Firewall Exceptions for Physical Appliances

Introduction

In order for our physical appliances to properly communicate back with our MDR services, several exceptions should be made to your firewall rules, ensuring that telemetry is being properly captured, and analyzed, for any malicious activity. 


Depending on how restrictive your organization's firewall policies are, you may need to make some of the following exceptions in your firewall rules.


Firewall Exceptions

Outbound Relay Server Permissions

Our MDR services, and analysts, communicate with your appliance(s) through a relay tunnel secured by VPN. You will need to make a firewall rule that allows your organization's relay server hostname through your firewall. This is specific to your organization, and can be found by visiting the Appliance Status Page in your browser. 


Once logged in, the hostname is displayed above the table.  


If you do not allow an outbound connection to your relay server hostname, you may experience service disruptions.


Geo-Location access

If your firewall has any location-based blocking, please ensure that Canada is made an exception, as we are a Canadian-based company.


VPN Blockage

If your firewall blocks either Tailscale or OpenVPN, please allow these as they are used with our relay server connections mentioned above. 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article