Prerequisites
Last updated on:
In this page
Overview
This page outlines the prerequisites and setup requirements including ports, log processors, log collection, agent orchestration, discovery, workflow actions, distributed communication, antivirus exceptions, and threat analytics.
Before starting EventLog Analyzer in your environment, ensure that the following are taken care of.
Prerequisites for Log360
Prerequisites applicable for Log360
Before starting Log360 in your environment, ensure that the following are taken care of.
Ports required for Log360
The following port has to be open in Log360 for Elasticsearch.
| Port Number | Port Usage |
|---|---|
| 9322 (TCP) | Communication with Elasticsearch server |
Ports required for ADAudit Plus
The following ports need to be opened for event collection:
| Port Number(s) | Port Usage |
|---|---|
| 389 | Communication with LDAP protocol |
| 135 | Communication with RPC |
| 445,135 | Communication with NetBIOS Session Service |
The following ports are needed to access ADAudit Plus:
| Port Number | Port Usage |
|---|---|
| 8081 | HTTP |
| 8444 | HTTPS |
Ports required for EventLog Analyzer
EventLog Analyzer requires the below mentioned ports to be opened on the server:
| Port Number(s) | Port Usage |
|---|---|
| 8095 (TCP) | Web server port |
| 513, 514 (UDP) | Syslog listener port |
| 514 (TCP) | Syslog listener port |
| 33335 (TCP) | PostgreSQL/MS SQL database port |
Agentless log collection:
The below mentioned ports need to be opened on the server and the remote host machine for agentless log collection to be enabled.
EventLog Analyzer uses the following ports for WMI, RPC, and DCOM.
| Port Number(s) | Port Usage |
|---|---|
| 135, 445, 139 (TCP) | WMI, DCOM, RPC |
| 49152-65534 (TCP) | WMI, DCOM, RPC |
Agent-based Log collection:
EventLog Analyzer uses the following ports for local agent to server UDP communication.
| Port Number(s) | Port Usage |
|---|---|
| 5000, 5001, 5002 (UDP) | UDP ports for EventLog Analyzer local agent-server communication |
EventLog Analyzer uses the following ports for remote agent to server TCP communication:
| Port Number | Port Usage |
|---|---|
| 8095 (TCP) | TCP port for EventLog Analyzer remote agent-server communication |
For IBM AS/400
The below mentioned ports need to be opened on the server and the remote host machine.
| Port Number(s) | Port Usage |
|---|---|
| 446-449, 8470-8476, 9470-9476 (TCP) | Keep the mentioned ports opened for access to IBM AS/400 machines |
Ports required for M365 Manager Plus
The following ports need to be opened for event collection:
| Port Number | Port Usage |
|---|---|
| 80 (TCP) (HTTP) | Communication with Exchange and Microsoft Online |
| 443 (TCP) (HTTPS) | Communication with Exchange and Microsoft Online (SSL) |
The following ports are needed to access M365 Manager Plus:
| Port Number | Port Usage |
|---|---|
| 8365 (TCP) (HTTP) | Default product port |
| 9365 (TCP) (HTTPS) | Default product port (SSL) |
Ports required for Exchange Reporter Plus
The following ports need to be opened for the product to communicate with Exchange Servers:
| Port Number | Port Usage |
|---|---|
| 135 (TCP) | RPC |
| 5985 (TCP) | Windows PowerShell Default psSession |
| 5986 (TCP) (HTTPS) | Windows PowerShell Default psSession SSL |
| 80 (TCP) | PowerShell |
| 443 (TCP) (HTTPS) | PowerShell SSL |
The following ports need to be opened for the product to communicate with Active Directory:
| Port Number | Port Usage |
|---|---|
| 389 (TCP) | LDAP |
| 636 (TCP) (HTTPS) | LDAP SSL |
| 3268 (TCP) | LDAP GC |
| 3269 (TCP) (HTTPS) | LDAP GC SSL |
| 53 (TCP) | DNS |
| 88 (TCP) | Kerberos |
| 139 (TCP) | NetBIOS |
The following ports are needed for Exchange Reporter Plus:
