Skip to main content

Firewall Ports

The following default ports are required for Threat Prevention functionality unless modified as per network requirements. If choosing the Create Windows Firewall Rules option either in step 6 of the Application Server Install, in step 6 of the Administration Console Remote Install, on the Set Options page of the Deploy Agents Wizard, or in step 7 of a Manual Agent Deployment, then Threat Prevention will create the necessary Windows firewall rules. If using a third party firewall, it will be necessary to manually set these.

NOTE: SIEM ports are configured when SIEM alerting is enabled in Threat Prevention. See the System Alerting Window topic for additional information.

Enterprise Manager Firewall Rules

The following firewall settings are required for communication with the Enterprise Manager:

Communication DirectionProtocolPortsDescription
(For versions 7.3.5 and later Agents using auto security mode) Agents to Enterprise ManagergRPC / TCP3741Inbound Agent Communication
(For upgrading from versions prior to 7.3.5.x Agents using auto security mode, or any Agents using high security mode) Agents to Enterprise ManagergRPC / TCP3739Inbound Agent Communication
Enterprise Manager to SQL ServerSQL Client / TCP1433SQL Server Communication
Enterprise Manager to SQL ServerSQL Client / UDP1434SQL Server Communication
Enterprise Manager to AgentsRPC / TCP135WMI enabled Optional: required for Agent Auto Deploy
Enterprise Manager to AgentsDCOM / TCPDynamic Range 49152 - 65535WMI enabled Optional: required for Agent Auto Deploy

Agent Firewall Rules

The following firewall settings are required for communication with the Agent:

Communication DirectionProtocolPortsDescription
(For versions 7.3.5 and later Agents using auto security mode) Agents to Enterprise Manager gRPC / TCPgRPC / TCP3741Outbound Enterprise Manager Communication
(For upgrading from versions prior to 7.3.5.x Agents using auto security mode, or any Agents using high security mode) Agents to Enterprise ManagergRPC / TCP3739Outbound Enterprise Manager Communication
Enterprise Manager to AgentRPC / TCP135WMI enabled Optional: required for Agent Auto Deploy
Enterprise Manager to AgentDCOM / TCPDynamic Range 49152 - 65535WMI enabled Optional: required for Agent Auto Deploy

NOTE: For NAS device file activity monitoring, additional ports are required. See the Ports for NAS Device Activity Monitoring topic for additional information.

Admin Console Firewall Rules

The following firewall settings are required for communication with the Administration Console:

Communication DirectionProtocolPortsDescription
Administration Console to Enterprise ManagergRPC / TCP3740Outbound Enterprise Manager Communication

Database Firewall Rules

The following firewall settings are required for communication with the SQL Server:

NOTE: This port requirement is specifically needed when the SQL Server is on a separate box from the Enterprise Manager and/or the Administration Console.

Communication DirectionProtocolPortsDescription
Enterprise Manager to SQL ServerSQL Client / TCP1433Inbound Enterprise Manager Communication
Enterprise Manager to SQL ServerSQL Client / UDP1434Inbound Enterprise Manager Communication

Netwrix Threat Manager Reporting Module Ports

Configure appropriate firewall rules to allow connections with the Netwrix Threat Manager Reporting Module.

Application Console Access Firewall Rules

The following firewall settings are required to access the Netwrix Threat Manager Reporting Module console:

Communication DirectionProtocolPortsDescription
BidirectionalTCP8080Remote access to the application console

NOTE: Threat Manager requires the default dynamic port range specified by Microsoft (49152 through 65535) for Windows Server client/server operations. If a firewall or other appliance is blocking these ports, this server will no longer properly respond to client requests and no longer support standard IP Stack operations that are required for the operation of this product.

Active Directory Domain Controllers Firewall Rules

The following firewall settings are required for communication between the Netwrix Threat Manager Reporting Module server and Active Directory domain controllers:

Communication DirectionProtocolPortsDescription
OutboundTCP88Kerberos-sec
OutboundTCP135The endpoint mapper tells the client which randomly assigned port a service (FRS, AD replication, MAPI, etc.) is listening on
OutboundTCP389LDAP
OutboundTCP636SSL LDAP
OutboundTCPVariousThe port that 135 reports. Used to bulk translate AD object names between formats.(Ephemeral Ports)

Database Firewall Rules

The following firewall settings are required to allow the Netwrix Threat Manager Reporting Module to talk to the Threat Prevention SQL database:

Communication DirectionProtocolPortsDescription
Netwrix Threat Manager Reporting Integration Service to SQL ServerSQL Client / TCP1433Inbound Netwrix Threat Manager Communication
Netwrix Threat Manager Reporting Integration Service to SQL ServerSQL Client / UDP1434Inbound Netwrix Threat Manager Communication

Ports for NAS Device Activity Monitoring

Firewall settings depend on the type of environment being targeted. The following firewall settings are required for communication between the Agent server and the Netwrix Activity Monitor Console:

Communication DirectionProtocolPortsDescription
Activity Monitor to Agent ServerTCP4498Agent Communication

The Windows firewall rules need to be configured on the Windows server, which require certain inbound rules be created if the scans are running in applet mode. These scans operate over a default port range, which cannot be specified via an inbound rule. For more information, see the Microsoft Connecting to WMI on a Remote Computer article.

