Previous Topic: Managing SystemEDGE and Application Insight Modules (AIMs)Next Topic: Active Directory and Exchange Server (ADES)


User Permissions and Access Requirements Reference

The following sections summarize the access requirements to Install CA Virtual Assurance components and monitor your environments using CA Virtual Assurance. Each section includes information about the required communication ports. If a distributed installation ranges across firewalls, you can use this list to verify that the required communication ports are open.

This documentation is intended for: