Previous Topic: Managing SystemEDGE and Application Insight Modules (AIMs)

Next Topic: Active Directory and Exchange Server (ADES)


User Permissions and Access Requirements Reference

The following sections summarize the access requirements to Install CA Virtual Assurance components and monitor your environments using CA Virtual Assurance. Each section includes information about the required communication ports. If a distributed manager installation ranges across firewalls, you can use this list to verify that the required communication ports are open.

This documentation is intended for:

More information:

Active Directory and Exchange Server (ADES)

Cisco UCS

Citrix XenServer

Hyper-V

IBM High Availability Cluster Multiprocessing

IBM PowerVM

Microsoft Cluster Server

Oracle Solaris Zones

Red Hat Enterprise Virtualization

Agent Remote Deployment

Remote Monitoring

SystemEDGE and Advanced Encryption

VMware vCenter

VMware vCloud