Dell Celerra & Dell VNX Devices Additional Firewall Rules

The following firewall settings are required for communication between the CEE server/ Activity Monitor Activity Agent server and the target Dell device:

Communication DirectionProtocolPortsDescription
Dell Device CEE ServerTCPRPC Dynamic RangeCEE Communication
CEE Server to Activity Agent Server (when not same server)TCPRPC Dynamic RangeCEE Event Data

Dell Isilon/PowerScale Devices Additional Firewall Rules

The following firewall settings are required for communication between the CEE server/ Activity Monitor Activity Agent server and the target Dell Isilon/PowerScale device:

Communication DirectionProtocolPortsDescription
Dell Isilon/PowerScale to CEE ServerTCPTCP 12228CEE Communication
CEE Server to Activity Agent Server (when not same server)TCPRPC Dynamic RangeCEE Event Data

Dell Unity Devices Additional Firewall Rules

The following firewall settings are required for communication between the CEE server/ Activity Monitor Activity Agent server and the target Dell device:

Communication DirectionProtocolPortsDescription
Dell Device CEE ServerTCPRPC Dynamic RangeCEE Communication
CEE Server to Activity Agent Server (when not same server)TCPRPC Dynamic RangeCEE Event Data

Nasuni Edge Appliance Additional Firewall Rules

The following firewall settings are required for communication between the Activity Monitor Activity Agent server and the target Nasuni Edge Appliance:

Communication DirectionProtocolPortsDescription
Agent Server to NasuniHTTPS8443Nasuni API calls
Nasuni to Activity Agent ServerAMQP over TCP5671Nasuni event reporting

NetApp Data ONTAP 7-Mode Device Additional Firewall Rules

The following firewall settings are required for communication between the Activity Monitor Activity Agent server and the target NetApp Data ONTAP 7-Mode device:

Communication DirectionProtocolPortsDescription
Activity Agent Server to NetApp*HTTP (optional)80ONTAPI
Activity Agent Server to NetApp*HTTPS (optional)443ONTAPI
Activity Agent Server to NetAppTCP135, 139 Dynamic Range (49152-65535)RPC
Activity Agent Server to NetAppTCP445SMB
Activity Agent Server to NetAppUDP137, 138RPC
NetApp to Activity Agent ServerTCP135, 139 Dynamic Range (49152-65535)RPC
NetApp to Activity Agent ServerTCP445SMB
NetApp to Activity Agent ServerUDP137, 138RPC

*Only required if using the FPolicy Configuration and FPolicy Enable and Connect options in Activity Monitor.

NOTE: If either HTTP or HTTPS are not enabled, the FPolicy on the NetApp Data ONTAP 7-Mode device must be configured manually. Also, the External Engine will not reconnect automatically in the case of a server reboot or service restart.

NetApp Data ONTAP Cluster-Mode Device Additional Firewall Rules

The following firewall settings are required for communication between the Activity Monitor Activity Agent server and the target NetApp Data ONTAP Cluster-Mode device:

Communication DirectionProtocolPortsDescription
Activity Agent Server to NetApp*HTTP (optional)80ONTAPI
Activity Agent Server to NetApp*HTTPS (optional)443ONTAPI
NetApp to Activity Agent ServerTCP9999FPolicy events

*Only required if using the FPolicy Configuration and FPolicy Enable and Connect options in Activity Monitor.

NOTE: If either HTTP or HTTPS are not enabled, the FPolicy on the NetApp Data ONTAP 7-Mode device must be configured manually. Also, the External Engine will not reconnect automatically in the case of a server reboot or service restart.

Panzura Devices Additional Firewall Rules

The following firewall settings are required for communication between the Activity Monitor Activity Agent server and the target Panzura device:

Communication DirectionProtocolPortsDescription
Activity Agent Server to PanzuraHTTPS443Panzura API
Panzura filers to to Activity Agent ServerAMQP over TCP4497Panzura Event Reporting

Protect the port with a username and password. The credentials will be configured in Panzura.

Ports for Integration with Full Netwrix Threat Manager

The following firewall settings are required to integrate with the full version of Netwrix Threat Manager:

Communication DirectionProtocolPortsDescription
Agent Server to Threat ManagerTCP/UDP10001Data event stream to Threat Manager