| Port Number | Port Usage |
|---|---|
| 8181 | HTTPS |
| 3309 | ERP product database |
Ports required for ADManager Plus
The following ports are required for ADManager Plus:
| Port Number | Port Usage |
|---|---|
| 33306 | Communication with database |
| 31000 | Java wrapper service |
| 22 | Secure Shell (SSH) |
| 8080/8443 | Web server |
| 2000 | |
| 389/639 | LDAP/LDAPS |
| 80 | Exchange server |
| 80,443 | G Suite, Microsoft365 |
| 3268 | LDAP search for Global Catalog (GC) |
Ports required for Cloud Security Plus
The following ports are needed to access Cloud Security Plus:
| Port Number | Port Usage |
|---|---|
| 8055 | HTTP |
| 8056 | HTTPS |
| 514 | Default Syslog listener |
| 25 | Default mail server SMTP |
| 33355 | PostgreSQL/MS SQL database |
| 80, 443 | Clouds and their data source |
| 9300-9400 (any one TCP port) 9200-9300 (any one HTTP port) |
Elastic Search |
Using Log360 with Antivirus Applications
To ensure unhindered functioning of Log360, you need to add the following files to the exception list of your Antivirus application:
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| <ME>/elasticsearch/ES/data | Elasticsearch indexed data is stored | Reports would be affected if the data is deleted. |
| <ME>/elasticsearch/ES/repo | Elasticsearch index snapshot is taken at this location. | Snapshots and Elasticsearch archival feature will fail if the files at this location are deleted. |
| <ME>/elasticsearch/ES/archive | Elasticsearch archives are stored here. | Data will not be available if the files located here are deleted. |
| <Log360_Home>/bin | All binaries are included here. Some Antivirus applications might block them as false positive. | Product might not function. |
| <Log360_Home>/pgsql/bin | Postgres binaries are included here. Might be detected as false positive by Antivirus applications. | Product might not start. |
| <Log360_Home>/lib/native | All binaries are included here. Some Antivirus applications might block them as false positive. | Product might not function. |
| <Log360_Home>/tools | All tools binaries are included here. Some Antivirus applications might block them as false positive. | Some tools might not work if the files are removed by Antivirus applications. |
Ports required for Log360 UEBA
Web Server Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTP/8096 (configurable) | UEBA Server |
|
Ports Usage:
|
Elasticsearch
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/9230 (configurable) | UEBA Search Engine Management Node [ UEBA Node ] |
|
Ports Usage:
|
Database
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/33337 | Ports Usage:
|
Redis Cache
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/8179 | Ports Usage:
|
SSL Configured Server
| PORT | Additional Rights and Permissions |
|---|---|
| SSL/8446 | Ports Usage:
|
ActiveMQ
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/61616 | Ports Usage:
|
Ports used by PAM360
The below table lists the set of all ports used by PAM360 for remote access:
| Port Name | Port Number | Direction |
|---|---|---|
| PostgreSQL port | 3456 | Outbound |
| Web client port | 8282 | Inbound |
| SSH port | 22 | Outbound |
| Telnet port | 23 | Outbound |
| LDAP without SSL port | 389 | Outbound |
| LDAP with SSL port | 636 | Outbound |
| SMTP port | 25 | Outbound |
| MS SQL port | 1433 | Outbound |
| Oracle port | 1521 | Outbound |
| Sybase ASE port | 5000 | Outbound |
| Password Verification port | 135, 139, 445 | Outbound |
| Auto Logon Spark View Gateway port | 8283 | Inbound |
| RDP | 3389 | Outbound |
| SSH API | 6622 | Inbound |
| REST API | 8282 | Inbound |
| Private CA-OCSP Responder Server port | 8080 | Inbound |
What are the ports required for EventLog Analyzer?
