SolarWinds Knowledge Hub
IT Learning Made Simple: Guides and Glossary Definitions
Guides to Help You Build a Strong ITSM Foundation

Elevating IT Service Delivery With ITSM Best Practices
Discover essential ITSM best practices to assess your organization's maturity and drive continuous improvement.

Implementing ITSM Knowledge Management: A Best Practice Guide
Explore five ITSM knowledge management best practices to help IT teams effectively acquire and manage valuable knowledge.

ITSM Change Management Best Practices
In this guide, we discuss five ITSM change management best practices to enhance change processes in a digital environment.
Need help on your ITSM journey?
Essential Guides for Database Performance and Design

The Key Concepts of Database Optimization
Learn about database optimization techniques, including performance metrics, indexing, query optimization, normalization, caching, hardware and configuration, and monitoring, with practical examples to improve application efficiency and user experience.

The Key Stages of Database Schema Design
Learn about the key concepts and best practices in database schema design, including design stages, entity-relationship modeling, and normalization, to create efficient, scalable, and secure systems.

The Key Differences Between Clustered vs. Nonclustered Index
Learn the differences between clustered and nonclustered indexes, their structures, performance, and maintenance in relational databases, with practical examples using SQL Server.
A
What is an Access Control List?
An access control list is a list of permission rights used to assign roles and responsibilities.
Read Definition:What We Offer:What is Active Directory?
Active Directory can be used for the management of user permissions and access rights.
Read Definition:What We Offer:What are Active Directory Groups?
Active Directory (AD) groups help keep a tab on the access permissions to various resources in your network, such as computers.
Read Definition:What We Offer:What Is Advanced Persistent Threat?
Advanced persistent threat (APT) is a planned, stealthy cyberattack that allows attackers to penetrate a company's network and stay inside for a prolonged duration to exfiltrate valuable information.
Read Definition:What We Offer:What is agentless monitoring?
Agentless monitoring helps you monitor your overall network health without deploying any third-party agent software.
Read Definition:What We Offer:What is AI in ITSM?
AI in IT Service Management (ITSM) is the use of artificial intelligence technologies, including machine learning, to automate and enhance IT service delivery and support processes. This includes employing AI tools to streamline tasks, improve efficiency, and provide better user experiences.
Read Definition:What We Offer:What Is Apache Cassandra Monitoring?
What you need to know about Apache Cassandra monitoring, its best practices, and more.
Read Definition:What We Offer:What is Application Performance Monitoring?
Your complete guide to APM concepts, capabilities, tools, and more.
Read Definition:What We Offer:What Is Application Infrastructure?
Application infrastructure refers to all the software and hardware assets necessary for the smooth functioning of your application.
Read Definition:What We Offer:What Are Application Logs?
Learn about the significance of application logs in software development and how to conduct effective log analysis.
Read Definition:What We Offer:What is Application Pool in IIS?
It’s a logical collection of websites or applications served by one or multiple worker processes with the same configuration.
Read Definition:What We Offer:What Is AWS CloudTrail?
AWS CloudTrail is a service that tracks activity within an organization's AWS environment. Learn about CloudTrail features and benefits.
Read Definition:What We Offer:What Is AWS CloudWatch? Definition and Top Tips
Amazon CloudWatch is a monitoring, observability, and management service designed specifically for site reliability engineers (SREs), IT, and DevOps teams.
Read Definition:What We Offer:
A
Term | Description | Solution |
|---|---|---|
An access control list is a list of permission rights used to assign roles and responsibilities. | ||
Active Directory can be used for the management of user permissions and access rights. | ||
Active Directory (AD) groups help keep a tab on the access permissions to various resources in your network, such as computers. | ||
Advanced persistent threat (APT) is a planned, stealthy cyberattack that allows attackers to penetrate a company's network and stay inside for a prolonged duration to exfiltrate valuable information. | ||
Agentless monitoring helps you monitor your overall network health without deploying any third-party agent software. | ||
AI in IT Service Management (ITSM) is the use of artificial intelligence technologies, including machine learning, to automate and enhance IT service delivery and support processes. This includes employing AI tools to streamline tasks, improve efficiency, and provide better user experiences. | ||
What you need to know about Apache Cassandra monitoring, its best practices, and more. | ||
Your complete guide to APM concepts, capabilities, tools, and more. | ||
Application infrastructure refers to all the software and hardware assets necessary for the smooth functioning of your application. | ||
Learn about the significance of application logs in software development and how to conduct effective log analysis. | ||
It’s a logical collection of websites or applications served by one or multiple worker processes with the same configuration. | ||
AWS CloudTrail is a service that tracks activity within an organization's AWS environment. Learn about CloudTrail features and benefits. | ||
Amazon CloudWatch is a monitoring, observability, and management service designed specifically for site reliability engineers (SREs), IT, and DevOps teams. |