cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Lansweeper
Lansweeper Tech Support
Lansweeper Tech Support

To pull data from the Linux, Unix, Mac and Windows computers, VMware servers and other devices in your network, Lansweeper queries a number of ports on the devices. A list of scanned ports can be found in this knowledge base article. It is important to allow traffic from your Lansweeper server to these ports, to ensure a successful network scan.

Since the release of Lansweeper 6.0, Symantec Endpoint Protection in particular is prone to wrongly identifying Lansweeper traffic as port attacks on your devices. This may result in traffic being blocked and errors similar to the one below in your Symantec installation. Lansweeper 6.0 scans the same network device ports as previous Lansweeper releases, but does so more quickly to speed up scanning. Symantec identifies this sped up traffic as port attacks in some cases.

An easy way to prevent errors like the one below and to allow for a successful network scan is to whitelist all traffic coming from your Lansweeper server. More restrictive rules may work as well.

The client will block traffic from IP address <IP of Lansweeper server> for the next 600 seconds (from <date and time> to <date and time>)

Whitelisting all Lansweeper traffic 

To whitelist all traffic from the Lansweeper server in Symantec Endpoint Protection, do the following:

  1. Open Symantec Endpoint Protection Manager.
  2. Select the Policies tab.
  3. Select the Firewall tab.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-1.jpg
  4. Select the existing policy applied to your client machines on the right and choose Edit the policy. Alternatively, create a new policy to apply to your clients.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-2.jpg
  5. In the policy popup, select the Rules tab.
  6. Select the Add Rule... button.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-3.jpg
  7. Give your rule a name, e.g. "Lansweeper". Select Next to continue.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-4.jpg
  8. Tick Allow connections. Select Next to continue.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-5.jpg
  9. Tick All Applications. Select Next to continue.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-6.jpg
  10. Tick Any computer or site. Select Next to continue.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-7.jpg
  11. Tick All types of communication (all protocols and ports, local and remote). Select Next to continue.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-8.jpg
  12. Optionally, you can choose to have a log entry generated when a connection is made by the Lansweeper server. Select Finish to create the rule.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-9.jpg
  13. Once the rule has been created, double-click in the Host column and submit your Lansweeper server's IP address, to only apply the rule to traffic coming from your Lansweeper server.
    In the example below, the IP address of the Lansweeper server is 192.168.1.50. Select OK several times to close all popups and submit your changes.
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-10.jpg
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-11.jpg
    configuring-symantec-endpoint-protection-for-use-with-lansweeper-12.jpg
New to Lansweeper?
Article Dashboard
Version history
Last update:
‎12-22-2022 01:44 PM
Updated by: