Online Help

Required ports for agentless audit

Preview

To ensure smooth performance and optimal functionality of the agentless audit using the Alloy Audit Service, certain TCP and UDP ports need to be open within your secure network, whether it is a domain or LAN. This page provides an overview of the required port settings for various operating systems, network devices, and services.

NOTE: These requirements do not apply to the agent-based audit process, where computers are audited by agents installed on them.

Windows

For successful agentless auditing on Windows systems, certain ports need to be open. The required ports depend on whether PowerShell Remoting is enabled and available.

  • If PowerShell Remoting is properly configured and access is allowed from the audit service host to the remote machine, only the ports listed under "Required Ports" must be opened.
  • If PowerShell Remoting is disabled or unavailable, additional ports must be opened to maintain the auditing functionality. These additional ports are listed under the section "Ports required if PowerShell Remoting is unavailable."

NOTE: The ports listed under "Ports recommended if PowerShell Remoting is unavailable" may be important in certain environments. Consider opening them, if necessary.

Port Number Protocol Purpose Notes
Required ports

88

TCP

Login and password verification, specifically for Kerberos authentication

 
389 TCP Information retrieval from Active Directory through LDAP (Lightweight Directory Access Protocol) Failure to open this port will impact the audit’s ability to gather user information from Active Directory.
5985 TCP Remote execution of PowerShell commands  
Ports required if PowerShell Remoting is unavailable
135 TCP Windows recognition and communication If these ports are not open, the node type may not be recognized as Windows or could be incorrectly identified as another type.
139 TCP Windows recognition
445 TCP SMB (Server Message Block) communication, primarily for file sharing
Ports recommended if PowerShell Remoting is unavailable
135 UDP RPC (Remote Procedure Call) communication

If this port is closed, the Device ID may not be collected from the computer during the discovery phase. If auditing fails, the error messages may not accurately reflect the reason.

139 UDP Named pipes communication This port may be important in certain environments. Consider opening it, if required.

In addition, the following protocols and services may require attention on your firewall:

  • Pipes: Verify that pipes are functional and not blocked by the firewall. If they are not functional or are blocked, the Device ID may not be collected from the computer during the discovery phase. If auditing fails, the error messages may not accurately reflect the reason.

  • RPC: Ensure that your firewall allows RPC traffic for services like WMI (Windows Management Instrumentation). If RPC traffic is not allowed, during the discovery phase, the Device ID may not be collected from the computer. If auditing fails, the error messages may not accurately reflect the reason.

Linux and macOS

When implementing agentless auditing for Linux or macOS systems within your secure network, make sure to have the following port available:

Port Number Protocol Purpose

22 (SSH)

TCP

For secure remote access

VMware ESXi

To enable smooth agentless auditing on ESXi systems, the following ports must be open:

Port Number Protocol Purpose

80

TCP

Communication via HTTP

443 TCP Secure communication via HTTPS
902 TCP ESXi recognition

NAS (Network-Attached Storage) devices

To facilitate agentless auditing for NAS devices, make sure to keep the following port open:

Port Number Protocol Purpose
139 TCP NAS devices recognition

SNMP (Simple Network Management Protocol)

Enabling agentless auditing using SNMP requires the following ports to be open:

Port Number Protocol Purpose
161 UDP Network monitoring and management
The following UDP port may be important in certain environments. It is advisable to consider opening it if required:
162 UDP SNMP trap notifications.

Printers

For effective agentless auditing of printers, ensure that the following port is accessible:

Port Number Protocol Purpose
9100 TCP Printer recognition, particularly printer discovery

Network scanning

The following ports are used by the network scanning process.

This process detects and identifies active devices on the network and collects only a limited set of data, including such basic attributes as device name, type, etc. For more information on scanning, refer to Network scanning and auditing.

Port Number Protocol Purpose
389 TCP Information retrieval from Active Directory through LDAP (Lightweight Directory Access Protocol)
53 UDP DNS (Domain Name System) resolution
137 UDP NetBIOS (Network Basic Input/Output System) name resolution and related services.
138 UDP NetBIOS communication

In addition, the following protocol may require attention on your firewall:

  • ICMPv4: ICMP (Internet Control Message Protocol) does not use ports directly but is essential for functions like ping. Ensure ICMPv4 is enabled for AlloyScan to operate optimally.