Solved

What ports should be open or closed?

Posted on 2006-11-25
4
233 Views
Last Modified: 2010-03-18
Can some one please tell me where I can get a list of ports that should be open or closed and maybe what a basic definition of those ports are?

I am running XP Pro SP2

Thank you

Jim
0
Comment
Question by:jray9242
  • 2
4 Comments
 
LVL 15

Accepted Solution

by:
Naser Gabaj earned 50 total points
ID: 18010941
Greetings jray9242,

Check this link, HTH:
http://www.outpostfirewall.com/forum/showthread.php?t=9992

Also the Well-Known TCP Port Numbers list is here:

http://webopedia.internet.com/quick_ref/portnumbers.asp

Good Luck!
Naser
0
 
LVL 9

Expert Comment

by:trenes
ID: 18011230
Hi jray9242,

You can see your open ports with the command [netstat -a] if you want to see the process who openened it do a [netstat -ab] in the command prompt.
The best way to close ports is to minimize the services running on your system and to disable File/Print Sharing at you Network connection.
Here you have a nice list of EXE,DLL's to see what they do and wheter they are legit or not
http://www.castlecops.com/o23-all.html

Here you have a list of services, the list tells you if you need the serice is needed or not (depending on your situation off course)
http://www.ss64.com/ntsyntax/services.html

Hope this gives you the insight in your system.

Cheers!
regards,

Trenes
0
 

Author Comment

by:jray9242
ID: 18111594
Great job all and thank you much both. How can I split the points?
0
 
LVL 9

Expert Comment

by:trenes
ID: 18111758
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now