1. Primary Ports
Web Server Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTPS/8095 (configurable) | EventLog Analyzer Server |
|
Ports Usage:
|
Log Processors
When Log360 is configured with multiple Log Processors in a scalable setup, the following ports are required in addition to the primary ports:
| PORT | INBOUND | OUTBOUND | USAGE |
|---|---|---|---|
| TCP/9092, 9093 | EventLog Analyzer Server and Log Processor | EventLog Analyzer Server and Log Processor | Log Queue Engine communication |
| TCP/7800 | EventLog Analyzer Server and Log Processor | EventLog Analyzer Server and Log Processor | Cluster communication between Log Processor and the main server |
Elasticsearch
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/9300-9400 (configurable) | EventLog Analyzer Search Engine Management Node [ SEM Node ] | EventLog Analyzer Server |
Ports Usage:
|
Redis Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/8179-8189 | EventLog Analyzer Server and Log Processor | EventLog Analyzer Server and Log Processor | Ports Usage:
|
Internal Communication
| PORT | INBOUND And OUTBOUND | Additional Rights and Permissions |
|---|---|---|
| UDP/5000 (configurable) | EventLog Analyzer Server |
Ports Usage:
|
Database
| PORT | Additional Rights and Permissions |
|---|---|
| TCP/33335 |
Ports Usage:
|
2. Log Collection
Windows Log Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cimv2 in WMI Properties:
Firewall Permissions:
|
| TCP/139 | Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Windows Device | EventLog Analyzer Server | SMB RPC/NP | |
| Dynamic ranges of RPC ports - TCP/49152 to 65,535 | Windows Device | EventLog Analyzer Server | RPC randomly allocates high TCP ports for Windows Server 2008 and later versions, as well as for Windows Vista and subsequent versions |
- It is not necessary to open outbound ports on the EventLog Analyzer agent machine and inbound ports on the EventLog Analyzer server.
- For Windows 2000, Windows XP, and Windows Server 2003, dynamic RPC ports range from 1025 to 5000.
- To enhance security across a broad spectrum of open ports, it is advisable to include the Server IP address within the firewall's scope. This ensures that only authorized traffic from the designated server is permitted through the firewall. Moreover, predefined rules with process and service filters, such as WMI,RPC,HTTP/HTTPS,Remote Event Log Management can further bolster security by allowing only specific processes or services to communicate through the designated ports. If the Server IP undergoes any changes, it is imperative to promptly update the corresponding firewall rule accordingly.
Syslog Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| UDP/514 (configurable) | EventLog Analyzer Server | Target Device | Syslog |
User Permissions:
|
| UDP/513 (configurable) | EventLog Analyzer Server | Target Device | Syslog | |
| TLS/513 (configurable) | EventLog Analyzer Server | Target Device | Syslog | |
| TCP/514 (configurable) | EventLog Analyzer Server | Target Device | Syslog |
SSH Communication
| PERMISSION | USAGES |
|---|---|
|
Ensure that the algorithm mentioned below is present in the sshd_config file. File Location: /etc/ssh/sshd_config Key exchange (KEX): diffie-hellman-group1-sha1, diffie-hellman-group-exchange-sha256, diffie-hellman-group14-sha1, diffie-hellman-group14-sha256 , diffie-hellman-group15-sha512, diffie-hellman-group16-sha512, diffie-hellman-group17-sha512, diffie-hellman-group18-sha512 , ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp52 Ciphers: aes128cbc, aes128ctr, aes192cbc, aes192ctr, aes256cbc, aes256ctr, arcfour128, arcfour256, blowfishcbc, tripledescbc MAC: hmacmd5, hmacmd596, hmacsha1, hmacsha196, hmacsha256, hmacsha512 *This will be Required for all Linux Communications. |
|
Configure Automatic SysLog Forwarding
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | Linux Device | EventLog Analyzer Server | SSH |
User Rights: Service restart rights for 'rsyslog' or 'syslog' service. User Permissions:
|
AS400 Log Collection
| PORTS | INBOUND | OUTBOUND |
|---|---|---|
| TCP/446-449 | AS400 Server | EventLog Analyzer Server |
| TCP/8470-8476 | AS400 Serve | EventLog Analyzer Server |
| TCP/9470-9476 | AS400 Serve | EventLog Analyzer Server |
SNMP Trap Collection
| PORTS | INBOUND | OUTBOUND | SERVICES | Additional Rights and Permissions |
|---|---|---|---|---|
| UDP/162 (configurable) | EventLog Analyzer Server | Network Device / Application | SNMP |
User Permissions:
|
IIS Log Collection
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | IIS Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | IIS Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | IIS Server | EventLog Analyzer Server | SMB RPC/NP |
3. Agent orchestration
Windows Agent Log Collection and Communication
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTPS/8094, 8095 (configurable) | EventLog Analyzer Server and Log Processor | EventLog Analyzer Agent Machine and Log Processor |
Environment Permission:
|
Communication includes tasks such as agent synchronization and checking agent status.
