reg opening ports and their risk, dell kace

Hi All,

im new to this forum, we are use dell kace deployment tool in our company, its alternative to sccm, most of them may know.

client machines  uses port 52230 to communicate with server , so far agent updates happen only in office network, we are planning to make kace agents communicate even if users are connected to home/public networks. I just want to know whats the risk in opening ports and opening dell kace port 52230  and making it accessible from public networks?
abdul rahimAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

abdul rahimAuthor Commented:
Hi All,

im new to this forum, we are use dell kace deployment tool in our company, its alternative to sccm, most of them may know.

client machines  uses port 52230 to communicate with server , so far agent updates happen only in office network, we are planning to make kace agents communicate even if users are connected to home/public networks. I just want to know whats the risk in opening ports and opening dell kace port 52230  and making it accessible from public networks
0
David Johnson, CD, MVPOwnerCommented:
Little or none.. as only the kace application uses that port
0
abdul rahimAuthor Commented:
opening kace port  would there be a risk? im not sure how hacking done over ports.. how vulnerable is opening this 52230 to public ?? how can someone use this 52230 port gain access to computer and make it vulnerable?
0
How do you know if your security is working?

Protecting your business doesn’t have to mean sifting through endless alerts and notifications. With WatchGuard Total Security Suite, you can feel confident that your business is secure, meaning you can get back to the things that have been sitting on your to-do list.

David Johnson, CD, MVPOwnerCommented:
if you assign the port to only the kace application. then no other application can use that port so they'd have to find a vulnerability in KACE that they could exploit to gain elevated privileges.  this is different than just opening the port for unrestricted access.
1

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
abdul rahimAuthor Commented:
Thanks Mr.David Johnson,for your reply.
0
frankhelkCommented:
No comment has been added to this question in more than 21 days, so it is now classified as abandoned.

I have recommended this question be closed as follows:

Accept: David Johnson CD MVP (https:#a40880776)

If you feel this question should be closed differently, post an objection and the moderators will review all objections and close it as they feel fit. If no one objects, this question will be closed automatically the way described above.

frankhelk
Experts-Exchange Cleanup Volunteer
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
System Utilities

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.