Operation Manual

Plug-Ins
44
To change the setting value, highlight the setting in the list and click its value in the right
column.
Note: Alter these settings with care since an improper attack detection configuration can
lead to significant problems with your system network connectivity.
From a security point of view TCP and UDP ports in your system are divided into several
groups according to the probability of an attacker using the port to break in. Attempt to
access ports assigned to vulnerable services like DCOM or RPC with a higher probability
is an inidication that you are being probed then access to a regular port.
However, you may have custom services assigned to custom ports that are also tempting
for an attacker. Outpost Firewall lets you create a list of such ports to which it will pay
more attention while monitoring network traffic. To manage the list of vulnerable ports,
click the Advanced tab in the plug-in settings dialog and then in Vulnerable ports click
Specify.
Vulnerable ports are divided in two groups: System and Trojan. System ports list contains
ports that are used by vulnerable system services; Trojan ports list contains ports that are