Windows Agent Installation & Management
Windows Agent Installation Prerequisites
Hardware Requirements: This section gives you information about the hardware requirements for the Log360 agent.
For 32 bit machines
- 1 GHz, 32-bit (x86) Pentium Dual Core processor or equivalent
- 2 GB RAM
For 64 bit machines
- 2.80 GHz, 64-bit (x64) Xeon® LV processor or equivalent
- 2 GB RAM
Operating System Requirements: The Log360 agent can be installed and run on the following operating systems (both 32 Bit and 64 Bit architecture) and versions:
- Windows®
- Windows 7 & above
- Windows Server 2008 & above
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | SMB RPC/NP | |
| Dynamic ranges of RPC ports - TCP/49152 to 65,535 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | RPC randomly allocates high TCP ports for Windows Server 2008 and later versions, as well as for Windows Vista and subsequent versions |
Management involves actions like starting, stopping, or uninstalling the agent software.
Linux Agent Installation
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | EventLog Analyzer Agent Machine | EventLog Analyzer Server | SSH |
Sudo User Permissions:
|
Linux Agent Management & Communication
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| TCP/22 | EventLog Analyzer Server | EventLog Analyzer Server |
User Permissions:
|
| HTTPS/8094, 8095 (configurable) | EventLog Analyzer Server and Log Processor | EventLog Analyzer Agent Machine and Log Processor |
4. Importing logs
Importing Logs using SMB
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/137 | Target Device | EventLog Analyzer Server | NetBIOS name resolution RPC/named pipes (NP) |
User Permissions:
|
| TCP/138 | Target Device | EventLog Analyzer Server | NetBIOS datagram | |
| TCP/139 | Target Device | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Target Device | EventLog Analyzer Server | SMB RPC/NP |
Importing logs using FTP
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/20 | Target Device | EventLog Analyzer Server | FTP/SFTP |
User Permissions:
|
| TCP/21 | Target Device | EventLog Analyzer Server | FTP/SFTP |
5. Discovery
Windows Domain Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/389 | Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
Windows Workgroup Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Workgroup Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/139 | Workgroup Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Workgroup Server | EventLog Analyzer Server | SMB RPC/NP | |
| TCP/1024-65535 | Workgroup Server | EventLog Analyzer Server | RPC randomly allocated high TCP ports |
Event Source Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | Target Windows Device | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/137 | Target Windows Device | EventLog Analyzer Server | NetBIOS name resolution RPC/named pipes (NP) | |
| TCP/138 | Target Windows Device | EventLog Analyzer Server | NetBIOS datagram | |
| TCP/139 | Workgroup Server | EventLog Analyzer Server | NetBIOS session RPC/NP | |
| TCP/445 | Workgroup Server | EventLog Analyzer Server | SMB RPC/NP |
MSSQL Server Discovery-Windows
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| UDP/1434 | MSSql Server | EventLog Analyzer Server |
User Permissions:
|
| TCP/1433 | MSSql Server | EventLog Analyzer Server |
Network Device Discovery
| PORTS | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| UDP/162 | Network Devices | EventLog Analyzer Server |
Ports Usage::
|
IIS Discovery
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/445 | IIS Server | EventLog Analyzer Server | SMB RPC/NP |
Ports Usage:
|
MYSQL Server Discovery-Windows
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/135 | MySql Server | EventLog Analyzer Server | RPC |
User Permissions:
|
| TCP/445 | MySql Server | EventLog Analyzer Server | SMB RPC/NP |
MYSQL Server Discovery-Linux
| PORTS | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|
| TCP/22 | MySql Server | EventLog Analyzer Server | SMB RPC/NP |
User Permissions:
|
6. Incident Workflow Management
NETWORK ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND |
|---|---|---|---|
| PING DEVICE | ICMP/No ports | Audited Windows / Linux Device | EventLog Analyzer Server |
| TRACE ROUTE WINDOWS | ICMP/No ports | Audited Windows Device | EventLog Analyzer Server |
| TRACE ROUTE LINUX | UDP/33434 -33534 | Audited Linux Device | EventLog Analyzer Server |
WINDOWS ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| LogOff | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Shutdown and Restart | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Execute Windows Script | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Disable USB | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
Environment Permission:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| ALL SERVICE BLOCK | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| START PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| STOP PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| TEST PROCESS | TCP/135 | Audited Windows Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions: For root\cim v2 In WMI Properties:
