Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
A-12
Trusted Port
The server and the client use trusted ports to communicate with each other.
If you block the trusted ports and then restore network settings to normal after an
outbreak, clients will not immediately resume communication with the server.
Client-server communication will only be restored after the number of hours you have
specified in the Outbreak Prevention Settings screen elapses.
OfficeScan uses the HTTP port (by default, 8080) as the trusted port on the server.
During installation, you may enter a different port number. To block this trusted port
and the trusted port on the client, select the Block trusted ports check box on the Port
Blocking screen.
The master installer randomly generates the client trusted port during installation.
6267 GW Girl 6711 Sub Seven
25 Jesrto 6776 Sub Seven
25685 Moon Pie 27374 Sub Seven
68 Mspy 6400 Thing
1120 Net Bus 12345 Valvo line
7300 Net Spy 1234 Valvo line
TABLE A-49. Trojan ports (Continued)
PORT NUMBER
TROJAN HORSE
PROGRAM
PORT NUMBER
TROJAN HORSE
PROGRAM










