Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Enhancing your AWS Managed Microsoft AD network security configuration - AWS Directory Service

Enhancing your AWS Managed Microsoft AD network security configuration

The AWS Security Group that is provisioned for the AWS Managed Microsoft AD directory is configured with the minimum inbound network ports required to support all known use cases for your AWS Managed Microsoft AD directory. For more information on the provisioned AWS Security Group, see What gets created with your AWS Managed Microsoft AD.

To further enhance the network security of your AWS Managed Microsoft AD directory, you can modify the AWS Security Group based on the following common scenarios.

Customer domain controllers CIDR - This CIDR block is where your domain on-premises domain controllers reside.

Customer client CIDR - This CIDR block is where your clients such as computers or users authenticate to your AWS Managed Microsoft AD. Your AWS Managed Microsoft AD domain controllers also reside in this CIDR block.

AWS applications only support

All user accounts are provisioned only in your AWS Managed Microsoft AD to be used with supported AWS applications, such as the following:

  • Amazon Chime

  • Amazon Connect

  • Amazon QuickSight

  • AWS IAM Identity Center

  • Amazon WorkDocs

  • Amazon WorkMail

  • AWS Client VPN

  • AWS Management Console

You can use the following AWS Security Group configuration to block all non-essential traffic to your AWS Managed Microsoft AD domain controllers.

Note
  • The following are not compatible with this AWS Security Group configuration:

    • Amazon EC2 instances

    • Amazon FSx

    • Amazon RDS for MySQL

    • Amazon RDS for Oracle

    • Amazon RDS for PostgreSQL

    • Amazon RDS for SQL Server

    • WorkSpaces

    • Active Directory trusts

    • Domain joined clients or servers

Inbound Rules

None.

Outbound Rules

None.

AWS applications only with trust support

All user accounts are provisioned in your AWS Managed Microsoft AD or trusted Active Directory to be used with supported AWS applications, such as the following:

  • Amazon Chime

  • Amazon Connect

  • Amazon QuickSight

  • AWS IAM Identity Center

  • Amazon WorkDocs

  • Amazon WorkMail

  • Amazon WorkSpaces

  • AWS Client VPN

  • AWS Management Console

You can modify the provisioned AWS Security Group configuration to block all non-essential traffic to your AWS Managed Microsoft AD domain controllers.

Note
  • The following are not compatible with this AWS Security Group configuration:

    • Amazon EC2 instances

    • Amazon FSx

    • Amazon RDS for MySQL

    • Amazon RDS for Oracle

    • Amazon RDS for PostgreSQL

    • Amazon RDS for SQL Server

    • WorkSpaces

    • Active Directory trusts

    • Domain joined clients or servers

  • This configuration requires you to ensure the “customer domain controllers CIDR” network is secure.

  • TCP 445 is used for trust creation only and can be removed after the trust has been established.

  • TCP 636 is only required when LDAP over SSL is in use.

Inbound Rules

Protocol Port range Source Type of traffic Active Directory usage
TCP & UDP 53 Customer domain controllers CIDR DNS User and computer authentication, name resolution, trusts
TCP & UDP 88 Customer domain controllers CIDR Kerberos User and computer authentication, forest level trusts
TCP & UDP 389 Customer domain controllers CIDR LDAP Directory, replication, user and computer authentication group policy, trusts
TCP & UDP 464 Customer domain controllers CIDR Kerberos change / set password Replication, user and computer authentication, trusts
TCP 445 Customer domain controllers CIDR SMB / CIFS Replication, user and computer authentication, group policy trusts
TCP 135 Customer domain controllers CIDR Replication RPC, EPM
TCP 636 Customer domain controllers CIDR LDAP SSL Directory, replication, user and computer authentication group policy, trusts
TCP 49152 - 65535 Customer domain controllers CIDR RPC Replication, user and computer authentication, group policy, trusts
TCP 3268 - 3269 Customer domain controllers CIDR LDAP GC & LDAP GC SSL Directory, replication, user and computer authentication group policy, trusts
UDP 123 Customer domain controllers CIDR Windows Time Windows Time, trusts

Outbound Rules

Protocol Port range Source Type of traffic Active Directory usage
All All Customer domain controllers CIDR All traffic

AWS applications and native Active Directory workload support

User accounts are provisioned only in your AWS Managed Microsoft AD to be used with supported AWS applications, such as the following:

  • Amazon Chime

  • Amazon Connect

  • Amazon EC2 instances

  • Amazon FSx

  • Amazon QuickSight

  • Amazon RDS for MySQL

  • Amazon RDS for Oracle

  • Amazon RDS for PostgreSQL

  • Amazon RDS for SQL Server

  • AWS IAM Identity Center

  • Amazon WorkDocs

  • Amazon WorkMail

  • WorkSpaces

  • AWS Client VPN

  • AWS Management Console

You can modify the provisioned AWS Security Group configuration to block all non-essential traffic to your AWS Managed Microsoft AD domain controllers.

Note
  • Active Directory trusts cannot be created and maintained between your AWS Managed Microsoft AD directory and customer domain controllers CIDR.

  • It requires you to ensure the “customer client CIDR” network is secure.

  • TCP 636 is only required when LDAP over SSL is in use.