|
| TCP/139 | Audited Windows Device | EventLog Analyzer Server | NetBIOS session RPC/NP | ||
| TCP/445 | Audited Windows Device | EventLog Analyzer Server | SMB RPC/NP | ||
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports |
LINUX ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| Shutdown and Restart | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The user should be the root user. |
| Execute Windows Script | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission for user. |
| ALL SERVICE BLOCK | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission. |
| START PROCESS | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The permission to execute the command should be available for the user whose credentials are provided. |
| STOP PROCESS | Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: The permission to execute the command should be available for the user whose credentials are provided. |
| TEST PROCESS | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | - |
NOTIFICATIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| Pop Up WINODWS | TCP/135 | Audited Linux Device | EventLog Analyzer Server | RPC |
UserGroups:
User Permissions For root\cim v2 In WMI Properties:
Environment Permission:
|
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | RPC randomly allocated high TCP ports | ||
| Pop Up LINUX | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: Sudo permission for user. |
| Send Email WINDOWS & LINUX | TCP/Port mentioned while config using SMTP server | Audited Linux Device | EventLog Analyzer Server | - | Environment Permission: SMTP server should be configured on Event log analyzer server |
| Send SMS WINDOWS & LINUX | - | - | - | - | Environment Permission: SMS Server should be configured in the product. |
| Send SNMP Trap WINDOWS & LINUX | UDP/Port specified in workflow block | Audited Windows / Linux Device | EventLog Analyzer Server | - | Environment Permission: The port mentioned in workflow configuration should be open. |
Active Directory ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | SERVICE | Additional Rights and Permissions |
|---|---|---|---|---|---|
| DELETE AD USER WINDOWS | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
| DISABLE AD USER WINDOWS | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP |
User Permissions:
|
| DISABLE USER COMPUTER WINDOWS & LINUX | TCP/389 | Audited Domain Controller | EventLog Analyzer Server | LDAP | User Permission:
|
MISCELLANEOUS ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|---|
| WRITE TO FILE WINDOWS | TCP/135 | Audited Windows Device | EventLog Analyzer Server |
UserGroups:
User Rights:
User Permissions: For root\cim v2 In Properties:
Environment Permission:
|
| RPC ports - TCP/1024 to 65,535 | Audited Windows Device | EventLog Analyzer Server | ||
| WRITE TO FILE LINUX | TCP/Specified port. | Audited Linux Device | EventLog Analyzer Server | Environment Permission:
|
| HTTP WebHook | - | - | - | Environment Permission:
|
| FORWARD LOGS | TCP/Specified Port | Audited Windows / Linux Device | EventLog Analyzer Server | - |
| CSV LOOKUP | TCP/Specified Port | Audited Windows / Linux Device | EventLog Analyzer Server | User Permissions:
|
FIREWALL ACTIONS
| BLOCK | PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|---|
| Cisco ASA deny inbound/Outbound rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#ciscoCredentials |
| Fortigate deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#fortigateCredentials |
| Palo Alto deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#paloAltoCredentials |
| Sophos XG deny Access rules | https/443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#sophosXGCredentials |
| Barracuda deny Access rules | https/8443 | Firewall Device | EventLog Analyzer Server |
Ports User Customizable Additional Rights: https://www.manageengine.com/products/eventlog/help/threat-intelligence-and-analytics/threat-response/incident-management/playbook-management.html#fortigateCredentials |
7. Distributed communication Setup
Distributed
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| HTTP/8095 (configurable) | EventLog Analyzer Managed Server Machine | EventLog Analyzer Admin Server Machine |
User Permissions:
|
| HTTP/8095 (configurable) | EventLog Analyzer Admin Server Machine | EventLog Analyzer Managed Server Machine |
User Permissions:
|
Centralized Archiving Port
| PORT | INBOUND | OUTBOUND | Additional Rights and Permissions |
|---|---|---|---|
| SSH/8080 (configurable) | EventLog Analyzer Admin Server Machine | EventLog Analyzer Managed Server Machine |
User Permissions:
|
Using EventLog Analyzer with Antivirus Applications
To ensure unhindered functioning of EventLog Analyzer, you need to add the following files to the exception list of your Antivirus application:
