Folder, Services and Ports that must have exclusions set in Anti-Virus programs

 

The following folders, service and port must have exclusions set in the anti-virus program that runs on the PC that a Navigator system runs on. If there is no anti-virus, then ignore. 

 

Folders:
 

C:\Navigator
 

C:\Program Files (x86)\Common Files\SafeNet Sentinel
 

C:\Program Files (x86)\Common Files\Aladdin Shared/HASP
 

C:\Users\"Username"\AppData\Roaming\Xitron
(hidden folder-to browse to it enter %appdata% in a folder explorer window)
 

C:\ProgramData\Xitron
(hidden folder-to browse to it enter %programdata% in a folder explorer window)

 

 

Services:

Sentinel LDK License Manager

 

 

Ports:

1947 – This port is required for the LDK License Manager

9090 – This port is required for the ProofScope Viewer

81 - this port is for the web server inside Navigator.  It can be changed by the user though.  So it may not be at 81.  You can check what yours is set to under Server Settings in Navigator Server.

21719  - Windows and Macintosh clients communicate with the Server on this port.

 

 

 

To set the Exclusions in Windows Anti-Virus

 

  1. Open Windows settings and open Update & Security

    Graphical user interface, application

Description automatically generated

     
  2. In the left-hand column open Windows Security

  3. Under Protected Areas open Virus & treat protection.
    This will open a new window

    Graphical user interface, text, application, email

Description automatically generated


  4. Scroll down to Virus & Treat Protection settings and click on Manage Settings

    Graphical user interface, text, application, email

Description automatically generated


  5. In the next window scroll down to Exclusions and click on Add or Remove Exclusions

    Graphical user interface, text, application, email

Description automatically generated 

     
  6. Now click on Add an Exclusion to create an exclusion

    Graphical user interface, text, application

Description automatically generated 

     
  7. Select the type of exclusion (File, Folder, File Type, Process)

    Graphical user interface, text, application

Description automatically generated 

     
  8. Now browse to the location of the File, Folder, File Type, or Process

    Graphical user interface, text, application, email

Description automatically generated


  9. Repeat the process until all of the folders have been excluded.





Appendix.  How do figure out what ports are being used on your computer.


Just going to a CMD window and typing "netstat -ano" will give you a list of results.  Try it.


In this example, it’s our web server client on localhost, the right-hand column is the Process ID, e.g. we find out here that process 19060 is using port 81 and is our web server.

 

C:\Users\nick>netstat -ano | find "81"

 TCP    0.0.0.0:81             0.0.0.0:0              LISTENING       19060

 TCP    127.0.0.1:4767         127.0.0.1:49819        ESTABLISHED     4656

 TCP    127.0.0.1:5939         127.0.0.1:58150        ESTABLISHED     5064

 TCP    127.0.0.1:49810        127.0.0.1:49811        ESTABLISHED     5376

 TCP    127.0.0.1:49811        127.0.0.1:49810        ESTABLISHED     5376

 TCP    127.0.0.1:49812        127.0.0.1:49813        ESTABLISHED     5376

 TCP    127.0.0.1:49813        127.0.0.1:49812        ESTABLISHED     5376

 TCP    127.0.0.1:49814        127.0.0.1:49815        ESTABLISHED     5376

 TCP    127.0.0.1:49815        127.0.0.1:49814        ESTABLISHED     5376

 TCP    127.0.0.1:49816        127.0.0.1:49817        ESTABLISHED     5376

 TCP    127.0.0.1:49817        127.0.0.1:49816        ESTABLISHED     5376

 TCP    127.0.0.1:49819        127.0.0.1:4767         ESTABLISHED     13828

 TCP    127.0.0.1:58150        127.0.0.1:5939         ESTABLISHED     20644

 TCP    192.168.0.34:58149     37.252.232.107:5938    ESTABLISHED     5064

 TCP    192.168.0.34:58152     188.172.198.142:5938   ESTABLISHED     5064

 TCP    192.168.0.34:58154     188.172.198.147:5938   ESTABLISHED     5064

 UDP    [fe80::3819:b90e:e076:4e9%3]:1900  *:*                                    3408

 UDP    [fe80::3819:b90e:e076:4e9%3]:2177  *:*                                    10972

 UDP    [fe80::3819:b90e:e076:4e9%3]:65359  *:*                                    3408

 

C:\Users\nick>tasklist | find "19060"

XiWebServer.exe              19060 Console                    1        128 K



More help on netstat at Microsoft