The following content provides extensive details about this offering. For additional information and supporting documentation, refer to Verisk.com.
Performance considerations
Performance insights and configuration best practices for the Touchstone(Re) 2025 (13.0) release.
Release 2025 (13.0) will support
Platforms supported for installation of both Touchstone and Touchstone Re .
This release does not support
The following items were retired with the June 2025 release of Touchstone(Re) and will remain so for all future releases.
Installation considerations
Important considerations to note before proceeding with an installation.
A note on cores
Manage cores to improve performance for Touchstone(Re) installations.
SQL server and security considerations
A summary of security considerations involving the SQL server and Touchstone/Touchstone Re installations.
Hardware & OS recommendations
The following material discusses the specific type of CPU, RAM, disk, and network configurations that are required as well as brand recommendations.
Certified hardware & platforms
Certified hardware is hardware that Verisk has thoroughly tested.
General recommendations
This topic includes important recommendations for running Touchstone and Touchstone Re.
Model data disk space requirements
Verisk offers model data in two packages.
Deployment options
Various deployment options are available for a Touchstone or Touchstone Re installation.
Component summary
The images below summarize components involved in a Touchstone and a Touchstone Re installation.
Environment configurations
Deployment for a Touchstone and/or Touchstone Re environment.
Infrastructure requirements
Overview of infrastructure requirements necessary for installation.
Required Windows roles & features
Windows and the installation.
Proxy exceptions
Proxy settings and the installation.
Manage the Windows firewall
The Windows firewall impacts how components residing on different computers communicate.
Assigned ports
Assigned ports can be dynamic or static.
Disable user account control
For Touchstone and Touchstone Re to function properly, User Account Control needs to be disabled across all of the machines in the environment.
Manage antivirus software
Antivirus software should be turned off for Touchstone and Touchstone Re installations.
Group policy settings
In some scenarios group policies may override the antivirus exclusion, network card offload settings, and active scans on Verisk folders after the system reboots.