Specifications
Trend Micro™ OfficeScan™ 10 Administrator’s Guide
5-62
Block Ports
During outbreaks, block vulnerable ports that viruses/malware might use to gain access 
to client computers.
WARNING! Configure Outbreak Prevention settings carefully. Blocking ports that are 
in use makes network services that depend on them unavailable. For 
example, if you block the trusted port, OfficeScan cannot communicate 
with the client for the duration of the outbreak.
To block vulnerable ports:
PATH: NETWORKED COMPUTERS > OUTBREAK PREVENTION > START OUTBREAK PREVENTION 
> B
LOCK PORTS
1. Select whether to Block trusted port.
2. Select the ports to block under the Blocked Ports column.
a. If there are no ports in the table, click Add. In the screen that opens, select the 
ports to block and click Save.
• All ports (including ICMP): Blocks all ports except the trusted port. If 
you also want to block the trusted port, select the Block trusted port check 
box in the previous screen. 
• Commonly used ports: Select at least one port number for OfficeScan to 
save the port blocking settings.
• Trojan ports: Blocks ports commonly used by Trojan horse programs. 
See Trojan Port on page A-11 for details.
• A port number or port range: Optionally specify the direction of the 
traffic to block and some comments, such as the reason for blocking the 
ports you specified.
• Ping protocol (Reject ICMP): Click if you only want to block ICMP 
packets, such as ping requests.










