How to Install and Uninstall EventLog Analyzer
Last updated on:
How to install?
If you want to install EventLog Analyzer 64 bit version:
- In Windows OS, execute ManageEngine_EventLogAnalyzer_64bit.exe
- In Linux OS, execute ManageEngine_EventLogAnalyzer_64bit.bin
For Linux installation
- Before installing EventLog Analyzer, make the installation file executable by executing the following commands in Unix Terminal or Shell,
- Now, run ManageEngine_EventLogAnalyzer.bin by double clicking or running ./ManageEngine_EventLogAnalyzer.bin in the Terminal or Shell.
chmod +x ManageEngine_EventLogAnalyzer.bin
Upon starting the installation you will be taken through the following steps:
- Agree to the terms and conditions of the license agreement. You may print it for offline reference.
- Select the folder to install the product. Use the Browse option. The default installation location is C:\ManageEngine\EventLog Analyzer. If the new folder or the default folder does not exist, it will be created and the product will be installed.
- Enter the web server port. The default port number is 8095. Ensure that the default port or the port you have selected is not occupied by some other application.
- Enter the folder name in which the product will be shown in the Program Folder. The default name is ManageEngine EventLog Analyzer.
- Enter your personal details to get assistance.
At the end of the procedure, the wizard displays the ReadMe file and starts the EventLog Analyzer server.
With this the EventLog Analyzer product installation is complete.
How to uninstall?
The procedure to uninstall for both 64 Bit and 32 Bit versions is the same.
Windows:
- Navigate to the Program folder in which EventLog Analyzer has been installed. By default, this is Start > Programs > ManageEngine EventLogAnalyzer <version number>.
- Select the option Uninstall EventLogAnalyzer.
- You will be asked to confirm your choice, after which EventLog Analyzer is uninstalled.
Linux:
- Navigate to "<EventLogAnalyzer Home>/_ManageEngine EventLogAnalyzer_installation" directory.
- Execute the following command in Terminal Shell.
- You will be asked to confirm your choice, after which EventLog Analyzer is uninstalled.
./Change\ ManageEngine\ EventlogAnalyzer\ Installation
Before starting EventLog Analyzer in your environment, ensure that the following are taken care of.
What are the ports required for EventLog Analyzer?
1. Primary Ports
Web Server Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTP/8095 (configurable) | EventLog Analyzer Server |
|
Ports Usage:
|
Elasticsearch
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/9300-9400 (configurable) | EventLog Analyzer Search Engine Management Node [ SEM Node ] | EventLog Analyzer Server |
Ports Usage:
|
Internal Communication
| PORT | INBOUND And OUTBOUND | Additional Rights and Permissions |
|---|---|---|
| UDP/5000 (configurable) | EventLog Analyzer Server |
Ports Usage:
|
Database
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/33335 |
Ports Usage:
|
2. Log Collection
Windows Log Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cimv2 in WMI Properties:
Firewall Permissions:
|
| TCP/139 | Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Windows Device | EventLog Analyzer Server | SMB RPC/NP | |
| Dynamic ranges of RPC ports - TCP/49152 to 65,535 | Windows Device | EventLog Analyzer Server | RPC randomly allocates high TCP ports for Windows Server 2008 and later versions, as well as for Windows Vista and subsequent versions |
- It is not necessary to open outbound ports on the EventLog Analyzer agent machine and inbound ports on the EventLog Analyzer server.
- For Windows 2000, Windows XP, and Windows Server 2003, dynamic RPC ports range from 1025 to 5000.
- To enhance security across a broad spectrum of open ports, it is advisable to include the Server IP address within the firewall's scope. This ensures that only authorized traffic from the designated server is permitted through the firewall. Moreover, predefined rules with process and service filters, such as WMI,RPC,HTTP/HTTPS,Remote Event Log Management can further bolster security by allowing only specific processes or services to communicate through the designated ports. If the Server IP undergoes any changes, it is imperative to promptly update the corresponding firewall rule accordingly.
