Czeslaw LIebert 0 Posted February 8, 2024 Posted February 8, 2024 HI. The company's main firewall is configured with zero trust policy in mind, allowing only needed traffic, blacking everything else. Is there a list of ports/IPs that I can use to allow ESET Protect Cloud to communicate with PCs on our network?
ESET Moderators Solution Peter Randziak 1,232 Posted February 8, 2024 ESET Moderators Solution Posted February 8, 2024 Hello, the Network Prerequisites are covered at https://help.eset.com/protect_cloud/en-US/?prerequisites.html the full list is available at https://support.eset.com/en/kb332-ports-and-addresses-required-to-use-your-eset-product-with-a-third-party-firewall using ESET Bridge might be an option for you as it 1. by default (when Vulnerability & Patch Management is not being used) allows traffic related to ESET's services 2. caches significant portion of the traffic to save your bandwidth So I recommend to explore this option Peter Czeslaw LIebert 1
Czeslaw LIebert 0 Posted February 8, 2024 Author Posted February 8, 2024 4 minutes ago, Peter Randziak said: Hello, the Network Prerequisites are covered at https://help.eset.com/protect_cloud/en-US/?prerequisites.html the full list is available at https://support.eset.com/en/kb332-ports-and-addresses-required-to-use-your-eset-product-with-a-third-party-firewall using ESET Bridge might be an option for you as it 1. by default (when Vulnerability & Patch Management is not being used) allows traffic related to ESET's services 2. caches significant portion of the traffic to save your bandwidth So I recommend to explore this option Peter Thank you for the list. Any good manual on how to set up ESET Bridge locally, while using ESET Protect Cloud? I will need the bridge anyway, as there are some clients on our network that are not allowed to access internet.
Administrators Marcos 5,742 Posted February 8, 2024 Administrators Posted February 8, 2024 There's basically no need make any changes in ESET Bridge configuration after you install it. Just configure the proxy server via a security product policy: Czeslaw LIebert 1
Recommended Posts