Solved

Kapersky End point 10 select and ACT Sage

Posted on 2014-01-14
5
352 Views
Last Modified: 2014-01-19
I just installed Kapersky Endpoint Select 10. I installed it on a server that also has ACT Sage business contact management database version . Since installing it the computers that use ACT can no longer connect to the database. I have not installed the Kapersky clients on the computers that can not access.
I am thinking it is simply blocking something but not sure how to change the settings to prevent it from blocking.
Any help would be spectacular. :)
0
Comment
Question by:mebaby333
  • 3
  • 2
5 Comments
 
LVL 29

Expert Comment

by:Sudeep Sharma
ID: 39779353
Disable the KES and monitor which port are been used by the ACT Sage?
I think it uses SQL Database, so it should have ports 1433 and 1434 opened. There might be some other ports which might be conflicting or blocked.

To monitor what port are been used you can use the tools called TCPView from Microsoft. Link below:
Info:
http://technet.microsoft.com/en-in/sysinternals/bb897437

Download:
http://download.sysinternals.com/files/TCPView.zip

Sudeep
0
 
LVL 29

Expert Comment

by:Sudeep Sharma
ID: 39779365
You could also use the exception creation for different Kaspersky products from the link below:

http://kb.swiftpage.com/app/answers/detail/a_id/24718

Sudeep
0
 
LVL 5

Accepted Solution

by:
mebaby333 earned 0 total points
ID: 39779370
I figured it out... hmmm ... I guess when I installed it the SQL Browser service became disabled? weird.
Thanks for looking :)
0
 
LVL 5

Author Comment

by:mebaby333
ID: 39779384
definitely helpful Sudeep :) Thank you... I am still going to go check those links out.
0
 
LVL 5

Author Closing Comment

by:mebaby333
ID: 39791916
SQL browser service became disabled during the install of Kapersky end point 10. I simple re enabled it and set it back to automatic and walah
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ensuring effective and secure communication in the age of healthcare BYOD.
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
Using examples as well as descriptions, and references to Books Online, show the documentation available for date manipulation functions and by using a select few of these functions, show how date based data can be manipulated with these functions.
Viewers will learn how the fundamental information of how to create a table.

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now