Syslog Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| UDP/514 (configurable) | EventLog Analyzer Server | Target Device | Syslog |
User Permissions:
|
| UDP/513 (configurable) | EventLog Analyzer Server | Target Device | Syslog | |
| TLS/513 (configurable) | EventLog Analyzer Server | Target Device | Syslog | |
| TCP/514 (configurable) | EventLog Analyzer Server | Target Device | Syslog |
SSH Communication
| PERMISSION | USAGES |
|---|---|
|
Ensure that the algorithm mentioned below is present in the sshd_config file. File Location: /etc/ssh/sshd_config Key exchange (KEX): diffie-hellman-group1-sha1, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group14-sha256 , diffie-hellman-group15-sha512, diffie-hellman-group16-sha512, diffie-hellman-group17-sha512, diffie-hellman-group18-sha512 , ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp52 Ciphers: aes128cbc, aes128ctr, aes192cbc, aes192ctr, aes256cbc, aes256ctr, arcfour128, arcfour256, blowfishcbc, tripledescbc MAC: hmacmd5, hmacmd596, hmacsha1, hmacsha196, hmacsha256, hmacsha512 *This will be Required for all Linux Communications. |
|
Configure Automatic SysLog Forwarding
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | Linux Device | EventLog Analyzer Server | SSH |
User Rights: Service restart rights for 'rsyslog' or 'syslog' service. User Permissions:
|
AS400 Log Collection
| PORTS | INBOUND | OUTBOUND |
|---|---|---|
| TCP/446-449 | AS400 Server | EventLog Analyzer Server |
| TCP/8470-8476 | AS400 Serve | EventLog Analyzer Server |
| TCP/9470-9476 | AS400 Serve | EventLog Analyzer Server |
SNMP Trap Collection
| PORTS | INBOUND | OUTBOUND | SERVICES | Additional Rights and Permissions |
|---|---|---|---|---|
| UDP/162 (configurable) | EventLog Analyzer Server | Network Device / Application | SNMP |
User Permissions:
|
IIS Log Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | IIS Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | IIS Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | IIS Server | EventLog Analyzer Server | SMB RPC/NP |
3. Agent orchestration
Windows Agent Log Collection and Communication
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTP/8095 (configurable) | EventLog Analyzer Server | EventLog Analyzer Agent Machine |
Environment Permission:
|
Communication includes tasks such as agent synchronization and checking agent status.
Windows Agent Installation & Management
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | SMB RPC/NP | |
| Dynamic ranges of RPC ports - TCP/49152 to 65,535 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | RPC randomly allocates high TCP ports for Windows Server 2008 and later versions, as well as for Windows Vista and subsequent versions |
Management involves actions like starting, stopping, or uninstalling the agent software.
Linux Agent Installation
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | SSH |
Sudo User Permissions:
|
Linux Agent Management & Communication
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/22 | EventLog Analyzer Server | EventLog Analyzer Server |
User Permissions:
|
| HTTP/8095 (configurable) | EventLog Analyzer Server | EventLog Analyzer Agent Machine |
4. Importing logs
Importing Logs using SMB
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/137 | Target Device | EventLog Analyzer Server | NetBIOS name resolution RPC/named pipes (NP) |
User Permissions:
|
| TCP/138 | Target Device | EventLog Analyzer Server | NetBIOS datagram | |
| TCP/139 | Target Device | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Target Device | EventLog Analyzer Server | SMB RPC/NP |
Importing logs using FTP
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/20 | Target Device | EventLog Analyzer Server | FTP/SFTP |
User Permissions:
|
| TCP/21 | Target Device | EventLog Analyzer Server | FTP/SFTP |
5. Discovery
Windows Domain Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/389 | Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
Windows Workgroup Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Workgroup Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | Workgroup Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Workgroup Server | EventLog Analyzer Server | SMB RPC/NP | |
| TCP/1024-65535 | Workgroup Server | EventLog Analyzer Server | RPC randomly allocated high TCP ports |
Event Source Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Target Windows Device | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/137 | Target Windows Device | EventLog Analyzer Server | NetBIOS name resolution RPC/named pipes (NP) | |
| TCP/138 | Target Windows Device | EventLog Analyzer Server | NetBIOS datagram | |
| TCP/139 | Workgroup Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Workgroup Server | EventLog Analyzer Server | SMB RPC/NP |
MSSQL Server Discovery-Windows
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| UDP/1434 | MSSql Server | EventLog Analyzer Server |
User Permissions:
|
| TCP/1433 | MSSql Server | EventLog Analyzer Server |
Network Device Discovery
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| UDP/162 | Network Devices | EventLog Analyzer Server |