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| <ELA_HOME>/ES/data | Elasticsearch indexed data is stored. | All the collected logs will not be available if the data is deleted. |
| <ELA_HOME>/ES/repo | Elasticsearch index snapshot is taken at this location. | Snapshots and Elasticsearch archival feature will fail if the files at this location are deleted. |
| <ELA_HOME>/ES/archive | Elasticsearch archives are stored here. | Archived log data will not be available if the files located here are deleted. |
| <ME>/elasticsearch/ES/data | Elasticsearch indexed data is stored. | Reports would be affected if the data is deleted. |
| <ME>/elasticsearch/ES/repo | Elasticsearch index snapshot is taken at this location. | Snapshots and Elasticsearch archival feature will fail if the files at this location are deleted. |
| <ME>/elasticsearch/ES/archive | Elasticsearch archives are stored here. | Data will not be available if the files located here are deleted. |
| <ELA_HOME>/data/za/threatfeeds | Bundled files containing a list of malicious IPs, domains and URLs that will be used in case there is no internet connectivity will be stored here. These files will be deleted on the first default threat feed synchronization. Whitelisting is required only till first synchronization. | If the files are removed and if there is no internet connectivity, then the list of malicious threat sources will be missed from the dataset. |
| <ELA_HOME>/data/AlertDump | Formatted logs are stored before processing for alerts. Might be detected as false positive by Antivirus applications. | If the file is quarantined or deleted, related alerts would be missed. |
| <ELA_HOME>/data/NotificationDump | Formatted logs are stored before processing for notification. Might be detected as false positive by Antivirus applications. | If the file is quarantined or deleted, notification for triggered alerts would be missed. |
| <ELA_HOME>/bin | All binaries are included here. Some Antivirus applications might block them as false positive. | Product might not function. |
| <ELA_HOME>/data/imworkflow | Binaries uploaded by users for workflow execution are stored here. | Script Alert workflow might not work as intended. |
| <ELA_HOME>/pgsql/bin | Postgres binaries are included here. Might be detected as false positive by Antivirus applications. | Product might not start. |
| <ELA_HOME>/lib/native | All binaries are included here. Some Antivirus applications might block them as false positive. | Product might not function. |
| <ELA_HOME>/archive (If the archive folder is moved to a new location, add the new location) | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| <ELA_HOME>/troubleshooting | All troubleshooting binaries are included here. Some Antivirus applications might block them as false positive. | Some troubleshooting batch files might not work. |
| <ELA_HOME>/tools | All tools binaries are included here. Some Antivirus applications might block them as false positive. | Some tools might not work if the files are removed by Antivirus applications. |
| <ELA_HOME>/ES/CachedRecord | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
For Windows agent machine - 64 bit,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin | Agent binaries are stored here. | The Agent might not work if the files are quarantined. |
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin\data | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| C:\TEMP\\EventLogAgent | Agent installation files are moved for installation and upgrade. | Agent might not upgrade/not install if the files are quarantined. |
For Windows agent machine - 32 bit,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| C:\Program Files\EventLogAnalyzer_Agent\bin | Agent binaries are stored here. | The Agent might not work if the files are quarantined. |
| C:\Program Files (x86)\EventLogAnalyzer_Agent\bin\data | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
| C:\TEMP\\EventLogAgent | Agent installation files are moved for installation and upgrade. | Agent might not upgrade/not install if the files are quarantined. |
For Linux agent,
| Path | Need for whitelisting | Impact if not whitelisted |
|---|---|---|
| /opt/ManageEngine/EventLogAnalyzer_Agent/bin | Agent binaries are stored here. | The Agent might not work if the files are quarantined. |
| /opt/ManageEngine/EventLogAnalyzer_Agent/bin/data | Antivirus applications might slow down frequent write operations. | Performance issues might occur in the product if the Antivirus applications slow down write operations. |
8. Advanced threat analytics
| PORT | Additional Rights and Permissions |
|---|---|
| HTTPS/443 |
To fetch the "Log360 Cloud Threat Analytics" feeds, the below URLs will be used |
Read also
This page elaborated on the setup prerequisites. You can also refer to the guides below for more about system requirements, installation and uninstallation, starting and shutting down, and connecting to the server: