Environmental Requirements

To minimize the number of ports that must be opened in your firewall, inContact WFO uses a service called Connection Pooling on the PREMISES server. This service requires:

Port Transport Description
2010 HTTP(S)

Open on server and firewall for communication between the PREMISES server and the cloud. Either HTTP or HTTPS can be used. Talk to your inContact WFO team about secure transport configuration.

443 HTTPS Open on server and firewall for communication between the PREMISE server and the public cloud for storage of screen recordings.

In addition, the following ports must be open at your location to allow for proper communication between inContact WFO components:

Port Transport Description
4510 TCP Connections from Silverlight client players
2020 HTTP inContact WFO Web Portal connections using the HTML5 Interaction Player
5650 HTTP Token requests for the HTML5 Interaction Player
443 HTTPS HTTPS services on the client PCs for inContact WFO Web Portal
943

TCP

Silverlight cross-domain policy listener
5638 TCP Logging communications between client PCs and the PREMISES server
5672 TCP Used by the messaging interface for various inContact WFO services

If you use inContact Screen Recording, you will additionally need:

Port Transport Description
5633 TCP Open on client PCs for communication between the PC and the PREMISES server. Secure communication between the PREMISES server and the clients is dependent upon the security of your LAN.

If you use inContact Desktop Analytics, you will additionally need:

Port Transport Description
5634 TCP Open on client PCs for communication between the PC and the PREMISES server. These communications can be secured using HTTPS and SSL. For more information, talk to inContact Support or see inContact WFO Security Overview and the inContact Desktop Analytics Guide.

Antivirus Software

Antivirus exclusions should be configured in any system where antivirus scanning is installed. The guidelines below are provided to assist with ensuring the reliability and performance of your inContact WFO system, while still providing for a secure environment. A lack of exclusions can cause system performance issues and possibly contribute to service outages.

These guidelines apply to both memory resident and on-demand scanning.

General Considerations

These exclusion guidelines are product-specific. For applications not specifically listed, it is often necessary to determine exclusions on a case-by-case basis. This section provides guidance in this area.

Files should typically be excluded based on the following criteria:

  • Locked Files — The files are permanently locked open by a legitimate server process. Examples of these are databases such as DHCP and SQL Server, as well as files such as the Windows Pagefile.
  • Large Files — The files are manipulated often by a legitimate server process and are typically large in size. Examples of these are copying CD/DVD images (.iso) and Virtual Machine Files (.vhd). In addition, operations may include offline maintenance on Virtual Machine Files and Exchange Server databases.
  • Temporary Files — A large number of temporary files are written to disk by a legitimate server process.

Exclusion Guidelines

The following should be excluded from anti-virus scanning on the PREMISE Server:

  • The cc_screencapserver.exe process
  • Files with the *.vid extension
  • The default folder associated with inContact Screen Recording, C:\temp\
  • The cc_loggerservice.exe process
  • Files with the *.log extension
  • The default folder associated with inContact WFO logging, C:\Program Files\CallCopy\Logs\