Skip to main content

Protocols and Ports Required for Monitoring Active Directory, Exchange, and Group Policy

Review a full list of protocols and ports required for monitoring Active Directory, Exchange, and Group Policy.

  • Allow outbound connections from the dynamic (1024 - 65535) local port on the computer where Netwrix Cloud Agent resides.

  • Allow outbound connections to remote ports on the source and inbound connections to local ports on the target.

Tip for reading the table: For example, on the computer where Netwrix Auditor Server resides (source), allow outbound connections to remote 389 TCP port. On domain controllers in your domain (target), allow inbound connections to local 389 TCP port.

PortProtocolSourceTargetPurpose
389TCPNetwrix Cloud AgentDomain controllersLDAP Common queries
3268TCPNetwrix Cloud AgentDomain controllersLDAP Group membership GC search
3269TCPNetwrix Cloud AgentDomain controllersGlobal catalog LDAP over SSL
88TCP/UDPNetwrix Cloud AgentDomain controllersKerberos authentication
135 and dynamic range: 1024 -65535TCPNetwrix Cloud AgentDomain controllersWindows Management Instrumentation gpupdate /force
445TCPNetwrix Cloud AgentDomain controllersSMB 2.0/3.0 Authenticated communication between Netwrix Cloud Agent and domain controllers.
53UDPNetwrix Cloud AgentDomain controllersDNS Client
135 and dynamic range: 1024 -65535TCPNetwrix Cloud AgentExchange Server- Windows Management Instrumentation - Retrieve Exchange Server configuration settings* - Run gpupdate /force * gpupdate /force
5985 5986TCPNetwrix Cloud AgentExchange Server- Windows Remote Management - PowerShell connections: - 5985 - for HTTP - 5986 - for HTTPS