Previous Topic: Managing SystemEDGE and Application Insight Modules (AIMs)Next Topic: Active Directory and Exchange Server (ADES)


User Permissions and Access Requirements Reference

The following sections summarize the access requirements to Install CA Virtual Assurance components and monitor your environments using CA Virtual Assurance. Each section includes information about the required communication ports. If a distributed installation ranges across firewalls, you can use this list to verify that the required communication ports are open.

This documentation is intended for:

More information:

Active Directory and Exchange Server (ADES)

Cisco UCS

Citrix XenDesktop

Citrix XenServer

Huawei GalaX

Hyper-V

IBM PowerHA

IBM PowerVM

Microsoft Cluster Server

Oracle Solaris Zones

Red Hat Enterprise Virtualization

Remote Deployment Agent

Remote Monitoring

SystemEDGE and Advanced Encryption

VMware vCenter

VMware vCloud