

For more information, see >POP3 and IMAP4 in Exchange Server 2013. For more information about these clients and services, see the following topics: However, you may find that some services must be configured to use unencrypted web connections on 80/TCP to the Client Access server. Whenever possible, we recommend using encrypted web connections on 443/TCP to help protect data and credentials.

The network ports that are required for email clients to access mailboxes and other services in the Exchange organization are described in the following diagram and table. Network ports required for clients and services These network ports are described in this topic. It's also OK if you decide to restrict network traffic between internal clients and internal Exchange servers.

It's expected that you'll restrict network traffic between external clients and services and your internal Exchange organization.
#DIGITAL SENTRY SERVER PORTS FREE#
If you have firewalls or network devices that could potentially restrict or alter this kind of network traffic, you need to configure rules that allow free and unrestricted communication between these servers (rules that allow incoming and outgoing network traffic on any port (including random RPC ports) and any protocol that never alter bits on the wire).Įdge Transport servers are almost always located in a perimeter network, so it's expected that you'll restrict network traffic between the Edge Transport server and the Internet, and between the Edge Transport server and your internal Exchange organization. We do not support restricting or altering network traffic between internal Exchange servers, between internal Exchange servers and internal Lync or Skype for Business servers, or between internal Exchange servers and internal Active Directory domain controllers in any and all types of topologies. Before we get into that, understand the following ground rules: You may need to reboot for the change to take effect.This topic provides information about the network ports that are used by Microsoft Exchange Server 2013 for communication with email clients, Internet mail servers, and other services that are external to your local Exchange organization. Start no lower than port 50000, and allocate no fewer than 255 dynamic ports.įor example, on Server 2008 use the following command: netsh int ipv4 set dynamicport tcp start=50000 num=255 You may have already done this in your environment to enable networked DCOM access for other applications. To address this problem, specify a custom range for RPC dynamic ports. This port can be in one of the ranges before that are quite large by default.

WMI (or any other process that uses DCOM) connects to it initially using port 135, and the target responds with a dynamic port number for WMI to use for the rest of the session. The one that's difficult for firewalls are the RPC dynamic ports.
#DIGITAL SENTRY SERVER PORTS WINDOWS#
Tcp 1024-65535 (RPC dynamic ports - for older OS versions such as Windows NT 4.0, Windows Server 2000, or Windows Server 2003)Ī custom RPC dynamic port range (following) Tcp 49152-65535 (RPC dynamic ports - Windows Vista, Windows Server 2008, or later versions) Tcp 1433 Windows Performance Counter Access Tcp 1433 (or whatever port is used by SQL Server) Azure SQL Database and SQL Data Warehouse Ports Between Targets and Monitoring Serviceįor Performance Analysis to properly monitor a target on the network, the following ports on the monitored target must be accessible to the SQL Sentry monitoring service machine(s): SQL Server Access