Ports Usage::
|
IIS Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/445 | IIS Server | EventLog Analyzer Server | SMB RPC/NP |
Ports Usage:
|
MYSQL Server Discovery-Windows
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | MySql Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/445 | MySql Server | EventLog Analyzer Server | SMB RPC/NP |
MYSQL Server Discovery-Linux
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | MySql Server | EventLog Analyzer Server | SMB RPC/NP |
User Permissions:
|
6. Incident Workflow Management
NETWORK ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND |
|---|---|---|---|
| PING DEVICE | ICMP/No ports | Audited Windows / Linux Device | EventLog Analyzer Server |
| TRACE ROUTE WINDOWS | ICMP/No ports | Audited Windows Device | EventLog Analyzer Server |
| TRACE ROUTE LINUX | UDP/33434 -33534 | Audited Linux Device | EventLog Analyzer Server |
WINDOWS ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| LogOff | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Shutdown and Restart | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Execute Windows Script | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Disable USB | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| ALL SERVICE BLOCK | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| START PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| STOP PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| TEST PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports |
LINUX ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| Shutdown and Restart | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The user should be the root user. |
| Execute Windows Script | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission for user. |
| ALL SERVICE BLOCK | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission. |
| START PROCESS | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The permission to execute the command should be available for the user whose credentials are provided. |
| STOP PROCESS | Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The permission to execute the command should be available for the user whose credentials are provided. |
| TEST PROCESS | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | - |
NOTIFICATIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| Pop Up WINODWS | TCP/135 | Audited Linux Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions For root\cim v2 In WMI Properties:
Environment Permission:
|
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Pop Up LINUX | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission for user. |
| Send Email WINDOWS & LINUX | TCP/Port mentioned while config using SMTP server | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: SMTP server should be configured on Event log analyzer server |
| Send SMS WINDOWS & LINUX | - | - | - | - | Environment Permission: SMS Server should be configured in the product. |
| Send SNMP Trap WINDOWS & LINUX | UDP/Port specified in workflow block | Audited Windows / Linux Device | EventLog Analyzer Server | - | Environment Permission: The port mentioned in workflow configuration should be open. |
AD ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| DELETE AD USER WINDOWS | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
| DISABLE AD USER WINDOWS | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
| DISABLE USER COMPUTER WINDOWS & LINUX | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP | User Permission:
|
MISCELLANEOUS ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|---|
| WRITE TO FILE WINDOWS | TCP/135 | Audited Windows Device | EventLog Analyzer Server |
UserGroups:
User Rights:
User Permissions: For root\cim v2 In Properties:
Environment Permission:
|
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | ||
| WRITE TO FILE LINUX | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | Environment Permission:
|
| HTTP WebHook | - | - | - | Environment Permission:
|
| FORWARD LOGS | TCP/Specified Port | Audited Windows / Linux Device | EventLog Analyzer Server | - |
| CSV LOOKUP | TCP/Specified Port | Audited Windows / Linux Device | EventLog Analyzer Server | User Permissions:
|
FIREWALL ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|---|
| Cisco ASA deny inbound/Outbound rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#ciscoCredentials |
| Fortigate deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#fortigateCredentials |
| Palo Alto deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#paloAltoCredentials |
| Sophos XG deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#sophosXGCredentials |
| Barracuda deny Access rules | https/8443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#fortigateCredentials |
7. Distributed communication Setup
Distributed
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTP/8095 (configurable) | EventLog Analyzer Managed Server Machine | EventLog Analyzer Admin Server Machine |
User Permissions:
|
