reg opening ports and their risk, dell kace

Hi All,

im new to this forum, we are use dell kace deployment tool in our company, its alternative to sccm, most of them may know.

client machines  uses port 52230 to communicate with server , so far agent updates happen only in office network, we are planning to make kace agents communicate even if users are connected to home/public networks. I just want to know whats the risk in opening ports and opening dell kace port 52230  and making it accessible from public networks?
abdul rahimAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

abdul rahimAuthor Commented:
Hi All,

im new to this forum, we are use dell kace deployment tool in our company, its alternative to sccm, most of them may know.

client machines  uses port 52230 to communicate with server , so far agent updates happen only in office network, we are planning to make kace agents communicate even if users are connected to home/public networks. I just want to know whats the risk in opening ports and opening dell kace port 52230  and making it accessible from public networks
David Johnson, CD, MVPOwnerCommented:
Little or none.. as only the kace application uses that port
abdul rahimAuthor Commented:
opening kace port  would there be a risk? im not sure how hacking done over ports.. how vulnerable is opening this 52230 to public ?? how can someone use this 52230 port gain access to computer and make it vulnerable?
Defend Against the Q2 Top Security Threats

Were you aware that overall malware worldwide was down a surprising 42% from Q1'18? Every quarter, the WatchGuard Threat Lab releases an Internet Security Report that analyzes the top threat trends impacting companies worldwide. Learn more by viewing our on-demand webinar today!

David Johnson, CD, MVPOwnerCommented:
if you assign the port to only the kace application. then no other application can use that port so they'd have to find a vulnerability in KACE that they could exploit to gain elevated privileges.  this is different than just opening the port for unrestricted access.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
abdul rahimAuthor Commented:
Thanks Mr.David Johnson,for your reply.
frankhelkCommented:
No comment has been added to this question in more than 21 days, so it is now classified as abandoned.

I have recommended this question be closed as follows:

Accept: David Johnson CD MVP (https:#a40880776)

If you feel this question should be closed differently, post an objection and the moderators will review all objections and close it as they feel fit. If no one objects, this question will be closed automatically the way described above.

frankhelk
Experts-Exchange Cleanup Volunteer
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
System Utilities

From novice to tech pro — start learning today.