Cymulate Pre-Requisites
Follow these pre-reqs for the pre-requisites for the agent deployment for Cymulate.
Cymulate agent requirements
The Cymulate agent is available for different operating systems:
- Windows and Linux agent (service-based): This agent operates as a background service, offering a scalable and modular approach ideal for enterprise environments. It does not require a user to be logged in, enabling continuous and efficient security assessments. Multiple user profiles can be configured to run assessments seamlessly across different accounts. For environments using Active Directory, ensure Interactive Logon is enabled for any user profiles added to the agent.
- Mac agent (process-based): This lightweight agent communicates directly with the Cymulate platform and is designed to run on a dedicated machine, such as a laptop, desktop, or Virtual Machine (VM). The process-based agent requires an active user login to operate, enabling real-time security assessment without extensive background processes.
System requirements
Make sure to meet the following system requirements for the agent.
| Criteria | Minimum requirement | Recommended |
|---|---|---|
| CPU | 2 cores | 4 cores |
| Memory (RAM) | 8GB | 16GB |
| Free disk space | 30GB | 60GB |
| Network | One network interface | One network interface |
Memory (RAM) requirements for Endpoint Security assessments
Additional requirements for process-based (Mac) agents:
- The user must be logged in to the dedicated machine where the Cymulate agent is installed.
- The user logged in to the machine with the installed Cymulate agent must have Read, Write, and Delete permissions.
- If an automated passwords changing policy is being used, the user logged in to the Cymulate agent machine should be excluded from that policy.
Communication requirements
To perform security assessments on a network, it is necessary for the Cymulate Agent to be able to communicate with the Cymulate platform. This communication requires HTTPS and is required for managing agents and performing attacks.
If a firewall is present between the Cymulate agent and the Cymulate platform, certain ports need to be opened either directly or through a proxy to enable the required communication.
| Source | Destination | Port | Description |
|---|---|---|---|
| Cymulate agent machine |
Cymulate Cloud Domain *.app.cymulate.com *.us-app.cymulate.com |
443 HTTPS |
Essential communication between the Cymulate agent and the Cymulate cloud platform. |
Supported operating systems
The Cymulate agent is supported for the following operating systems.
| OS type | OS | Version | Architecture |
|---|---|---|---|
| Windows | Windows 10 client | 1607+ | x64 |
| Windows 11 | 22000+ | x64 | |
| Windows server | 2012+ | x64 | |
| Windows server core | 2012+ | x64 | |
| Nano server | 1809+ | x64 | |
| Mac | Mac | 10.15+ | x64 |
| Linux (service based agent) | Oracle Linux Server | 9.3+ | x64 |
| Ubuntu | 20.04+ | x64 | |
| Red Hat Enterprise Linux | 8.1+ | x64 | |
| Alpine | 3.17+ | x64 | |
| CentOS Stream | 9 | x64 | |
| Debian | 12 | x64 | |
| Fedora | 39+ | x64 | |
| openSUSE Leap | 15.5+ | x64 | |
| SUSE Enterprise | 12.5+ | x64 | |
| Amazon Linux | 2 | x64 |
Supported Cymulate modules per operating system
The following table lists each module, and which operating systems are supported.
| Module | Windows | Mac | Linux |
|---|---|---|---|
| Immediate Threats | Yes | Yes | Yes |
| Email Gateway | Yes | Yes | Yes |
| Web Gateway | Yes | Yes | Yes |
| Web Application Firewall | Yes | Yes | Yes |
| Endpoint Security | Yes | Yes | Yes |
| Data Exfiltration | Yes | Yes | Yes |
| Advanced Scenarios | Yes | Yes | Yes |
| Phishing Awareness | Yes | Yes | Yes |
| Hopper | Yes | No | No |
| Full Kill Chain APT | Yes | Limited | Limited |
Supported browsers
- Google Chrome
- Microsoft Edge
Windows agent minimum user permissions
To install and run the Windows agent properly, the service account used for the agent must have the following permissions:
- program data read/write access
- program files read/write access
- perform interactive login from users (domain & local)
- run process under a different user profile
- load user profile
- read user token
- impersonate user
Exclusions
The HTTPS/443 traffic between the Cymulate agent and the Cymulate platform should be excluded from any mechanisms such as anti-malware, URL filtering ,etc.
EU URL exclusions
The following list displays the required EU URL exclusions and what they are relevant for.
- app.cymulate.com - Access to Cymulate platform
- agent.app.cymulate.com - For Mac and Linux agent to cloud communication, getting instructions, and updating results and statuses from the agent.
- agents.app.cymulate.com - For Windows agent to cloud communication, getting instructions, and updating results and statuses from the agent.
- cyagent.app.cymulate.com - For Windows agent to cloud communication, for getting instructions and updating results and statuses from the agent.
