Prerequisites
Last updated on:
In this page
Overview
This page outlines the prerequisites and setup requirements including ports, log processors, log collection, agent orchestration, discovery, workflow actions, distributed communication, antivirus exceptions, and threat analytics.
Before starting EventLog Analyzer in your environment, ensure that the following are taken care of.
What are the ports required for EventLog Analyzer?
1. Primary Ports
Web Server Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTP/8095 (default) HTTPS/8458 (configurable) |
EventLog Analyzer Server |
|
Ports Usage:
|
Log Processors
When Log360 is configured with multiple Log Processors in a scalable setup, the following ports are required in addition to the primary ports:
| PORT | INBOUND | OUTBOUND | USAGE |
|---|---|---|---|
| TCP/9092, 9093 | EventLog Analyzer Server and Log Processor | EventLog Analyzer Server and Log Processor | Log Queue Engine communication |
| TCP/7800 | EventLog Analyzer Server and Log Processor | EventLog Analyzer Server and Log Processor | Cluster communication between Log Processor and the main server |
Elasticsearch
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/9300-9400 (configurable) | EventLog Analyzer Search Engine Management Node [ SEM Node ] | EventLog Analyzer Server |
Ports Usage:
|
Redis Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/8179-8189 | EventLog Analyzer Server and Log Processor | EventLog Analyzer Server and Log Processor | Ports Usage:
|
Internal Communication
| PORT | INBOUND And OUTBOUND | Additional Rights and Permissions |
|---|---|---|
| UDP/5000 (configurable) | EventLog Analyzer Server |
Ports Usage:
|
Database
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/33335 |
Ports Usage:
|
2. Log Collection
Windows Log Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cimv2 in WMI Properties:
Firewall Permissions:
|
| TCP/139 | Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Windows Device | EventLog Analyzer Server | SMB RPC/NP | |
| Dynamic ranges of RPC ports - TCP/49152 to 65,535 | Windows Device | EventLog Analyzer Server | RPC randomly allocates high TCP ports for Windows Server 2008 and later versions, as well as for Windows Vista and subsequent versions |
- It is not necessary to open outbound ports on the EventLog Analyzer agent machine and inbound ports on the EventLog Analyzer server.
- For Windows 2000, Windows XP, and Windows Server 2003, dynamic RPC ports range from 1025 to 5000.
- To enhance security across a broad spectrum of open ports, it is advisable to include the Server IP address within the firewall's scope. This ensures that only authorized traffic from the designated server is permitted through the firewall. Moreover, predefined rules with process and service filters, such as WMI,RPC,HTTP/HTTPS,Remote Event Log Management can further bolster security by allowing only specific processes or services to communicate through the designated ports. If the Server IP undergoes any changes, it is imperative to promptly update the corresponding firewall rule accordingly.
Syslog Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| UDP/514 (configurable) | EventLog Analyzer Server | Target Device | Syslog |
User Permissions:
|
| UDP/513 (configurable) | EventLog Analyzer Server | Target Device | Syslog | |
| TLS/513 (configurable) | EventLog Analyzer Server | Target Device | Syslog | |
| TCP/514 (configurable) | EventLog Analyzer Server | Target Device | Syslog |
SSH Communication
| PERMISSION | USAGES |
|---|---|
|
Ensure that the algorithm mentioned below is present in the sshd_config file. File Location: /etc/ssh/sshd_config Key exchange (KEX): diffie-hellman-group1-sha1, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group14-sha256 , diffie-hellman-group15-sha512, diffie-hellman-group16-sha512, diffie-hellman-group17-sha512, diffie-hellman-group18-sha512 , ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp52 Ciphers: aes128cbc, aes128ctr, aes192cbc, aes192ctr, aes256cbc, aes256ctr, arcfour128, arcfour256, blowfishcbc, tripledescbc MAC: hmacmd5, hmacmd596, hmacsha1, hmacsha196, hmacsha256, hmacsha512 *This will be Required for all Linux Communications. |
|
Configure Automatic SysLog Forwarding
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | Linux Device | EventLog Analyzer Server | SSH |
User Rights: Service restart rights for 'rsyslog' or 'syslog' service. User Permissions:
|
AS400 Log Collection
| PORTS | INBOUND | OUTBOUND |
|---|---|---|
| TCP/446-449 | AS400 Server | EventLog Analyzer Server |
| TCP/8470-8476 | AS400 Serve | EventLog Analyzer Server |
| TCP/9470-9476 | AS400 Serve | EventLog Analyzer Server |
SNMP Trap Collection
| PORTS | INBOUND | OUTBOUND | SERVICES | Additional Rights and Permissions |
|---|---|---|---|---|
| UDP/162 (configurable) | EventLog Analyzer Server | Network Device / Application | SNMP |
User Permissions:
|
IIS Log Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | IIS Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | IIS Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | IIS Server | EventLog Analyzer Server | SMB RPC/NP |
Cloud sources
Below are the domains that must be whitelisted in the firewall configurations.
