6.5

Table Of Contents
Table 32. Windows Files and Permissions (Continued)
Directory or File
Groups or
Users Full Control Modify
Read and
Execute Read Write
<agent
directory>/conf/*
(all les in the conf
directory)
SYSTEM Yes - - - -
Administrator Yes - - - -
Installation
User
Yes - - - -
Users - - - -
<agent
directory>/log/*
(all les in the log
directory)
SYSTEM Yes - - - -
Administrator Yes - - - -
Installation
User
Yes - - - -
Users - - - -
<agent
directory>/data/*
(all les in data
directory)
SYSTEM Yes - - - -
Administrator Yes - - - -
Installation
User
Yes - - - -
Users - - - -
Open Ports on Agent Host
The agent process listens for commands on two ports 127.0.0.1:2144 and 127.0.0.1:32000 that are
congurable. These ports might be arbitrarily assigned, and so, the exact port number might vary. The agent
does not open ports on external interfaces.
Table 33. Minimum Required Ports
Port Protocol Direction Comments
443 TCP Outgoing Used by the agent for outgoing connections over HTTP, TCP, or ICMP.
2144 TCP Listening Internal Only. Congurable. Used for inter-process communication between
the agent and the command line that loads and congures it. The agent process
listens on this port.
N The port number is assigned arbitrarily and might dier.
32000 TCP Listening Internal Only. Congurable. Used for inter-process communication between
the agent and the command line that loads and congures it. The agent process
listens on this port.
N The port number is assigned arbitrarily and might dier.
Revoking an Agent
If for any reason you need to revoke an agent, for example when a system with a running agent is
compromised, you can delete the agent resource from the system. Any subsequent request will fail
verication.
Use the vRealize Operations Manager user interface to revoke the agent certicate by removing the agent
resource. For more information, see “Removing the Agent Resource,” on page 38.
When the system is secured again, you can reinstate the agent. For more information, see “Reinstate an
Agent Resource,” on page 38.
Chapter 3 Secure Configuration of vRealize Operations Manager
VMware, Inc. 37