Skip to main content

Ports Requirements

Netwrix Threat Manager architecture and components interactions are shown in the figure below.

threatmanagerserver

Configure appropriate firewall rules to allow these connections.

Data Stream Firewall Rules

The following firewall settings are required for communication between the Threat Manager server and applications that provide the data stream:

Communication DirectionProtocolPortsDescription
InboundUDP10000Syslog messaging File System event data stream from Activity Monitor agent host(s)
InboundTCP10001AMPQ Active Directory event data stream from Activity Monitor agent host(s) Active Directory event data stream from Threat Prevention agent host(s) File System event data stream from Threat Prevention agent host(s)
BidirectionalTCP8080Access Analyzer Console Host(s)

Application Services Firewall Rules

The following firewall settings are required for communication for the Threat Manager services:

Communication DirectionProtocolPortsDescription
BidirectionalTCP55555Active Directory login to the application console
BidirectionalTCP55556Active Directory login to the application console
BidirectionalTCP55557Local host communication from the Event Service to the Job Service agent host(s)
BidirectionalTCPDynamically Configured on StartupLocal host communication from the Event Service to the Job Service agent host(s)

Database Firewall Rules

The following firewall settings are required for communication between the Threat Manager server and the database server, when it is installed on a separate server:

NOTE: These firewall rules are only needed if using a remote PostgreSQL database. That is not recommended or the default.

Communication DirectionProtocolPortsDescription
OutboundTCP5432Local Host and Remote communication from the PostgreSQL to the Threat Manager server.

Application Console Access Firewall Rules

The following firewall settings are required for accessing the Threat Manager console:

Communication DirectionProtocolPortsDescription
BidirectionalTCP8080Remote access to the application console

NOTE: Threat Manager requires the default dynamic port range specified by Microsoft (49152 through 65535) for Windows Server client/server operations. If a firewall or other appliance is blocking these ports, this server will no longer properly respond to client requests and no longer support standard IP Stack operations that are required for the operation of this product.

Active Directory Domain Controllers Firewall Rules

The following firewall settings are required for communication between the Threat Manager server and Active Directory domain controllers:

Communication DirectionProtocolPortsDescription
OutboundTCP88Kerberos-sec
OutboundTCP135The endpoint mapper tells the client which randomly assigned port a service (FRS, AD replication, MAPI, etc.) is listening on
OutboundTCP389LDAP
OutboundTCP636SSL LDAP
OutboundTCPVariousThe port that 135 reports. Used to bulk translate AD object names between formats.(Ephemeral Ports)

Remote Action Service Firewall Rules

The following firewall settings are required for communication between the Threat Manager server and the remote Action Service server, when it is installed on additional server(s):

Communication DirectionProtocolPortsDescription
OutboundTCP8080Remote access to the Action Service server