  • If you want to use an Enterprise CA with this configuration you will need to create an outbound rule “TCP, 443, CA CIDR”.

Inbound Rules

Protocol Port range Source Type of traffic Active Directory usage
TCP & UDP 53 Customer client CIDR DNS User and computer authentication, name resolution, trusts
TCP & UDP 88 Customer client CIDR Kerberos User and computer authentication, forest level trusts
TCP & UDP 389 Customer client CIDR LDAP Directory, replication, user and computer authentication group policy, trusts
TCP & UDP 445 Customer client CIDR SMB / CIFS Replication, user and computer authentication, group policy trusts
TCP & UDP 464 Customer client CIDR Kerberos change / set password Replication, user and computer authentication, trusts
TCP 135 Customer client CIDR Replication RPC, EPM
TCP 636 Customer client CIDR LDAP SSL Directory, replication, user and computer authentication group policy, trusts
TCP 49152 - 65535 Customer client CIDR RPC Replication, user and computer authentication, group policy, trusts
TCP 3268 - 3269 Customer client CIDR LDAP GC & LDAP GC SSL Directory, replication, user and computer authentication group policy, trusts
TCP 9389 Customer client CIDR SOAP AD DS web services
UDP 123 Customer client CIDR Windows Time Windows Time, trusts
UDP 138 Customer client CIDR DFSN & NetLogon DFS, group policy

Outbound Rules

None.

AWS applications and native Active Directory workload support with trust support

All user accounts are provisioned in your AWS Managed Microsoft AD or trusted Active Directory to be used with supported AWS applications, such as the following:

  • Amazon Chime

  • Amazon Connect

  • Amazon EC2 instances

  • Amazon FSx

  • Amazon QuickSight

  • Amazon RDS for MySQL

  • Amazon RDS for Oracle

  • Amazon RDS for PostgreSQL

  • Amazon RDS for SQL Server

  • AWS IAM Identity Center

  • Amazon WorkDocs

  • Amazon WorkMail

  • WorkSpaces

  • AWS Client VPN

  • AWS Management Console

You can modify the provisioned AWS Security Group configuration to block all non-essential traffic to your AWS Managed Microsoft AD domain controllers.

Note
  • It requires you to ensure the “customer domain controllers CIDR” and “customer client CIDR” networks are secure.

  • TCP 445 with the “customer domain controllers CIDR” is used for trust creation only and can be removed after the trust has been established.

  • TCP 445 with the “customer client CIDR” should be left open as it is required for Group Policy processing.

  • TCP 636 is only required when LDAP over SSL is in use.

  • If you want to use an Enterprise CA with this configuration you will need to create an outbound rule “TCP, 443, CA CIDR”.

Inbound Rules

Protocol Port range Source Type of traffic Active Directory usage
TCP & UDP 53 Customer domain controllers CIDR DNS User and computer authentication, name resolution, trusts
TCP & UDP 88 Customer domain controllers CIDR Kerberos User and computer authentication, forest level trusts
TCP & UDP 389 Customer domain controllers CIDR LDAP Directory, replication, user and computer authentication group policy, trusts
TCP & UDP 464 Customer domain controllers CIDR Kerberos change / set password Replication, user and computer authentication, trusts
TCP 445 Customer domain controllers CIDR SMB / CIFS Replication, user and computer authentication, group policy trusts
TCP 135 Customer domain controllers CIDR Replication RPC, EPM
TCP 636 Customer domain controllers CIDR LDAP SSL Directory, replication, user and computer authentication group policy, trusts
TCP 49152 - 65535 Customer domain controllers CIDR RPC Replication, user and computer authentication, group policy, trusts
TCP 3268 - 3269 Customer domain controllers CIDR LDAP GC & LDAP GC SSL Directory, replication, user and computer authentication group policy, trusts
UDP 123 Customer domain controllers CIDR Windows Time Windows Time, trusts
TCP & UDP 53 Customer domain controllers CIDR DNS User and computer authentication, name resolution, trusts
TCP & UDP 88 Customer domain controllers CIDR Kerberos User and computer authentication, forest level trusts
TCP & UDP 389 Customer domain controllers CIDR LDAP Directory, replication, user and computer authentication group policy, trusts
TCP & UDP 445 Customer domain controllers CIDR SMB / CIFS Replication, user and computer authentication, group policy trusts
TCP & UDP 464 Customer domain controllers CIDR Kerberos change / set password Replication, user and computer authentication, trusts
TCP 135 Customer domain controllers CIDR Replication RPC, EPM
TCP 636 Customer domain controllers CIDR LDAP SSL Directory, replication, user and computer authentication group policy, trusts
TCP 49152 - 65535 Customer domain controllers CIDR RPC Replication, user and computer authentication, group policy, trusts
TCP 3268 - 3269 Customer domain controllers CIDR LDAP GC & LDAP GC SSL Directory, replication, user and computer authentication group policy, trusts
TCP 9389 Customer domain controllers CIDR SOAP AD DS web services
UDP 123 Customer domain controllers CIDR Windows Time Windows Time, trusts
UDP 138 Customer domain controllers CIDR DFSN & NetLogon DFS, group policy

Outbound Rules

Protocol Port range Source Type of traffic Active Directory usage
All All Customer domain controllers CIDR All traffic
PrivacySite termsCookie preferences
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.