Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Please document the ports that AD Connect health agent could use if installed on an onpremise domain controller. #36049

Closed
mhunter77 opened this issue Jul 29, 2019 · 5 comments

Comments

@mhunter77
Copy link

An Azure Rapid Response customer opened a case 119071222001469 in service desk. He was looking for documentation on the ports that the Azure AD connect health agent would use when installed on a on-premise domain controller.

The customer was looking for documentation to provide to his networking and security team on why Azure AD Connect Health Agent (Microsoft.Identity.Health.Adds.InsightsService.exe) that was install on a domain controller was using ports 1501 and 1502. There is no documentation in this article "Azure AD Connect Health Agent Installation"
https://docs.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-health-agent-install#test-connectivity-to-azure-ad-connect-health-service

Can you provide documentation on this in the above article?

### QUESTION – 119071222001469 – Port Used for Azure AD Connect Health
Customer has the azure ad connect health agent installed on his domain controllers and he is concerned about the ports being used. Is there documentation for why the service “Microsoft.Identity.Health.Adds.InsightsService.exe”is using port 1501 and 1501?
NOTE - Microsoft.Identity.Health.Adds.InsightsService.exe is one of the services for Azure AD Connect Health for AD DS
I can provide a screenshot of nbtstat that shows the results running of netstat command on the onprem domain controller. In the results of netstat, you see that the Microsoft.Identity.Health.Adds.InsightsService.exe is connecting with ports 1501 and 1502
Is that because of the scenarios and alert conditions that are monitored by Azure AD Connect Health for AD DS?
The Azure AD Connect Health for AD DS agent may be querying other domain controllers because of the scenarios and alert conditions that are monitored by Azure AD Connect Health for AD DS?

DETAILS
The AD Connect health agent installed on his onpremise domain controllers. He ran netstat on a domain controller and he sees that the Microsoft.Identity.Health.Adds.InsightsService.exe is using port 1501 and 1502 connecting to other domain controllers.

I told the customer that these ports may be necessary for Active Directory on a domain controller
The following is a list of scenarios and alert conditions that is monitored by Azure AD Connect Health for AD DS:

  1. Domain Controller (DC) is not advertising
  2. DC is quarantined
  3. DC replication is broken
  4. DC unreachable via LDAP ping
  5. DC unable to find a PDC
  6. DC unable to find a Global Catalog
  7. No Global Catalog Detected
  8. DC Time is out of sync
  9. Unable to reach local SYSVOL share
  10. Netlogon service is not running
  11. Kerberos Key Distribution service is not running
  12. DFSR/NTFRS service is not running
  13. DNS service is not running
  14. High CPU Consumption on DC
  15. Data hasn't been refreshed in over 2 hours

The below article describes how a domain controller may use the lower ports that use 1501 and 1502


Service overview and network port requirements for Windows
System services ports
https://support.microsoft.com/en-us/help/832017/service-overview-and-network-port-requirements-for-windows
This section provides a description of each system service, includes the logical name that corresponds to the system service, and displays the ports and the protocols that each service requires.

Click the name of a system service in the following list to see the description:

  1. Active Directory (Local Security Authority)
    Active Directory runs under the Lsass.exe process and includes the authentication and replication engines for Windows domain controllers. Domain controllers, client computers and application servers require network connectivity to Active Directory over specific hard-coded ports. Additionally, unless a tunneling protocol is used to encapsulate traffic to Active Directory, a range of ephemeral TCP ports between 1024 to 5000 and 49152 to 65535 are required.

Note
· If your computer network environment uses only Windows Server 2008 R2, Windows Server 2008, Windows 7, or Windows Vista, you must enable connectivity over the high port range of 49152 through 65535.
· If your computer network environment uses Windows Server 2008 R2, Windows Server 2008, Windows 7, or Windows Vista together with versions of Windows earlier than Windows Server 2008 and Windows Vista, you must enable connectivity over both port ranges:
· High port range of 49152 through 65535
· Low port range of 1025 through 5000
· If your computer network environment uses only versions of Windows earlier than Windows Server 2008 and Windows Vista, you must enable connectivity over the low port range of 1025 through 5000.

However, the following article does not state that the ports 1501 and 1502 are required for the Azure AD Connect Health Agent Installation.


Document Details

Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.

@MarileeTurscak-MSFT
Copy link
Contributor

@mhunter77
Thanks for your feedback! We will investigate and update as appropriate.

@MarileeTurscak-MSFT
Copy link
Contributor

@billmath

This came from a support case where a customer requested documentation that explains why the AD Connect Health Agent reaches out to other domain controllers and ports 1501 and 1502 to gather data for the agent. Do we have some text that can be added to the documentation for this?

@MarileeTurscak-MSFT
Copy link
Contributor

Tagging @RobdeJong as well to see if there is some existing text that could be added.

@MarileeTurscak-MSFT
Copy link
Contributor

If we need to update this doc, my suggestion is a line like, "The Azure AD Connect Health Agent may contact other domain controllers and reach out to lower ports that use 1501 and 1502. This is in order to monitor connectivity, CPU, and data consistency."

@billmath
Copy link
Contributor

@mhunter77 Thank you for the feedback. I would say send me an email internally and we can start a thread with the PM. We would need to verify this before adding this to the documentation. Thanks!

Bill

#please-close

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants