Sharing the Log Processing Folder
If your DCPs write to a network ACT Log Processing share, you must verify that you have the correct permissions at both the share and the folder levels, as follows:
- Share-Level Permissions Verify that the Everyone group has Change and Read permissions for the ACT Log Processing share folder.
- Folder-Level Permissions (NTFS Only) Verify that the Everyone group has Write access and that the ACT Log Processing Service account has List Folder Contents, Read, and Write permissions. If the ACT Log Processing Service is running as Local System, this must be the domain\computer$ account. If the ACT Log Processing Service is running with a user account, this is the user account information.
Preparing for Microsoft Compatibility Exchange
Configure your organization's infrastructure to support the Microsoft Compatibility Exchange while also protecting your intranet security and stability. The recommended method of configuration requires you to allow the appropriate users, on designated computers, to access the Microsoft Compatibility Exchange through your security and network infrastructure. To configure the infrastructure to support the Microsoft Compatibility Exchange, follow these steps:
- Configure your firewalls and Uniform Resource Locator (URL) scanners to allow access
to the Microsoft Compatibility Exchange by setting the following conditions:
- Allow outbound access for the standard Secure Sockets Layer (SSL) TCP port 443 on any computer running the ACM.
- Restrict outbound access to the Microsoft Compatibility Exchange, allowing access only from designated computers and designated users within your organizations.
- Enable access to the Microsoft Compatibility Exchange (https://appinfo.microsoft.com/AppProfile50/ActWebService.asmx), which is necessary only if passing through a firewall.
- Grant the db_datareader, db_datawriter, and db_owner database roles to any user account that will log on to the computer running the ACT Log Processing Service.
- Grant the db_datareader and db_datawriter database roles to any user account that will log on to the computer running the ACM.
In this tutorial:
- Testing Application Compatibility
- Understanding Compatibility
- Why Applications Fail
- Choosing the Best Tool
- Program Compatibility Assistant
- Windows XP Mode
- Application Virtualization
- Understanding the ACT
- Support Topologies
- Compatibility Evaluators
- Planning for the ACT
- Choosing a Deployment Method
- Preparing for the ACT
- Sharing the Log Processing Folder
- Installing the ACT 5.5
- Collecting Compatibility Data
- Analyzing Compatibility Data
- Prioritizing Compatibility Data
- Assessing Application Compatibility
- Managing Compatibility Issues
- Filtering Compatibility Data
- Rationalizing an Application Inventory
- Testing and Mitigating Issues
- Modeling the Production Environment
- Using the Compatibility Administrator
- Deploying Application Mitigation Packages