Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity 101
What is SNMP?

What is SNMP in Networking?

Published: 09-26-2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

Understanding SNMP fundamentals

Think of SNMP as the "universal remote control" for your network infrastructure. Just like a remote lets you control your TV from across the room, SNMP allows network administrators to monitor and manage network devices without physically accessing each one.

SNMP operates on a simple client-server model where network management systems (managers) communicate with network devices (agents) to exchange information about device status, performance metrics, and configuration data.

SNMP architecture components

SNMP manager

The SNMP manager is the central monitoring system that sends requests to network devices and processes the responses. It's typically a network management software platform that provides dashboards, alerts, and reporting capabilities.

SNMP agent

An SNMP agent is software that runs on network devices and responds to requests from SNMP managers. The agent maintains a local database of management information and can send unsolicited notifications when specific events occur.

Management information base (MIB)

The MIB is a hierarchical database that defines what information can be monitored and managed on a device. Each piece of information has a unique identifier called an Object Identifier (OID). For example, the OID 1.3.6.1.2.1.1.1.0 represents the system description of a device.

SNMP operations and commands

SNMP uses five basic operations to manage network devices:

  1. GET Request

Retrieves specific information from a device, such as CPU usage or interface status.

  1. GET-NEXT Request

Retrieves the next piece of information in the MIB hierarchy, useful for browsing through available data.

  1. GET-BULK Request

Efficiently retrieves large amounts of data in a single request (available in SNMPv2 and v3).

  1. SET Request

Modifies configuration settings on a device, such as changing an interface description or updating SNMP community strings.

  1. TRAP/INFORM

Allows devices to proactively send notifications to managers when specific events occur, like interface failures or threshold violations.

SNMP versions and security

SNMPv1

The original version from the 1980s uses simple community strings for authentication. Data is transmitted in plain text, making it vulnerable to eavesdropping and unauthorized access. According to the National Institute of Standards and Technology (NIST), SNMPv1 should be avoided in production environments due to security weaknesses.

SNMPv2

Introduced in the 1990s, SNMPv2 improved performance and added bulk operations but maintained the same weak security model as v1. It supports 64-bit counters, making it suitable for high-speed network interfaces.

SNMPv3

The current standard provides robust security features including:

  • Authentication: Verifies the identity of users

  • Privacy: Encrypts SNMP messages to prevent eavesdropping

  • Access Control: Restricts which users can access specific data

NIST recommends using SNMPv3 for all production deployments to ensure adequate security protection.

SNMP and cybersecurity

From a cybersecurity perspective, SNMP presents both opportunities and risks:

Security benefits

  • Network visibility: SNMP provides comprehensive monitoring of network infrastructure, helping detect unusual activity or performance anomalies

  • Incident response: Real-time alerts and historical data support faster incident detection and forensic analysis

  • Compliance: Many security frameworks require network monitoring capabilities that SNMP can provide

Security risks

  • Weak authentication: Older SNMP versions use easily compromised community strings

  • Information disclosure: SNMP can reveal sensitive network topology and configuration details

  • Unauthorized access: Misconfigured SNMP can allow attackers to modify device settings

Best practices for secure SNMP implementation

  • Use SNMPv3: Always implement the latest version with proper authentication and encryption

  • Change Default Community Strings: Replace "public" and "private" with complex, unique strings

  • Limit Access: Use access control lists (ACLs) to restrict SNMP access to authorized management systems

  • Monitor SNMP Traffic: Log and analyze SNMP communications for suspicious activity

  • Regular Updates: Keep SNMP-enabled devices updated with the latest security patches

Common SNMP use cases

Network administrators rely on SNMP for various monitoring and management tasks:

  • Performance monitoring: Track bandwidth utilization, CPU usage, and memory consumption

  • Fault management: Receive alerts when devices go offline or experience errors

  • Configuration management: Remotely update device settings and firmware

  • Capacity planning: Collect historical data to predict future resource needs

  • Security monitoring: Detect unauthorized devices or configuration changes

Strengthening your network security posture

SNMP remains a cornerstone technology for network management and security monitoring. While it provides powerful capabilities for maintaining network infrastructure, proper implementation is crucial for avoiding security vulnerabilities.

For cybersecurity teams, understanding SNMP is essential because it's widely deployed across enterprise networks and can serve as both a valuable monitoring tool and a potential attack vector if misconfigured. By implementing SNMPv3 with strong authentication and following security best practices, organizations can harness SNMP's benefits while maintaining robust network security.

FAQ

SNMP uses UDP port 161 for manager-to-agent communications and UDP port 162 for agent-to-manager trap messages.

Yes, SNMP SET operations can modify device configurations, but this capability should be used carefully and typically requires read-write community strings or proper SNMPv3 credentials.

SNMPv3 with proper authentication and encryption is considered secure for enterprise use. However, older versions (v1 and v2) should be avoided or carefully isolated.

Polling involves the manager actively requesting information from devices at regular intervals, while traps are unsolicited notifications sent by devices when specific events occur.

When properly configured, SNMP has minimal impact on network performance. However, excessive polling or bulk data collection can consume bandwidth and device resources.

Glitch effectBlurry glitch effect
Glitch effect

Related Resources


  • What are IIS logs, and why should cybersecurity pros pay attention
    What are IIS logs, and why should cybersecurity pros pay attention
    Learn what IIS logs are, where to find them, how to analyze them for cybersecurity, and best practices for retention and forensics.
  • What is Bot Mitigation?
    What is Bot Mitigation?
    Learn what bot mitigation is, why it's essential for cybersecurity, and how to protect your business from malicious automated threats.
  • What is Password Security Storage?
    What is Password Security Storage?
    Learn how password security storage protects user credentials through hashing, salting, and modern algorithms. Essential cybersecurity knowledge explained.
  • What is FDE Security?
    What is FDE Security?
    Learn about FDE security and how full disk encryption protects your data. Complete guide covering implementation, benefits, and best practices.
  • What is a Password Management Tool?
    What is a Password Management Tool?
    Learn what password management tools are, how they work, and why they're essential for cybersecurity. Learn how to secure your data and simplify your life.
  • What is a SIP Proxy? Your Gateway to Secure Communications
    What is a SIP Proxy? Your Gateway to Secure Communications
    Learn what SIP proxy servers do, how they protect your communications, and why they're essential for VoIP security in this complete cybersecurity guide.
  • What is a User Agent?
    What is a User Agent?
    Discover what a user agent is and how it facilitates web interactions. Learn about User-Agent strings and their role in web optimization.
  • What is Multihoming?
    What is Multihoming?
    Learn how multihoming enhances network security and reliability. Understand implementation best practices, security risks, and benefits for your organization.
  • Packet capture (PCAP): The unsung hero of network security
    Packet capture (PCAP): The unsung hero of network security
    Learn what packet capture is, how it works, and the benefits of PCAP in network security.

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy