![]() ![]() ![]() Since the release of Lansweeper 6.0, Symantec. The threat environment is evolving quickly and given the size and complexity of todays networks, organizations are struggling to keep up. An easy way to prevent errors like the one below and to allow for a successful network scan is to whitelist all traffic coming from your Lansweeper server. It is important to allow traffic from your Lansweeper server to these ports, to ensure a successful network scan. Symantec identifies this sped up traffic as port attacks in some cases. Lansweeper 6.0 scans the same network device ports as previous Lansweeper releases, but does so more quickly to speed up scanning. This may result in traffic being blocked and errors similar to the one below in your Symantec installation. Since the release of Lansweeper 6.0, Symantec Endpoint Protection in particular is prone to wrongly identifying Lansweeper traffic as port attacks on your devices. It is important to allow traffic from your Lansweeper server to these ports, to ensure a successful network scan. A list of scanned ports can be found in this knowledge base article. ![]() Endpoint Protection scans computers for security threats. To pull data from the Linux, Unix, Mac and Windows computers, VMware servers and other devices in your network, Lansweeper queries a number of ports on the devices. As of 2018, Version 14 is the only currently-supported release. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |