Avoid potential problems

Before installing or upgrading Security Verify Access, review the product requirements:

After installing Security Verify Access, make a comprehensive backup and system recovery strategy. When creating the backup and recovery strategy:

Parent topic: Getting started with troubleshooting