Creating a list of monitored ports

Such protection components as Mail Anti-Virus, Anti-Spam, Web Anti-Virus and IM Anti-Virus monitor the data streams transferred via specific protocols and passing certain open TCP-ports on your computer. Thus, for example, Mail Anti-Virus analyzes information transferred via the SMTP protocol, and Web Anti-Virus analyzes HTTP packets.

You can enable monitoring all or just the selected network ports. If you configure the product to monitor the selected ports, you can specify the list of applications, for which all ports will be monitored.

To add a port to the list of monitored ports:

  1. Open the application settings window.
  2. In the left part of the window, in the Advanced Settings section, select the Network component.
  3. In the Monitored ports section, click the Select button.
  4. In the displayed Network ports window click the Add link and open the network port addition dialog.
  5. Enter the necessary information in the displayed Network port window.

To exclude a port from the list of monitored ports:

  1. Open the application settings window.
  2. In the left part of the window, in the Advanced Settings section, select the Network component.
  3. In the Monitored ports section, click the Select button.
  4. In the Network ports window that opens, uncheck the Internet Security mark fs Creating a list of monitored ports box next to the port’s description.

To create the list of applications for which you wish to monitor all ports:

  1. Open the application settings window.
  2. In the left part of the window, in the Advanced Settings section, select the Network component.
  3. In the Monitored ports section, click the Select button.
  4. In the Network ports window that opens, check the Internet Security mark fs Creating a list of monitored ports Monitor all ports for specified applications box and click the Add link in the section below to open the menu.
  5. In the menu that opens, select an application. When selecting Browse, a window opens in which you should specify the path to an executable file. When selecting Applications, the list of applications currently running opens.
  6. In the Application window that opens, enter the description for the application selected.
Internet Security arr Creating a list of monitored portsPage top

Creating a list of monitored ports