Port | Protocol | Direction | Service | Purpose |
135 | TCP | Inbound | RPC | For Windows log collection Source: ADAudit Plus server Destination: Monitored computers |
137 | TCP and UDP | Inbound | NetBIOS name resolution RPC/named pipes (NP) | For Windows log collection Source: ADAudit Plus server Destination: Monitored computers |
138 | UDP | Inbound | NetBIOS datagram | For Windows log collection Source: ADAudit Plus server Destination: Monitored computers |
139 | TCP | Inbound | NetBIOS session RPC/NP | For Windows log collection Source: ADAudit Plus server Destination: Monitored computers |
445 | TCP and UDP | Inbound | SMB RPC/NP | For Windows log collection Source: ADAudit Plus server Destination: Monitored computers |
389 | TCP and UDP | Inbound | LDAP | For syncing AD objects with product Source: ADAudit Plus server Destination: Domain Controllers |
636 | TCP | Inbound | LDAP over SSL | For syncing AD objects with product Source: ADAudit Plus server Destination: Domain Controllers |
3268 | TCP | Inbound | Global catalog | For syncing AD objects with product Source: ADAudit Plus server Destination: Domain Controllers |
3269 | TCP | Inbound | Global catalog over SSL | For syncing AD objects with product Source: ADAudit Plus server Destination: Domain Controllers |
88 | TCP | Inbound | Kerberos | For authentication when accessing a domain resource Source: ADAudit Plus server Destination: Domain Controllers |
25 | TCP | Inbound | SMTP | To send emails Source: ADAudit Plus server Destination: SMTP servers |
465 | TCP | Inbound | SSL | To send emails Source: ADAudit Plus server Destination: SMTP servers |
587 | TCP | Inbound | TLS | To send emails Source: ADAudit Plus server Destination: SMTP servers |
49152- 65535* | TCP | Inbound | RPC randomly allocated high TCP ports | For Windows log collection Source: ADAudit Plus server Destination: Monitored computers |
Note: If you are using Windows Firewall you can open dynamic ports, 49152-65535, on the monitored computers by enabling the inbound rules listed below.
Remote Event Log Management (NP-In)
Remote Event Log Management (RPC)
Remote Event Log Management (RPC-EPMAP)
To enable the above rules: Open Windows Firewall → Advanced settings → Inbound Rules → Right click on respective rule → Enable Rule.
AWS – Check security group rules
1. Go to the EC2 dashboard
Sign in to the AWS Management Console.
Navigate to EC2 → Security Groups (under "Network & Security").
2. Locate the security group
Select the Security Group attached to your EC2 instance.
You can find the SG name in your EC2 instance details under the Description tab.
3. Check inbound rules
Click on the Inbound rules tab.
Look for entries that match the ports you want to verify
Ensure:
Protocol is correct (TCP/UDP).
Port Range includes the desired port.
Source allows the traffic (e.g., 0.0.0.0/0 for public access, or a specific IP range).
Azure – Check network security group (NSG) rules
1. Go to azure portal
Log in to https://portal.azure.com.
Navigate to Virtual Machines → Select your VM.
2. Find the NSG
Under the VM’s Networking section, locate the Network Interface or Subnet that the NSG is attached to.
Click the NSG name to open it.
3. Check inbound security rules
Go to Settings → Inbound security rules.
Review the list and ensure:
Priority is low enough (lower numbers take precedence).
Port matches the one required.
Protocol is correct.
Source is properly configured.
Troubleshooting DNS and LDAP Issues