Block network ports

Block network ports

You can block access to network ports with BrowseControl. BrowseControl has the ability to control network protocol ports with its Port Filter.

Administrators can easily enable or disable network ports on the network by adding the ports to the Port Filter list.

Improve your network security by blocking ports to file transfer programs like FTP, torrent, and proxies

  1. Choose the BrowseControl solution from the left-hand menu
  2. Click the More options button and choose Port Filter
  3. Choose the group that you wish to filter from the drop-down menu
  4. Use the ADD button to add Port #s, the port type and if you want to block or filter.
  5. Click ADD FILTER button to complete the process.


    • Related Articles

    • Block unauthorized Human Interface Devices

      What does this do? Allows specific Human Interface Devices (HID), such as company-authorized keyboards and mice, and blocks all other keyboards and mice. This allows control of keyboards and other input devices that may pose a security risk. What ...
    • Block malicious websites

      BrowseControl web filtering solution has the ability to block websites that your users visit such as malicious sites. With BrowseControl’s Category Filter, you can select categories of websites you wish to block. URL Category Filtering is a feature ...
    • Release Notes

      Version 10.0.2 Oct 15, 2024 BrowseReporter - Subscribe to Dashboards: Easily share user activity data from your BrowseReporter dashboards or widgets as an email PDF report to designated inboxes by on a set schedule. Sync Active Directory Security ...
    • Best practices to block mouse mover software

      Employers have a common concern with productivity when employees are working remotely A common occurrence with remote working is having employees fake mouse and keyboard movements to avoid getting an “idle” or “away” status with related work apps. ...
    • Using CurrentWare to Lock Down a Machine When a User Gives Notice

      Purpose: This document outlines the steps to restrict a user’s access to the company network and secure their workstation using CurrentWare when they give notice. Step 1: Preparation Before making any changes to your end user with the CurrentWare ...