Salesforce
| DOMAINS | DESCRIPTION |
|---|---|
| *.logs.sfdc.net*.cloud.sfdc.net | Domains used for collecting event logs and audit logs. |
| *.salesforce.com | Domain covers various salesforce APIs required for accessing salesforce data and services. |
M365
Microsoft Entra ID (global service)
Microsoft Entra ID (global service) users must ensure that the following domains are allowed by their firewall. Refer to the respective tables for Microsoft Entra China and Microsoft Entra ID for US Government users.
| MODULE | ENDPOINT |
|---|---|
| REST API | login.microsoftonline.com |
| graph.microsoft.com | |
| manage.office.com | |
| portal.office.com | |
| *aadcdn.msftauth.net (or)*aadcdn.msauth.net | |
| Exchange Online | outlook.office.com |
| outlook.office365.com/powershell-liveid |
Microsoft Entra China
Microsoft Entra China users must ensure that the following domains are allowed by their firewall:
| MODULE | ENDPOINT |
|---|---|
| REST API | login.partner.microsoftonline.cn |
| microsoftgraph.chinacloudapi.cn | |
| manage.office.cn | |
| portal.azure.cn | |
| *.msauth.cn | |
| *aadcdn.msftauth.cn | |
| *.msftauth.net | |
| Exchange Online | partner.outlook.cn |
| partner.outlook.cn/PowerShell |
Microsoft Entra ID for US Government
Microsoft Entra ID for US Government users must ensure that the following domains are allowed by their firewall:
| MODULE | ENDPOINT |
|---|---|
| REST API | login.microsoftonline.us |
| graph.microsoft.us | |
| manage.office.us | |
| portal.azure.us | |
| Exchange Online | outlook.office365.us |
| outlook.office365.us/powershell-liveid |
AWS
| DOMAIN | DESCRIPTION |
|---|---|
| s3.amazonaws.com logs.amazonaws.com | Domains used for collecting ELB logs. |
| *.cloudtrail.amazonaws.com | Domains used for collecting cloud trail logs. |
| *s3.amazonaws.com | Domains used for collecting s3 logs |
| *.amazonaws.com | Domains used for various aws api. |
3. Agent orchestration
Windows Agent Log Collection and Communication
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTPS/8094, 8095 (configurable) | EventLog Analyzer Server and Log Processor | EventLog Analyzer Agent Machine and Log Processor |
Environment Permission:
|
Communication includes tasks such as agent synchronization and checking agent status.
Windows Agent Installation & Management
Windows Agent Installation Prerequisites
Hardware Requirements: This section gives you information about the hardware requirements for the Log360 agent.
For 32 bit machines
- 1 GHz, 32-bit (x86) Pentium Dual Core processor or equivalent
- 2 GB RAM
For 64 bit machines
- 2.80 GHz, 64-bit (x64) Xeon® LV processor or equivalent
- 2 GB RAM
Operating System Requirements: The Log360 agent can be installed and run on the following operating systems (both 32 Bit and 64 Bit architecture) and versions:
- Windows®
- Windows 7 & above
- Windows Server 2008 & above
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | SMB RPC/NP | |
| Dynamic ranges of RPC ports - TCP/49152 to 65,535 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | RPC randomly allocates high TCP ports for Windows Server 2008 and later versions, as well as for Windows Vista and subsequent versions |
Management involves actions like starting, stopping, or uninstalling the agent software.
Linux Agent Installation
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | SSH |
Sudo User Permissions:
|
Linux Agent Management & Communication
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/22 | EventLog Analyzer Server | EventLog Analyzer Server |
User Permissions:
|
| HTTPS/8094, 8095 (configurable) | EventLog Analyzer Server and Log Processor | EventLog Analyzer Agent Machine and Log Processor |
4. Importing logs
Importing Logs using SMB
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/137 | Target Device | EventLog Analyzer Server | NetBIOS name resolution RPC/named pipes (NP) |
User Permissions:
|
| TCP/138 | Target Device | EventLog Analyzer Server | NetBIOS datagram | |
| TCP/139 | Target Device | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Target Device | EventLog Analyzer Server | SMB RPC/NP |
Importing logs using FTP
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/20 | Target Device | EventLog Analyzer Server | FTP/SFTP |
User Permissions:
|
| TCP/21 | Target Device | EventLog Analyzer Server | FTP/SFTP |
5. Discovery
Windows Domain Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/389 | Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
Windows Workgroup Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Workgroup Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | Workgroup Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Workgroup Server | EventLog Analyzer Server | SMB RPC/NP | |
| TCP/1024-65535 | Workgroup Server | EventLog Analyzer Server | RPC randomly allocated high TCP ports |
Event Source Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Target Windows Device | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/137 | Target Windows Device | EventLog Analyzer Server | NetBIOS name resolution RPC/named pipes (NP) | |
| TCP/138 | Target Windows Device | EventLog Analyzer Server | NetBIOS datagram | |
| TCP/139 | Workgroup Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Workgroup Server | EventLog Analyzer Server | SMB RPC/NP |
MSSQL Server Discovery-Windows
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| UDP/1434 | MSSql Server | EventLog Analyzer Server |
User Permissions:
|
| TCP/1433 | MSSql Server | EventLog Analyzer Server |
Network Device Discovery
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| UDP/162 | Network Devices | EventLog Analyzer Server |
Ports Usage::
|
IIS Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/445 | IIS Server | EventLog Analyzer Server | SMB RPC/NP |
Ports Usage:
|
MYSQL Server Discovery-Windows
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | MySql Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/445 | MySql Server | EventLog Analyzer Server | SMB RPC/NP |
MYSQL Server Discovery-Linux
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | MySql Server | EventLog Analyzer Server | SMB RPC/NP |
User Permissions:
|
6. Incident Workflow Management
NETWORK ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND |
|---|---|---|---|
| PING DEVICE | ICMP/No ports | Audited Windows / Linux Device | EventLog Analyzer Server |
| TRACE ROUTE WINDOWS | ICMP/No ports | Audited Windows Device | EventLog Analyzer Server |
| TRACE ROUTE LINUX | UDP/33434 -33534 | Audited Linux Device | EventLog Analyzer Server |
WINDOWS ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| LogOff | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Shutdown and Restart | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Execute Windows Script | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Disable USB | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| ALL SERVICE BLOCK | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| START PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| STOP PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| TEST PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports |
LINUX ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| Shutdown and Restart | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The user should be the root user. |
| Execute Windows Script | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission for user. |
| ALL SERVICE BLOCK | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission. |
| START PROCESS | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The permission to execute the command should be available for the user whose credentials are provided. |
| STOP PROCESS | Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The permission to execute the command should be available for the user whose credentials are provided. |
| TEST PROCESS | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | - |
NOTIFICATIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| Pop Up WINODWS | TCP/135 | Audited Linux Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions For root\cim v2 In WMI Properties:
