lists of monitored ports

Page top