| HTTP/8095 (configurable) | EventLog Analyzer Admin Server Machine | EventLog Analyzer Managed Server Machine |
User Permissions:
|
Centralized Archiving Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| SSH/8080 (configurable) | EventLog Analyzer Admin Server Machine | EventLog Analyzer Managed Server Machine |
User Permissions:
|
Using EventLog Analyzer with Antivirus Applications
To ensure unhindered functioning of EventLog Analyzer, you need to add the following files to the exception list of your Antivirus application:
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| <ELA_HOME>/ES/data | Elasticsearch indexed data is stored. | All the collected logs will not be available if the data is deleted. |
| <ELA_HOME>/ES/repo | Elasticsearch index snapshot is taken at this location. | Snapshots and Elasticsearch archival feature will fail if the files at this location are deleted. |
| <ELA_HOME>/ES/archive | Elasticsearch archives are stored here. | Archived log data will not be available if the files located here are deleted. |
| <ME>/elasticsearch/ES/data | Elasticsearch indexed data is stored. | Reports would be affected if the data is deleted. |
| <ME>/elasticsearch/ES/repo | Elasticsearch index snapshot is taken at this location. | Snapshots and Elasticsearch archival feature will fail if the files at this location are deleted. |
| <ME>/elasticsearch/ES/archive | Elasticsearch archives are stored here. | Data will not be available if the files located here are deleted. |
| <ELA_HOME>/data/za/threatfeeds | Bundled files containing a list of malicious IPs, domains and URLs that will be used in case there is no internet connectivity will be stored here. These files will be deleted on the first default threat feed synchronization. Whitelisting is required only till first synchronization. | If the files are removed and if there is no internet connectivity, then the list of malicious threat sources will be missed from the dataset. |
| <ELA_HOME>/data/AlertDump | Formatted logs are stored before processing for alerts. Might be detected as false positive by Antivirus applications. | If the file is quarantined or deleted, related alerts would be missed. |
| <ELA_HOME>/data/NotificationDump | Formatted logs are stored before processing for notification. Might be detected as false positive by Antivirus applications. | If the file is quarantined or deleted, notification for triggered alerts would be missed. |
| <ELA_HOME>/bin | All binaries are included here. Some Antivirus applications might block them as false positive. | Product might not function. |
| <ELA_HOME>/data/imworkflow | Binaries uploaded by users for workflow execution are stored here. | Script Alert workflow might not work as intended. |
| <ELA_HOME>/pgsql/bin | Postgres binaries are included here. Might be detected as false positive by Antivirus applications. | Product might not start. |
| <ELA_HOME>/lib/native | All binaries are included here. Some Antivirus applications might block them as false positive. | Product might not function. |
| <ELA_HOME>/archive (If the archive folder is moved to a new location, add the new location) | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| <ELA_HOME>/troubleshooting | All troubleshooting binaries are included here. Some Antivirus applications might block them as false positive. | Some troubleshooting batch files might not work. |
| <ELA_HOME>/tools | All tools binaries are included here. Some Antivirus applications might block them as false positive. | Some tools might not work if the files are removed by Antivirus applications. |
| <ELA_HOME>/ES/CachedRecord | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
For Windows agent machine - 64 bit,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin | Agent binaries are stored here. | The Agent might not work if the files are quarantined. |
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin\data | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| C:\TEMP\\EventLogAgent | Agent installation files are moved for installation and upgrade. | Agent might not upgrade/not install if the files are quarantined. |
For Windows agent machine - 32 bit,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| C:\Program Files\EventLogAnalyzer_Agent\bin | Agent binaries are stored here. | The Agent might not work if the files are quarantined. |
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin\data | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| C:\TEMP\\EventLogAgent | Agent installation files are moved for installation and upgrade. | Agent might not upgrade/not install if the files are quarantined. |
For Linux agent,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| /opt/ManageEngine/EventLogAnalyzer_Agent/bin | Agent binaries are stored here. | The Agent might not work if the files are quarantined. |
| /opt/ManageEngine/EventLogAnalyzer_Agent/bin/data | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
8. Advanced threat analytics
| PORT | Additional Rights and Permissions |
|---|---|
| HTTPS/443 |
To fetch the "Log360 Cloud Threat Analytics" feeds, the below URLs will be used |