Skip to main content

Endpoint Sensors

Endpoint Sensors are lightweight Java processes deployed on Windows servers that collect real-time Windows Event Log telemetry and forward it to OrbisID. This event data feeds the Threat Detections engine, which identifies accounts exhibiting anomalous privileged behaviour.

Go to Alerts → Endpoint Sensors in the left navigation menu.

Sensor Status Overview

The three summary cards show the health of your sensor fleet at a glance:

CardDescription
OnlineSensors actively sending heartbeats
DegradedSensors connected but reporting errors or reduced throughput
OfflineSensors that have not sent a heartbeat recently

Sensor Table

ColumnDescription
Sensor NameUnique name assigned when the sensor was registered
SystemThe OrbisID target system the sensor is deployed on
StatusOnline / Degraded / Offline
HostnameThe hostname of the machine running the sensor
IP AddressThe IP address of the sensor machine
VersionThe deployed sensor version
Events/minCurrent throughput of account events being forwarded
Last HeartbeatTimestamp of the most recent heartbeat received

Viewing Sensor Details

Click the eye icon to open a full detail dialog, which shows all fields including OS information and registration date.

Deploying an Endpoint Sensor

The sensor is a standalone Java application distributed as an executable JAR (orbisid-monitor-agent.jar) and a Windows batch launcher.

Prerequisites

  • Java 17 or later on the target machine (Java 8–16 will fail with UnsupportedClassVersionError)
  • Network access from the target machine to the OrbisID backend (HTTPS, port 443 or your configured port)
  • The sensor must run natively on the Windows host — Docker containers and remote collection are not supported
Java version requirement

The sensor JAR requires Java 17+. Run java -version before installation. If the version is below 17, download Java 17 LTS from Adoptium.

The simplest deployment path uses the self-enrollment flow, which provisions the API key automatically:

  1. In OrbisID, go to Alerts → Endpoint SensorsDeployment Guide tab
  2. Click Generate Enrollment Token (Administrator only)
  3. Download the sensor JAR and launcher script to the target machine
  4. Create config.properties in the same folder as the JAR:
    orbisid.api.url=https://your-orbisid-host
    orbisid.enrollment.token=<token from step 2>
    orbisid.agent.name=MYSERVER-sensor
  5. Run the launcher to complete enrollment:
    launch-orbisid-monitor-agent.bat
    The sensor registers itself, receives an API key, and begins forwarding events.

Manual Registration

Alternatively, register the sensor in advance and supply the API key manually:

  1. Click Register Sensor in the Endpoint Sensors table
  2. Fill in a Sensor Name and optionally link a Target System
  3. Copy the generated API key — it is shown only once
  4. Create config.properties:
    orbisid.api.url=https://your-orbisid-host
    orbisid.api.key=<your-api-key>
    orbisid.agent.name=MYSERVER-sensor
  5. Run via the batch launcher or directly:
    java -jar orbisid-monitor-agent.jar

Running as a Windows Service

Use NSSM (Non-Sucking Service Manager) to run the sensor as a Windows service for automatic startup and restart:

nssm install OrbisIDSensor "C:\Program Files\Eclipse Adoptium\jdk-17...\bin\java.exe"
nssm set OrbisIDSensor AppParameters "-jar C:\OrbisID\orbisid-monitor-agent.jar"
nssm set OrbisIDSensor AppDirectory "C:\OrbisID"
nssm start OrbisIDSensor

Enable Required Windows Audit Policies

Windows does not write user account, group membership, or file share events to the Security Event Log by default. Without these policies enabled, critical events such as user creation (4720), password resets (4724), group membership changes (4728 / 4732 / 4756), and network share activity (5142–5144) will never appear in the log — even with the sensor running.

Run the following commands from an elevated (Administrator) command prompt on each monitored host:

auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable
auditpol /set /subcategory:"Security Group Management" /success:enable /failure:enable
auditpol /set /subcategory:"File Share" /success:enable /failure:enable

These settings take effect immediately and persist across reboots. Verify with:

auditpol /get /subcategory:"User Account Management"
Group Policy (domain environments)

In domain environments, apply these policies via GPO under Computer Configuration → Windows Settings → Security Settings → Advanced Audit Policy Configuration → Audit Policies.

note

The sensor startup log will warn if any of these policies are disabled (AUDIT POLICY DISABLED: ...). Check the sensor log if expected events are not appearing in Threat Detections.

What Events Are Collected?

The sensor subscribes to the Windows Security, System, PowerShell/Operational, and WMI-Activity/Operational event channels and forwards the following event IDs:

Event IDChannelDetection
4672SecuritySpecial privileges assigned to new logon
4688SecurityAdmin process launched (cmd, powershell, regedit, sc.exe)
4697SecurityService installed
4698SecurityScheduled task created
4719SecurityAudit policy modified
4720SecurityUser account created
4722SecurityAccount re-enabled
4724SecurityPassword reset attempt
4726SecurityUser account deleted
4728 / 4732 / 4756SecurityMember added to privileged group
4738SecurityUser account attributes changed
4740SecurityAccount locked out
4648SecurityLogon with explicit credentials
4670SecurityObject permissions changed
4781SecurityAccount name changed
4104PowerShellScript block executed
5142 / 5143 / 5144SecurityNetwork share created / modified / deleted
5857 / 5861WMI-ActivityWMI persistence activity
7045SystemNew service registered

Raw event data is retained for 90 days via automatic partition management.

Sensor Communication

The sensor communicates outbound-only — no inbound ports need to be opened:

ChannelEndpointPurpose
HeartbeatPOST /api/v1/monitor-agents/heartbeatPeriodic health update (every 15s)
EventsPOST /api/v1/monitor-agents/eventsBatch event submission (every 30s or 500 events)
EnrollmentPOST /api/v1/monitor-agents/enrollOne-time self-registration using enrollment token

All requests are authenticated with the API key provisioned during enrollment or manual registration.

Editing and Managing Sensors

ActionHow
Edit sensor name or system linkClick the pencil icon
Regenerate API keyClick the key icon (generates a new key; update config.properties and restart the service)
Delete sensorClick the trash icon (Administrator only)

Deleting a sensor does not delete the event data or Threat Detections already created. Detections retain their sensor association for audit purposes.

Relationship to Threat Detections

Events collected by Endpoint Sensors are analysed in real time by the Threat Detections engine. When an event matches a detection rule, a new Threat Detection is raised (or an existing open detection is updated). The ML confidence model uses confirmed and dismissed detections to continuously improve scoring for each account/rule combination.

Relationship to Gap Analysis

Active Endpoint Sensors count as evidence of real-time monitoring capability in the PAM Gap Analysis. Controls covering event logging and alerting (NIST AU-2, ISO A.8.15, SOx ITGC-OP-1) automatically reflect Endpoint Sensor deployment in their evidence summaries.

Troubleshooting

SymptomLikely CauseResolution
UnsupportedClassVersionError on startupJava version below 17Install Java 17 LTS and update NSSM AppBinaryPath
Sensor shows OfflineNetwork issue or process stoppedCheck the service status and network connectivity
Events/min = 0Agent running but no events collectedVerify the Windows Event Log service is running and the sensor account has read access to the Security log
No user / group / share detectionsWindows audit policies disabledRun the auditpol /set commands in Enable Required Windows Audit Policies. Check sensor startup log for AUDIT POLICY DISABLED warnings
Sensor not appearing in tableEnrollment token invalid or API key rejectedCheck sensor logs for HTTP 401/403; regenerate the enrollment token
Degraded statusElevated error rateCheck sensor logs for parsing errors or high event volume