Skip to main content

Use Cases:
  • Block unused ports to minimize the attack surface (e.g., blocking port 3389 to prevent unauthorized external remote access).
  • Restrict non-essential ports to prevent policy violations by employees, such as illicit software downloads or data exfiltration.
This feature restricts active network services on devices, preventing the exposure of vulnerable or unnecessary ports. Follow these steps to configure a blocking policy based on Port:
1
2
3

Select the specific tags or individual devices to which the policy will apply.

4

Enter a description or reason for the policy (optional).