Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 115
  • Last Modified:

Questions on windows ports

We are using Comodo Internet Security Premium version 8.4.0.5076.  Recently we were recommended to close all unused ports in each PC;  we only needed the ports opened such as:

      - Port 53 (for DNS)
      - Port 80 (for Http)
      - Port 443 (for SSL secure browsing)
      - Port 8080 (for secondary port)

And close all other ports as follows:

      - Block 0-52
      - Block 53-79
      - Block 81-443
      - Block 444-8079
      - Block 8081-65535

That seems to make sense but we have these questions about apps used in some computers, such as:

Remote Desktop
SQL
Google Drive
OneDrive
Mega cloud
DropBox
Box
iCloud
Hyper-V

What do EE recommend as to the open and closed ports?

Is the recommendation of closing non-used ports a good one?

Finally, based on the list of apps, what ports do these apps uses so we can open them?
0
rayluvs
Asked:
rayluvs
  • 6
  • 4
  • 3
3 Solutions
 
Russ SuterCommented:
Windows Remote Desktop uses port 3389 by default. SQL Server uses port 1433 by default. If you have additional SQL Server instances then they will use a different, randomly selected port. Hyper-V doesn't use any ports in and of itself. I'm not 100% certain about the other services but I believe those are mostly outbound connections. To enhance your system's security you need only create inbound rules which shouldn't affect cloud services.
0
 
QlemoC++ DeveloperCommented:
A recommendation to block outbound traffic is usually too much, unless you need to create a fully controlled network. As said above, you block inbound traffic first. Then you should know which ports are used - if someone needs to RDP into a machine, that (target) machine needs to have RDP opened for inbound. If there is no need to at any time (even for administrative tasks), the port should be blocked inbound.
In general, if you provide a service on a machine (RDP etc.), open the inbound port. Don't block outbound, unless there is a specific need.
0
 
rayluvsAuthor Commented:
Great info!

As for the apps:

- Remote Desktop
- SQL
- Google Drive
- OneDrive
- Mega cloud
- DropBox
- Box
- iCloud
- Hyper-V

Based on your recommendation, how can we determine inbound ports for the above apps or connections?
0
Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

 
QlemoC++ DeveloperCommented:
The first comment enumerates the known ports. You don't need inbound rules for Cloud services.
0
 
rayluvsAuthor Commented:
What about hyper-v (especially if we connect to one outside our PC and also if we have one in our PC)
0
 
Russ SuterCommented:
Hyper-V doesn't inherently use any ports. The virtual machines that Hyper-V hosts may use ports. However the host firewall doesn't apply to the hosted VMs.
0
 
rayluvsAuthor Commented:
But if from within the VM there is malicious code and the VM has access to host or the PC connected to it, wouldn't that also infect the host?  For example, we have a VM that you can ping the host or the PC you connecting from and in additional, the VM from within has access to the host drives.  That said, the ports are not considered here?
0
 
Russ SuterCommented:
A VM is just like any other computer. It has no more access to the host machine than you give it. If you configure the VM to use the host's network adapter then it is as if the VM is on the same network and is subject to the same network rules as any other machine.

If it helps, for the purpose of networking thing of a VM as another physical computer sitting next to the current one and connected to the same network. That's the extent of it.
0
 
rayluvsAuthor Commented:
Understood.  

To close the question, and going back to the original question, should we set as closed the following ports in our firewall apps?:

- Block 0-52                             - (leave 53, dns open)
- Block 54-79                          - (leave 80, http open)
- Block 81-442                        - (leave 443, ssl open)
- Block 444-1432                   - (leave 1433, sql open)
- Block 1434-3388                 - (leave 3389, rdp open)
- Block 3390-8079                 - (leave 8080, alt,port open)
- Block 8081-65535

(we have updated the list of "open" ports [SQL port 1433 and RDP port 3389] with EE comments placed)
0
 
Russ SuterCommented:
No port should be open unless you have a need for it.

Port 53 should be open only if the machine is a DNS server.
Ports 80 and 443 should only be open if the machine is hosting a website.
Port 1433 should only be open if the machine is hosting a SQL Server instance.
Port 3389 should only be open if the machine needs to accept Windows RDP requests.
Port 8080 should only be open if you need to host an additional website on this port.

Side note, it's generally considered poor security to host a SQL Server instance on the same machine as a website. If you must do this and the SQL Server instance is consumed only by the website then there is no need to open port 1433 since the IP address will be local (127.0.0.1) which should never be blocked.
0
 
rayluvsAuthor Commented:
This question we have placed in EE is for a computer that the we need to connect to via Remote Desktop (when in LAN) and connect to via TeamViewer (outside our LAN, i.e. From our home).

When we are connected to this computer via RDP or Teamviewer, we want to use it's MSSQL apps, some VMs and cloud services it has.  These services are used when we sit down front of the PC or when connected.

Based on your comment, we can close all ports except 3389?
0
 
QlemoC++ DeveloperCommented:
Yes. TeamViewer connects to one of their servers, so the connection is "outbound" for that. MSSQL etc. is all outbound, only RDP is inbound, and that needs to be allowed.
0
 
rayluvsAuthor Commented:
Thanx!
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

  • 6
  • 4
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now