To ensure that you can successfully deploy a USM Anywhere Sensor in VMware and monitor all of your VMware resources, make sure the following requirements are met.

Minimum Requirements

These are the minimum requirements to set up and configure the USM Anywhere Sensor on VMware:
  • Access to VMware ESXi 6.5 or later.
  • Dedicated 4 CPUs and 12 GB of reserved memory.
  • Dedicated 178 GB of disk space (128 GB data device and 50 GB root device).
  • Internet connectivity to the network where you plan to install the VMware Sensor.
Important: Because the needs of a sensor differ based on the varying demands of different deployment environments and the complexity of events being processed, the number of events per second (EPS) a sensor can process varies.Depending on your environment, you may need to deploy additional sensors to ensure that all events are processed.
These are the recommended requirements to set up and configure the USM Anywhere Sensor on VMware:
  • A VMware vSphere or VMware vCenter user account to use for USM Anywhere Sensor configuration with an assigned role that has permissions equivalent to the read-only default role.
    Note: The read-only role enables a user limited read access to the system without any other privileges. Credentials with this assigned role enable the deployed USM Anywhere Sensor to collect vCenter and vSphere events and run asset discovery.
  • Installed VMware Tools for hosts in your vSphere or vCenter environment. With configured vSphere or vCenter credentials, the VMware Sensor uses the VMware APIs to run asset discovery. For hosts that do not have VMware Tools installed, the asset does not have an assigned IP address. This can result in the asset being missed from asset discovery or in duplicate assets created during subsequent discoveries. These tools also enable the sensor to collect more detailed information about the asset.
  • If is not available, a configured static IP for the management interface and local Domain Name System (DNS) information.
    Important: LevelBlue strongly recommends assigning a static IP address to deploy the USM Anywhere Sensor.If DHCP changes the IP address of the sensor, you must update all the IP addresses on all the devices that are forwarding logs to the sensor through syslog.
  • set up for network monitoring (see Direct Traffic from Your Physical Network to the VMware Sensor for more information).
  • Administrative credentials for devices that require configuration to forward logs to the VMware Sensor.
  • Administrative credentials for remote hosts to support authenticated asset scans.
  • Configuration on firewall or other security device to send UDP or TCP syslog (if it is capable of exporting security logs through UDP or TCP syslog).
  • Network topology information to run asset discovery.
  • To access network-based intrusion detection system (NIDS) functionality on the sensor, an ethernet port on the host must be available to receive data from a Switched Port Analyzer (SPAN) or Test Access Point (TAP) port.

Sensor Ports and Connectivity

Before deploying a USM Anywhere Sensor, you must configure your permissions to enable the required connectivity for the new sensor. Initial deployment of a sensor requires that you open egress and outbound ports and protocols in the firewall for communication with USM Anywhere and LevelBlue Secure Cloud resources. The sensor receives no inbound connections from outside the firewall.
Note: To launch the USM Anywhere Sensor web UI during the initial setup, you need to allow inbound traffic to the sensor IP address through TCP port 80. You can remove access to this port after the sensor successfully connects to USM Anywhere. You do not need to allow inbound traffic to this port from the Internet.
The following tables list the inbound and outbound ports. Sensor Ports and Connectivity (Outbound Ports)
TypePortsEndpointsPurpose
TCP22 and 443prod-usm-saas-tractorbeam.alienvault.cloud

prod-gov-usm-saas-tractorbeam.gov.alienvault.us (for LevelBlue TDR for Gov)
SSH communications with the USM Anywhere remote support server.

See Troubleshooting and Remote Sensor Support for more information about remote technical support through the USM Anywhere Sensor console.
TCP443update.alienvault.cloudCommunication with LevelBlue for initial setup and future updates of the sensor.
TCP443reputation.alienvault.comOngoing communication with LevelBlue Labs™ Open Threat Exchange® (OTX™).
TCP443otx.alienvault.comOngoing communication with OTX to retrieve vulnerability scores. Connecting to otx.alienvault.com is not required but highly recommended.

OTX uses the AWS CloudFront services. Refer to the AWS IP address ranges page when you deploy a new sensor. This page contains the current IP address ranges for the service and instructions on how to filter the addresses.
TCP443Your USM Anywhere subdomain.alienvault.cloud

Your USM Anywhere subdomain.gov.alienvault.us (for LevelBlue TDR for Gov)
Ongoing communication with USM Anywhere.
TCP443contracts.canonical.comRequired for Ubuntu Pro license verification and updates
TCP9443vCenter ServerAuthenticate sensor to ESXi.

Connect to the vCenter for VMware configuration to gather data directly from vCenter.
SSL443storage-proxy.services.prod.alienvault.cloudOngoing communication with USM Anywhere in order to send and retrieve backups.
SSL443metrics-proxy.services.prod.alienvault.cloudOngoing communication with USM Anywhere in order to send metrics and messages.
SSL/TCP443api-parameters-[REGION]-prod.alienvault.cloud¹

api-message-proxy-[REGION]-prod.alienvault.cloud

api.message-proxy.[REGION].prod.alienvault.cloud
Ongoing communication with USM Anywhere.