Environment Permission:
|
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Pop Up LINUX | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission for user. |
| Send Email WINDOWS & LINUX | TCP/Port mentioned while config using SMTP server | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: SMTP server should be configured on Event log analyzer server |
| Send SMS WINDOWS & LINUX | - | - | - | - | Environment Permission: SMS Server should be configured in the product. |
| Send SNMP Trap WINDOWS & LINUX | UDP/Port specified in workflow block | Audited Windows / Linux Device | EventLog Analyzer Server | - | Environment Permission: The port mentioned in workflow configuration should be open. |
Active Directory ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| DELETE AD USER WINDOWS | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
| DISABLE AD USER WINDOWS | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
| DISABLE USER COMPUTER WINDOWS & LINUX | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP | User Permission:
|
MISCELLANEOUS ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|---|
| WRITE TO FILE WINDOWS | TCP/135 | Audited Windows Device | EventLog Analyzer Server |
UserGroups:
User Rights:
User Permissions: For root\cim v2 In Properties:
Environment Permission:
|
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | ||
| WRITE TO FILE LINUX | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | Environment Permission:
|
| HTTP WebHook | - | - | - | Environment Permission:
|
| FORWARD LOGS | TCP/Specified Port | Audited Windows / Linux Device | EventLog Analyzer Server | - |
| CSV LOOKUP | TCP/Specified Port | Audited Windows / Linux Device | EventLog Analyzer Server | User Permissions:
|
FIREWALL ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|---|
| Cisco ASA deny inbound/Outbound rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#ciscoCredentials |
| Fortigate deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#fortigateCredentials |
| Palo Alto deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#paloAltoCredentials |
| Sophos XG deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#sophosXGCredentials |
| Barracuda deny Access rules | https/8443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#fortigateCredentials |
7. Distributed communication Setup
Distributed
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTP/8095 (configurable) | EventLog Analyzer Managed Server Machine | EventLog Analyzer Admin Server Machine |
User Permissions:
|
| HTTP/8095 (configurable) | EventLog Analyzer Admin Server Machine | EventLog Analyzer Managed Server Machine |
User Permissions:
|
Centralized Archiving Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| SSH/8080 (configurable) | EventLog Analyzer Admin Server Machine | EventLog Analyzer Managed Server Machine |
User Permissions:
|
Using EventLog Analyzer with Antivirus Applications
To ensure unhindered functioning of EventLog Analyzer, you need to add the following files to the exception list of your Antivirus application:
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| <ELA_HOME>/ES/data | Elasticsearch indexed data is stored in this directory. To ensure proper functioning, this location should be excluded from antivirus scans, as recommended by third-party guidelines. | All the collected logs will not be available if the data is deleted. |
| <ELA_HOME>/ES/repo | Elasticsearch indexed data is stored in this repository. To ensure proper functioning, this location should be excluded from antivirus scans, as recommended by third-party guidelines. | Snapshots and Elasticsearch archival feature will fail if the files at this location are deleted. |
| <ELA_HOME>/ES/archive | Elasticsearch archives are stored here. | Archived log data will not be available if the files located here are deleted. |
| <ELA_HOME>/data/za/threatfeeds | Bundled files containing a list of malicious IPs, domains and URLs that will be used in case there is no internet connectivity will be stored here. These files will be deleted on the first default threat feed synchronization. Whitelisting is required only till first synchronization. | If the files are removed and if there is no internet connectivity, then the list of malicious threat sources will be missed from the dataset. |
| <ELA_HOME>/data/AlertDump | Formatted logs are stored before processing for alerts. Might be detected as false positive by Antivirus applications. | If the file is quarantined or deleted, related alerts would be missed. |
| <ELA_HOME>/data/NotificationDump | Formatted logs are stored before processing for notification. Might be detected as false positive by Antivirus applications. | If the file is quarantined or deleted, notification for triggered alerts would be missed. |
| <ELA_HOME>/data/imworkflow | Binaries uploaded by users for workflow execution are stored here. | Script Alert workflow might not work as intended. |
| <ELA_HOME>/pgsql/bin | PostgreSQL binaries and data directories are included here. Some antivirus solutions may flag these files as false positives. If these components are blocked, quarantined, or deleted, it may lead to data corruption and database startup failures. | Product might not start. |
| <ELA_HOME>/archive (If the archive folder is moved to a new location, add the new location) | If archiving is enabled, this folder is created and archive files are stored here. The location can be customized by the customer. If antivirus scanning is enabled for this directory, it may access the files during critical operations or introduce inconsistencies, potentially resulting in file tampering. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| <ELA_HOME>/ES/CachedRecord | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
For Windows agent machine - 64 bit,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin | All binaries should be excluded from antivirus scans to prevent any slowdown in processing performance. | The Agent might not work if the files are quarantined. |
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin\data | This directory stores the EventLog Analyzer Agent’s configuration files and compressed log data required for normal operation. Whitelisting this path prevents antivirus interference that could disrupt agent functionality or log processing. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| C:\TEMP\\EventLogAgent | Temporary binary files used during the EventLog Analyzer agent upgrade are stored here. Whitelisting this path ensures that antivirus scans do not interfere with or disrupt the upgrade process. | Agent might not upgrade/not install if the files are quarantined. |
For Windows agent machine - 32 bit,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| C:\Program Files\EventLogAnalyzer_Agent\bin | All binaries should be excluded from antivirus scanning to prevent any slowdown in processing performance. | The Agent might not work if the files are quarantined. |
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin\data | This directory stores the EventLog Analyzer Agent’s configuration files and compressed log data required for normal operation. Whitelisting this path prevents antivirus interference that could disrupt agent functionality or log processing. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| C:\TEMP\\EventLogAgent | Temporary binary files used during the EventLog Analyzer agent upgrade are stored here. Whitelisting this path ensures that antivirus scans do not interfere with or disrupt the upgrade process. | Agent might not upgrade/not install if the files are quarantined. |
For Linux agent,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| /opt/ManageEngine/EventLogAnalyzer_Agent/bin | All binaries should be excluded from antivirus scans to prevent any slowdown in processing performance. | The Agent might not work if the files are quarantined. |
| /opt/ManageEngine/EventLogAnalyzer_Agent/bin/data | This directory stores the EventLog Analyzer Agent’s configuration files and compressed log data required for normal operation. Whitelisting this path prevents antivirus interference that could disrupt agent functionality or log processing. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
8. Advanced threat analytics
| PORT | Additional Rights and Permissions |
|---|---|
| HTTPS/443 |
To fetch the "Log360 Cloud Threat Analytics" feeds, the below URLs will be used |
Prerequisites for Log360
Prerequisites applicable for Log360
Before starting Log360 in your environment, ensure that the following are taken care of.
Ports required for Log360
Below are the default ports that must be configured for Log360.
| Port Number | Port Usage |
|---|---|
| 8095 | HTTP |
| 8458 | HTTPS |
The following port has to be open in Log360 for Elasticsearch.
| Port Number | Port Usage |
|---|---|
| 9322 (TCP) | Communication with Elasticsearch server |
Ports required for ADAudit Plus
The following ports need to be opened for event collection:
| Port Number(s) | Port Usage |
|---|---|
| 389 | Communication with LDAP protocol |
| 135 | Communication with RPC |
| 445,135 | Communication with NetBIOS Session Service |
The following ports are needed to access ADAudit Plus:
| Port Number | Port Usage |
|---|---|
| 8081 | HTTP |
| 8444 | HTTPS |
Ports required for M365 Manager Plus
The following ports need to be opened for event collection:
| Port Number | Port Usage |
|---|---|
| 80 (TCP) (HTTP) | Communication with Exchange and Microsoft Online |
| 443 (TCP) (HTTPS) | Communication with Exchange and Microsoft Online (SSL) |
