Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
5-62
Block Ports
During outbreaks, block vulnerable ports that viruses/malware might use to gain access
to client computers.
WARNING! Configure Outbreak Prevention settings carefully. Blocking ports that are
in use makes network services that depend on them unavailable. For
example, if you block the trusted port, OfficeScan cannot communicate
with the client for the duration of the outbreak.
To block vulnerable ports:
PATH: NETWORKED COMPUTERS > OUTBREAK PREVENTION > START OUTBREAK PREVENTION
> B
LOCK PORTS
1. Select whether to Block trusted port.
2. Select the ports to block under the Blocked Ports column.
a. If there are no ports in the table, click Add. In the screen that opens, select the
ports to block and click Save.
• All ports (including ICMP): Blocks all ports except the trusted port. If
you also want to block the trusted port, select the Block trusted port check
box in the previous screen.
• Commonly used ports: Select at least one port number for OfficeScan to
save the port blocking settings.
• Trojan ports: Blocks ports commonly used by Trojan horse programs.
See Trojan Port on page A-11 for details.
• A port number or port range: Optionally specify the direction of the
traffic to block and some comments, such as the reason for blocking the
ports you specified.
• Ping protocol (Reject ICMP): Click if you only want to block ICMP
packets, such as ping requests.










