Skip to main content

Ports Requirements

The following figure shows Netwrix Threat Manager architecture and component interactions.

threatmanagerserver

Configure appropriate firewall rules to allow these connections.

Data Stream Firewall Rules

The following firewall settings are required for communication between the Threat Manager server and applications that provide the data stream:

Communication DirectionProtocolPortsDescription
InboundUDP10000Syslog messaging File System event data stream from Activity Monitor agent hosts
InboundTCP10001Advanced Message Queuing Protocol (AMQP) Active Directory event data stream from Activity Monitor agent hosts Active Directory event data stream from Threat Prevention agent hosts File System event data stream from Threat Prevention agent hosts
BidirectionalTCP8080Access Analyzer Console Hosts

Database Firewall Rules

The following firewall settings are required for communication between the Threat Manager server and the database server, when it is installed on a separate server:

note

These firewall rules are only needed if using a remote PostgreSQL database. That isn't recommended or the default.

Communication DirectionProtocolPortsDescription
OutboundTCP5435/5439Local Host and Remote communication from the PostgreSQL to the Threat Manager server.

Application Console Access Firewall Rules

The following firewall settings are required for accessing the Threat Manager console:

Communication DirectionProtocolPortsDescription
BidirectionalTCP8080Remote access to the application console
note

Threat Manager requires the default dynamic port range specified by Microsoft (49152 through 65535) for Windows Server client/server operations. If a firewall or other appliance is blocking these ports, this server will no longer properly respond to client requests and no longer support standard IP Stack operations that are required for the operation of this product.

Active Directory Domain Controllers Firewall Rules

The following firewall settings are required for communication between the Threat Manager server and Active Directory domain controllers:

Communication DirectionProtocolPortsDescription
OutboundTCP88Kerberos-sec
OutboundTCP135The endpoint mapper tells the client which randomly assigned port a service (FRS, AD replication, MAPI, etc.) is listening on
OutboundTCP389LDAP
OutboundTCP9389Active Directory Web Services
OutboundTCPVariousThe port that 135 reports. Used to bulk translate AD object names between formats.(Ephemeral Ports)

Remote Action Service Firewall Rules

The following firewall settings are required for communication between the Threat Manager server and the remote Action Service server, when it is installed on additional servers:

Communication DirectionProtocolPortsDescription
OutboundTCP8080Remote access to the Action Service server