The following ports are needed to access M365 Manager Plus:
| Port Number | Port Usage |
|---|---|
| 8365 (TCP) (HTTP) | Default product port |
| 9365 (TCP) (HTTPS) | Default product port (SSL) |
Ports required for Exchange Reporter Plus
The following ports need to be opened for the product to communicate with Exchange Servers:
| Port Number | Port Usage |
|---|---|
| 135 (TCP) | RPC |
| 5985 (TCP) | Windows PowerShell Default psSession |
| 5986 (TCP) (HTTPS) | Windows PowerShell Default psSession SSL |
| 80 (TCP) | PowerShell |
| 443 (TCP) (HTTPS) | PowerShell SSL |
The following ports need to be opened for the product to communicate with Active Directory:
| Port Number | Port Usage |
|---|---|
| 389 (TCP) | LDAP |
| 636 (TCP) (HTTPS) | LDAP SSL |
| 3268 (TCP) | LDAP GC |
| 3269 (TCP) (HTTPS) | LDAP GC SSL |
| 53 (TCP) | DNS |
| 88 (TCP) | Kerberos |
| 139 (TCP) | NetBIOS |
The following ports are needed for Exchange Reporter Plus:
| Port Number | Port Usage |
|---|---|
| 8181 | HTTPS |
| 3309 | ERP product database |
Ports required for ADManager Plus
The following ports are required for ADManager Plus:
| Port Number | Port Usage |
|---|---|
| 33306 | Communication with database |
| 31000 | Java wrapper service |
| 22 | Secure Shell (SSH) |
| 8080/8443 | Web server |
| 2000 | |
| 389/639 | LDAP/LDAPS |
| 80 | Exchange server |
| 80,443 | G Suite, Microsoft365 |
| 3268 | LDAP search for Global Catalog (GC) |
Ports required for Cloud Security Plus
The following ports are needed to access Cloud Security Plus:
| Port Number | Port Usage |
|---|---|
| 8055 | HTTP |
| 8056 | HTTPS |
| 514 | Default Syslog listener |
| 25 | Default mail server SMTP |
| 33355 | PostgreSQL/MS SQL database |
| 80, 443 | Clouds and their data source |
| 9300-9400 (any one TCP port) 9200-9300 (any one HTTP port) |
Elastic Search |
Using Log360 with Antivirus Applications
To ensure unhindered functioning of Log360, you need to add the following files to the exception list of your Antivirus application:
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| <ME>/elasticsearch/ES/data | Elasticsearch indexed data is stored | Reports would be affected if the data is deleted. |
| <ME>/elasticsearch/ES/repo | Elasticsearch index snapshot is taken at this location. | Snapshots and Elasticsearch archival feature will fail if the files at this location are deleted. |
| <ME>/elasticsearch/ES/archive | Elasticsearch archives are stored here. | Data will not be available if the files located here are deleted. |
| <Log360_Home>/bin | All binaries are included here. Some Antivirus applications might block them as false positive. | Product might not function. |
| <Log360_Home>/pgsql/bin | Postgres binaries are included here. Might be detected as false positive by Antivirus applications. | Product might not start. |
| <Log360_Home>/lib/native | All binaries are included here. Some Antivirus applications might block them as false positive. | Product might not function. |
| <Log360_Home>/tools | All tools binaries are included here. Some Antivirus applications might block them as false positive. | Some tools might not work if the files are removed by Antivirus applications. |
Ports required for Log360 UEBA
Web Server Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTP/8096 (configurable) | UEBA Server |
|
Ports Usage:
|
Elasticsearch
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/9230 (configurable) | UEBA Search Engine Management Node [ UEBA Node ] |
|
Ports Usage:
|
Database
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/33337 | Ports Usage:
|
Redis Cache
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/8179 | Ports Usage:
|
SSL Configured Server
| PORT | Additional Rights and Permissions |
|---|---|
| SSL/8446 | Ports Usage:
|
ActiveMQ
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/61616 | Ports Usage:
|
Ports used by PAM360
The below table lists the set of all ports used by PAM360 for remote access:
| Port Name | Port Number | Direction |
|---|---|---|
| PostgreSQL port | 3456 | Outbound |
| Web client port | 8282 | Inbound |
| SSH port | 22 | Outbound |
| Telnet port | 23 | Outbound |
| LDAP without SSL port | 389 | Outbound |
| LDAP with SSL port | 636 | Outbound |
| SMTP port | 25 | Outbound |
| MS SQL port | 1433 | Outbound |
| Oracle port | 1521 | Outbound |
| Sybase ASE port | 5000 | Outbound |
| Password Verification port | 135, 139, 445 | Outbound |
| Auto Logon Spark View Gateway port | 8283 | Inbound |
| RDP | 3389 | Outbound |
| SSH API | 6622 | Inbound |
| REST API | 8282 | Inbound |
| Private CA-OCSP Responder Server port | 8080 | Inbound |
Read also
This page elaborated on the setup prerequisites. You can also refer to the guides below for more about system requirements, installation and uninstallation, starting and shutting down, and connecting to the server: