Virus Scanning, Firewalls and Threat Protection

While virus scanning software, firewalls and threat protection packages can prevent various forms of attack, it is important to understand that these protection mechanisms can also prevent your PlotWorks system from operating properly.

Virus Scanning

On-access virus scanning (typically during read, write and copy operations) should be disabled for the following folders:

  • PlotWorks installation folder and all subfolders, typically C:\Program Files\PLP\PlotWorks
  • PlotWorks queue folder and all subfolders, typically C:\Queue
  • Scan destination folder and all subfolders (not present on all systems)
  • Network Polling folder and all subfolders (not present on all systems)

Please consult the documentation provided by your vendor to learn how to configure your virus scanning software.

Firewalls

The PlotWorks Printer Interface module communicates with the printer over several network ports. Make sure that network communication between the PlotWorks PC and the printer is not blocked. Please consult the documentation provided by your vendor to learn how to configure your firewall.

PORT PROTOCOL DIRECTION PURPOSE
161 UDP Outbound SNMP messages
161 UDP Inbound SNMP messages
162 UDP Outbound SNMP messages
162 UDP Inbound SNMP messages
9100 TCP Outbound Image data

Threat Protection

The Job Editor and its associated viewer communicate with each other via http requests to localhost (127.0.0.1) using port 8887. Some threat protection packages will prevent this communication, causing the viewer to fail with a "dis::Refresh error unknown" message.

For example, AVG offers a number of security modules with their Anti-virus packages. Two of the available modules, the Link Scanner and the Online Shield, are related to protection against URL and HTTP communication threats. If a PlotWorks user has either or both AVG modules enabled they may receive an error shortly after launching the viewer. The error message will be followed by several more error messages. Please consult the documentation provided by your vendor to learn how to configure your threat protection software software.