During the operation of Kaspersky Next, the Web Control, Mail Threat Protection, and Web Threat Protection components monitor data that is transmitted through specific open ports on users' devices. For example, the Mail Threat Protection component analyzes information transmitted via SMTP, while the Web Threat Protection component analyzes information transmitted via HTTP and FTP. This list of ports is configured by Kaspersky experts.
However, you can exclude any of the listed ports from monitoring, as described in this section.
Additionally, Kaspersky Next monitors all network ports that are required by certain applications. This list of applications is created by Kaspersky experts. If you exclude a certain port from monitoring but this port is used by an application from the list, Kaspersky Next will still monitor data that is transmitted through the excluded port by the listed application but will not monitor data that is transmitted by any other application.
To configure network ports exclusions:
The Security profiles section contains a list of security profiles configured in Kaspersky Next.
The security profile properties window displays settings available for all devices.
The Threat detection and exclusions window opens.
The Network ports exclusions window opens.
The Add ports to exclusions window opens. The window lists all network ports that are monitored by Kaspersky Next.
The added network ports appear in the list of exclusions in the Network ports exclusions window.
The deleted network ports disappear from the list of exclusions in the Network ports exclusions window.
After the security profile is applied, the network ports exclusions are applied to Windows devices.
Page top