- agentlogs.app.cymulate.com - The Windows agent sends logs to this URL.
- api.app.cymulate.com - For users that use the Cymulate REST API.
- edr-resources.app.cymulate.com -Where the agent downloads resources for Endpoint Security assessments.
- dlp-resources.app.cymulate.com - Where the agent downloads resources for Data Exfiltration assessments.
- cypy.app.cymulate.com - Advanced Scenarios.
US URL exclusions
The following list displays the required US URL exclusions and what they are relevant for.
- us-app.cymulate.com - Access to Cymulate platform
- agent.us-app.cymulate.com - For Mac and Linux agent to cloud communication, getting instructions, and updating results and statuses from the agent.
- agents.us-app.cymulate.com - For Windows agent to cloud communication, getting instructions, and updating results and statuses from the agent.
- cyagent.us-app.cymulate.com - For Windows agent to cloud communication, for getting instructions and updating results and statuses from the agent.
- us-cyagent.cymulate.com - For Windows agent to cloud communication, for getting instructions and updating results and statuses from the agent.
- agentlogs.us-app.cymulate.com - The Windows agent sends logs to this URL.
- api.us-app.cymulate.com - For users that use the Cymulate REST API.
- edr-resources.us-app.cymulate.com - Where the agent downloads resources for Endpoint Security assessments.
- dlp-resources.us-app.cymulate.com - Where the agent downloads resources for Data Exfiltration assessments.
- cypy.app.cymulate.com - Advanced Scenarios
Private tenant exclusions
The following list displays the private tenant URL exclusions and what they are relevant for.
- {tenantName}-agent.cymulate.com - Mac and Linux agent
- {tenantName}-cyagent.cymulate.com - Windows agent
- {tenantName}.cymulate.com - Access to Cymulate platform
- {tenantName}-api.cymulate.com - For users that use the Cymulate REST API.
- {tenantName}-agentlogs.cymulate.com - The Windows agent sends logs to this URL.
Directory exclusions
Some directories must be excluded/whitelisted for the assessments to run properly. Based on your operating system, exclude the following directories (and their sub-folders) on your security controls. Your security controls must also allow downloading encrypted files to these paths.
For more information on setting exclusions in specific security tools, see Whitelisting and exclusions in security products.
Windows agents
- C:\Program Files\Cymulate\Agent\**
- C:\ProgramData\Cymulate\Agent\**
Mac
- /Applications/Cymulate/Agent/*
- /Users/Shared/Cymulate/Agent/*
- Mac agents must be installed and run with root privileges.
Linux agent
- /usr/local/lib/Cymulate/Agent/*
- /usr/local/share/Cymulate/Agent/*
Module specific requirements
Email Gateway requirements
During Email Gateway assessments, numerous emails are sent in a short period of time, which can trigger spam filters. To accurately test your organization’s security engines, such as anti-virus, sandbox, URL filter, and more, it is necessary to whitelist the Cymulate attack server IP address/domain from your email’s anti-spam filtering.
This allows assessment emails sent through the Cymulate mail server to reach the configured mailbox without being mistakenly flagged as spam. This exclusion is essential to ensure an effective evaluation of your organization's email security.
- Set up a dedicated mailbox under your email domain (ex. cymulate@example.com).
- Exclude the following from anti-spam filtering and Rate Limiting and Throttling policies:
- IP address - 18.202.69.111
- Domain - cymulatemailgateway.com
Supported email platforms
The Cymulate Agent supports multiple communication options with a dedicated mailbox:
- Microsoft Exchange - HTTP connection to Microsoft Exchange (Preferred). The agent will prompt for user mailbox credentials and exchange server IP/Hostname address.
- Office 365- Select one of the following authentication methods:
- Interactive - If there is an interactive browser on your system, it will automatically open and prompt you to log in to your account.
- DeviceCode - Copy the code and enter it when prompted.
- AppOnly - This authentication method (OAuth 2.0) is only available if you registered an Azure AD application. See Connecting Office 365 - using the App-only authentication method
- GSuite- There are two available connection options:
- IMAP connection via GSuite.
- HTTPS connection via Gsuite.
- Service account option. See Configuring the GSuite client for agent SMTP connection.
- OAuth 2.0 option. See Configuring the GSuite client for HTTPS OAuth2.0 SMTP connection
- Dynamic IMAP - The Dynamic IMAP option enables a connection with any email client, including those currently unsupported, or for users preferring dynamic IMAP connections.
- Outlook client (IMAP and SMTP) - available for Windows OS only - Connecting to an Outlook application running on the local machine that the Cymulate agent is installed on. The Cymulate agent will use Outlook COM object to monitor incoming /outgoing email traffic using Outlook (Outlook 2013 and above is required).
Please follow the next steps to enable Cymulate Agent to use the Outlook API:
- Add cymulate.com domain to Safe Senders List in Outlook (How Do I Add a Domain to Safe Senders in Outlook?)
