Skip to main content

Integration API Ports

Review a full list of protocols and ports required for add-ons or any queries leveraging Netwrix Auditor Integration API.

  • Allow outbound connections from the dynamic (1024 - 65535) local port on the computer where Netwrix Auditor Server resides.
  • Allow outbound connections to remote ports on the source and inbound connections to local ports on the target.

On any computer you plan to host the add-on (source), allow outbound connections to remote 9699 TCP port. On the computer where Netwrix Auditor Server resides (target), allow inbound connections to local 9699 TCP port.

Add-onPortProtocolSourceTargetPurpose
All add-ons or queries9699TCPScript or query hostNetwrix Auditor  ServerThe default Netwrix Auditor Integration API port. However, you can configure another TCP port for that purpose.
AlienVault USM53UDP/TCPScript hostDNS ServerDNS Client
Amazon Web Services443TCPScript hostAmazon Web Services
53UDP/TCPScript hostDNS serverDNS Client
- Event Log Export - IBM QRadar - Intel Security - LogRhythm - SolarWinds Log & Event Manager - Splunk53UDP/TCPScript hostDNS serverDNS Client
CEF Export53UDP/TCPScript hostDNS serverDNS Client
- Cisco Network Devices - Privileged User Monitoring - General Linux Syslog514UDPCisco network devicesService hostThe default port for Cisco network devices remote Syslog logging. However, you can configure another UDP port for that purpose.
53UDPService hostDNS serverDNS Client
HPE ArcSight515TCPScript hostArcSight Logger
514UDPScript hostArcSight Logger
53UDP/TCPScript hostDNS serverDNS Client
53UDPScript hostDNS serverDNS Client
RADIUS Server139TCPScript hostRADIUS serverRPC/NP Eventlog
445TCPScript hostRADIUS serverRPC/NP Eventlog
137UDPScript hostRADIUS serverRPC/NP Eventlog
138UDPScript hostRADIUS serverRPC/NP Eventlog
135TCPScript hostRADIUS serverRPC Endpoint Mapper Eventlog
1024 – 65535 (Dynamically assigned)TCPScript hostRADIUS serverRPC Eventlog
53UDP/TCPScript hostDNS serverDNS Client

Prerequisites

Netwrix Auditor Integration API uses HTTPS for communication with the automatically generated certificate. The default communication port is 9699.

Refer to the Security topic for detailed instructions on how to disable HTTPS and manage other API settings.

Configure Integration API Settings

Follow the steps to change the port.

Step 1 – In the Netwrix Auditor main window, navigate to the Integration tile.

Step 2 – Make sure the Leverage Integration API option is enabled.

Step 3 – Click Modify under the API settings section and specify a port number. Windows firewall rule will be automatically created.

Step 4 – If you use a third-party firewall, you must create a rule for inbound connections manually.

Integration API Settings

Configure Audit Database Settings

When you first configure the Audit Database settings in Netwrix Auditor, the product also creates several databases for special purposes, including Netwrix_Auditor_API. This database is designed to store data imported from the other sources using Netwrix Auditor Integration API.

Make sure that the Audit Database settings are configured in Netwrix Auditor. To check or configure these settings, navigate to the Settings > Audit Database.

You cannot use Netwrix Auditor Integration API without configuring the Audit Database.

Refer to the Audit Database topic for detailed instructions on how to configure SQL Server settings.