![Previous Topic: Managing SystemEDGE and Application Insight Modules (AIMs)](574.png)
![Next Topic: Active Directory and Exchange Server (ADES)](573.png)
Administration Guide › Managing SystemEDGE and Application Insight Modules (AIMs) › User Permissions and Access Requirements Reference
User Permissions and Access Requirements Reference
The following sections summarize the access requirements to Install CA Virtual Assurance components and monitor your environments using CA Virtual Assurance. Each section includes information about the required communication ports. If a distributed installation ranges across firewalls, you can use this list to verify that the required communication ports are open.
This documentation is intended for:
- Administrators who install, configure, and use CA Virtual Assurance to manage virtual environments.
- Operators who use CA Virtual Assurance to monitor virtual environments.
More information:
Active Directory and Exchange Server (ADES)
Cisco UCS
Citrix XenDesktop
Citrix XenServer
Huawei GalaX
Hyper-V
IBM PowerHA
IBM PowerVM
Microsoft Cluster Server
Oracle Solaris Zones
Red Hat Enterprise Virtualization
Remote Deployment Agent
Remote Monitoring
SystemEDGE and Advanced Encryption
VMware vCenter
VMware vCloud
Copyright © 2013 CA.
All rights reserved.
![Previous Topic: Managing SystemEDGE and Application Insight Modules (AIMs)](574.png) ![Next Topic: Active Directory and Exchange Server (ADES)](573.png)
|
|