Our security manger has flagged two open ports on our Power Admin servers as being security vulnerabilities. We only run PA software on these (and SQL) and I am unsure what these ports are needed for and if we can do anything about them. Any insight you can provide is greatly appreciated.

PAFileSight server (running FileSight and SQL) Port 53268 SSL Version 2 and 3 Protocol Detection The remote service encrypts traffic using a protocol with known weaknesses.

PAMonitor Server (running Server Monitor and Storage Monitor and SQL) Port 58864 SSL Version 2 and 3 Protocol Detection The remote service encrypts traffic using a protocol with known weaknesses.

asked 07 Nov, 16:33

Macbrun's gravatar image

Macbrun
132
accept rate: 0%


Hi -

All three products (PA Server Monitor, PA Storage Monitor and PA File Sight) do use an embedded HTTPS server for communication with the Console, Satellites, etc. You can control the port which is used in Settings > HTTP Server Settings.

Having said that, those ports you list are unusual, and definitely not the default ports. I'd recommend running:

netstat.exe -abn

That will show all open and listening ports, and which process is involved with the port.

link

answered 08 Nov, 21:31

Doug's gravatar image

Doug ♦♦
10.2k122138
accept rate: 21%

Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Tags:

×46
×20
×9
×4

Asked: 07 Nov, 16:33

Seen: 134 times

Last updated: 08 Nov, 21:31