It is only necessary to allowlist the address that corresponds to the region where your USM Anywhere instance is hosted.
SSL/TCP7100Your USM Anywhere subdomain.alienvault.cloud

Your USM Anywhere subdomain.gov.alienvault.us (for LevelBlue TDR for Gov)
Ongoing communication with USM Anywhere.
UDP53DNS Servers (Google Default)Ongoing communication with USM Anywhere.
UDP1230.pool.ntp.org
1.pool.ntp.org
2.pool.ntp.org
3.pool.ntp.org
Sync with network time protocol (NTP) services.
TCP443api.geoip-enrichment.ap-northeast-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.ap-south-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.ap-southeast-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.ap-southeast-2.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.ca-central-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.eu-central-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.eu-west-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.eu-west-2.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.me-central-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.sa-east-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.us-east-1.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.us-west-2.prod.alienvault.cloud/geo-ip/sensor

api.geoip-enrichment.us-gov-west-1.prod-gov.gov.alienvault.us/geo-ip/sensor (for LevelBlue TDR for Gov)
Allows resolution of IP addresses for geolocation services.

It is only necessary to allowlist the GeoIP address that corresponds to the region where your USMA instance is hosted.
Sensor Ports and Connectivity (Inbound Ports)
TypePortsPurpose
SSH22Inbound method for secure remote login from a computer to USM Anywhere.
HTTP80Inbound communication for HTTP traffic.
UDP (RFC 3164)514USM Anywhere collects data through syslog over UDP on port 514 by default.
TCP (RFC 3164)601Inbound communication for reliable syslog service. USM Anywhere collects data through syslog over TCP on port 601 by default.
TCP (RFC 5424)602USM Anywhere collects data through syslog over TCP on port 602 by default.
Traffic Mirroring4789Inbound communication for virtual extensible local area network (VXLAN).
WSMANS5987Inbound WBEM WS-Management HTTP over Secure Sockets Layer/Transport Layer Security (SSL/TLS) (NXLog).
TLS/TCP (RFC 3164)6514USM Anywhere collects TLS-encrypted data through syslog over TCP on port 6514 by default.
TLS (RFC 5424)6515USM Anywhere collects data through syslog over TLS on port 6515 by default.
TCP9000Inbound communication used internally for HTTP sensor traffic.
Graylog12201Inbound communication for Graylog Extended Log Format (GELF).

USM Anywhere IP Addresses for Allowlisting

Your sensor is connected to a USM Anywhere instance deployed in one of the Amazon Web Services (AWS) endpoint regions based on your location. If you need to configure your firewall to allow communication between the sensor and the USM Anywhere instance, refer to the following table with the reserved IP address ranges for each region.
Important: The Update Server and the AlienVault Agent always use the 3.235.189.112/28 range no matter where your USM Anywhere is deployed. The LevelBlue TDR for Gov Update Server uses the 3.32.190.224/28 range.
Note: The regional IP ranges listed in this table are limited to the control nodes (subdomain). You must also meet all requirements provided in the Sensor Ports and Connectivity (Outbound Ports) table.
AWS Regions Where USM Anywhere Instance Is Available
CodeNameReserved Static IP Address Range
ap-northeast-1Asia Pacific (Tokyo)18.177.156.144/28
3.235.189.112/28
44.210.246.48/28
ap-south-1Asia Pacific (Mumbai)3.7.161.32/28
3.235.189.112/28
44.210.246.48/28
ap-southeast-1Asia Pacific (Singapore)18.143.203.80/28
3.235.189.112/28
44.210.246.48/28
ap-southeast-2Asia Pacific (Sydney)3.25.47.48/28
3.235.189.112/28
44.210.246.48/28
ca-central-1Canada (Central)3.96.2.80/28
3.235.189.112/28
44.210.246.48/28
eu-central-1Europe (Frankfurt)18.156.18.32/28
3.235.189.112/28
44.210.246.48/28
eu-west-1Europe (Ireland)3.250.207.0/28
3.235.189.112/28
44.210.246.48/28
eu-west-2Europe (London)18.130.91.160/28
3.235.189.112/28
44.210.246.48/28
me-central-1Middle East (UAE)3.29.147.0/28
3.235.189.112/28
44.210.246.48/28
sa-east-1South America (São Paulo)18.230.160.128/28
3.235.189.112/28
44.210.246.48/28
us-east-1US East (N. Virginia)3.235.189.112/28
44.210.246.48/28
us-west-2US West (Oregon)44.234.73.192/28
3.235.189.112/28
44.210.246.48/28
us-gov-west-1AWS GovCloud (US-West)3.32.190.224/28
See Create the VMware Virtual Machine