- In Outlook, go to File > Options.
- Click Trust Center, and then click Trust Center Settings.
- Click Programmatic Access.
- Select Never warn me about suspicious activity and click OK.
.png?sv=2022-11-02&spr=https&st=2025-06-27T14%3A03%3A39Z&se=2025-06-27T14%3A22%3A39Z&sr=c&sp=r&sig=c3a4WCqlW8a6a9PU398eUEVn5Yp76WO5%2FXs2irkhx2k%3D)
Web Gateway requirements
To ensure the accurate testing of the Web Gateway, it is necessary to partially whitelist the URL that the agent uses to download potentially malicious files during inbound testing. The following URL should be excluded from URL filtering while maintaining file download scanning, AV, and sandbox checks:
- https://cym-files-download.s3.eu-west-1.amazonaws.com
- https://s3-eu-west-1-r-w.amazonaws.com/
Web Application Firewall requirements
During WAF assessments, Cymulate sends a high volume of web payloads in a short amount of time which can trigger anti-bot/anti-DDoS mechanisms.
To ensure the assessment accurately tests the resilience of your application's security measures, it is essential to whitelist the specific source IP addresses provided. By excluding these IPs from your WAF's anti-bot/anti-DDoS protection, you enable the assessment to function without interference, allowing for a comprehensive evaluation of your application's defenses against web-based attacks.
EU
- 54.217.50.18
- 52.208.202.111
- 52.49.144.209
US
- 54.237.172.129
- 35.169.219.115
- 52.4.48.52
Endpoint Security requirements
During Endpoint Security assessments, Cymulate needs to retrieve the endpoint attack files from its cloud. To ensure the attack files are downloaded properly and not blocked by the web gateway, whitelist the following domains in your Web gateway/Firewall:
EU
- edr-resources.app.cymulate.com
US
Microsoft Office requirement
Some Endpoint Security executions require Microsoft Office to be installed on the machine for the scenarios to run properly.
Data Exfiltration requirements
During Data Exfiltration assessments, Cymulate attempts to exfiltrate data to various remote IPs and URLs. To enable Cymulate to effectively assess the performance of your data classification policy without interference from the Firewall or URL filtering mechanisms, it is necessary to whitelist the following URLs:
EU:
- dlp-resources.app.cymulate.com
US:
- dlp-resources.us-app.cymulate.com
The following domains are where the agent attempts to exfiltrate the data:
EU:
- p5.cymulatedlp.com (for HTTPS, HTTP, Browser HTTPS, and Browser HTTP categories). This domain should not be blocked by URL filtering.
- allports.cymulatedlp.com (for port scanning for the Open ports category)
US:
- http://u7.cymulatedlp.com/ (for HTTPS, HTTP, Browser HTTPS, and Browser HTTP categories). This domain should not be blocked by URL filtering.
- allports.cymulatedlp.com (for port scanning for the Open ports category)
Advanced Scenarios requirements
To run assessments with the Advanced Scenarios module, Cymulate needs to retrieve the advanced scenarios files from its cloud. To ensure the attack files are downloaded properly and not blocked by the web gateway, you should exclude the following URLs.
EU and US:
- cypy.app.cymulate.com
Phishing Awareness requirements
To ensure that Phishing Awareness assessments run properly, you should exclude the Cymulate attack server from your email solution's anti-spam/anti-phishing protection. By doing so, phishing emails sent through the Cymulate mail server can reach the target mailboxes without being flagged as spam. This exclusion is necessary for an effective evaluation of your organization's phishing awareness.
Exclude/Whitelist the following from anti-spam or anti-phishing protection:
Domain:
- EU - support-eu.lionnets.com
- US - support-us.lionnets.com
IP address:
- IP address - 54.170.181.225
Hopper requirements
The Hopper module assesses an organization’s privilege management and network segmentation. To ensure this layer of security is tested without being blocked by the EDR, it is necessary to whitelist the following binary hashes on all machines in the network:
- File name: CymulateLM.exe
- File name:CymulateLM64.exe
MD5, SHA1, SHA256 hash values for these files can be found under Settings > Agents > Download agent > Agent hashes.
Additionally, whitelist the following binary HASH on the agent machine (machine used as the Hopper starting point):
- File name:HopperMaster.dll
- File name: HopperReport.zip
MD5, SHA1, SHA256 hash values for these files can be found under Settings > Agents > Download agent > Agent hashes.
Exposure Analytics requirements
To ensure proper communication between the agent and Connectors, allow network access for the following domains:
- https://cybi-resources-and-results.app.cymulate.com
- https://cyagent.app.cymulate.com
- https://agentlogs.cymulate.com
If you have a proxy configured on your machine, you must configure the proxy settings when installing the agent.