[KB8056] Opening the Windows Firewall for ESET Endpoint Encryption Server self-enrollment

Issue

Details

Self-enrollment

This process is only required if you are using self-enrollment.

The steps described below are for the software firewall provided with Windows Server 2012 R2. Steps may vary on other editions of Windows. You may need to make similar changes to hardware firewalls if present to allow communications.

There are two methods to allow communications; only one of the methods needs to be used: 

Solution

Application exclusion

  1. Press the Windows  key on your keyboard and type control panel. Click Control Panel.

Figure 1-1
  1. Click System and Security.

Figure 1-2
  1. Click Allow an app through Windows Firewall.
Figure 1-3
  1. Click Allow another app.
Figure 1-4
  1. Click Browse.
Figure 1-5
  1. Browse to C:\Program Files (x86)\ESET Endpoint Encryption Server and select dlpecsrv. Click Open.
Figure 1-6
  1. Click Network types.
Figure 1-7
  1. Select the check box next to Domain: Networks at a workplace that are attached to a domain and click OK.
Figure 1-8
  1. Confirm that ESET Endpoint Encryption Server Console Service is listed and click OK.
Figure 1-9

Port exclusion

  1. Press the Windows  key on your keyboard and type control panel. Click Control Panel

  2. Click System and Security.

  3. Click Windows Defender Firewall.

Figure 2-1
  1. Click Advanced settings.
Figure 2-2
  1. Select Inbound Rules and click New Rule.
Figure 2-3
  1. Select Port and click Next.
Figure 2-4
  1. Select TCP, ensure that Specific local ports option is selected, and type 8266 in the Specific local ports field. Click Next.
Default port used by the ESET Endpoint Encryption Server 

This assumes you have not modified the default port used by the ESET Endpoint Encryption Server.

Figure 2-5
  1. Select Allow the connection and click Next.
Figure 2-6
  1. Deselect the check boxes next to Private and Public and ensure that only the check box next to Domain is selected. Click Next.
Figure 2-7
  1. Type a name for the rule in the Name field and click Finish.
Figure 2-8
  1. Repeat the process from the Port exclusion section but select UDP as the type instead of TCP in Step 7.