SolarWinds Knowledge Hub
IT Learning Made Simple: Guides and Glossary Definitions
Guides to Help You Build a Strong ITSM Foundation

Elevating IT Service Delivery With ITSM Best Practices
Discover essential ITSM best practices to assess your organization's maturity and drive continuous improvement.

Implementing ITSM Knowledge Management: A Best Practice Guide
Explore five ITSM knowledge management best practices to help IT teams effectively acquire and manage valuable knowledge.

ITSM Change Management Best Practices
In this guide, we discuss five ITSM change management best practices to enhance change processes in a digital environment.
Guides to Help You Build a Strong ITSM Foundation

ITSM Change Management Best Practices
In this guide, we discuss five ITSM change management best practices to enhance change processes in a digital environment.

Elevating IT Service Delivery With ITSM Best Practices
Discover essential ITSM best practices to assess your organization's maturity and drive continuous improvement.

Implementing ITSM Knowledge Management: A Best Practice Guide
Explore five ITSM knowledge management best practices to help IT teams effectively acquire and manage valuable knowledge.

ITSM Change Management Best Practices
In this guide, we discuss five ITSM change management best practices to enhance change processes in a digital environment.

Elevating IT Service Delivery With ITSM Best Practices
Discover essential ITSM best practices to assess your organization's maturity and drive continuous improvement.

Implementing ITSM Knowledge Management: A Best Practice Guide
Explore five ITSM knowledge management best practices to help IT teams effectively acquire and manage valuable knowledge.

ITSM Change Management Best Practices
In this guide, we discuss five ITSM change management best practices to enhance change processes in a digital environment.
Need help on your ITSM journey?
Essential Guides for Database Performance and Design

The Key Concepts of Database Optimization
Learn about database optimization techniques, including performance metrics, indexing, query optimization, normalization, caching, hardware and configuration, and monitoring, with practical examples to improve application efficiency and user experience.

The Key Stages of Database Schema Design
Learn about the key concepts and best practices in database schema design, including design stages, entity-relationship modeling, and normalization, to create efficient, scalable, and secure systems.

The Key Differences Between Clustered vs. Nonclustered Index
Learn the differences between clustered and nonclustered indexes, their structures, performance, and maintenance in relational databases, with practical examples using SQL Server.
Essential Guides for Database Performance and Design

The Key Differences Between Clustered vs. Nonclustered Index
Learn the differences between clustered and nonclustered indexes, their structures, performance, and maintenance in relational databases, with practical examples using SQL Server.

The Key Concepts of Database Optimization
Learn about database optimization techniques, including performance metrics, indexing, query optimization, normalization, caching, hardware and configuration, and monitoring, with practical examples to improve application efficiency and user experience.

The Key Stages of Database Schema Design
Learn about the key concepts and best practices in database schema design, including design stages, entity-relationship modeling, and normalization, to create efficient, scalable, and secure systems.

The Key Differences Between Clustered vs. Nonclustered Index
Learn the differences between clustered and nonclustered indexes, their structures, performance, and maintenance in relational databases, with practical examples using SQL Server.

The Key Concepts of Database Optimization
Learn about database optimization techniques, including performance metrics, indexing, query optimization, normalization, caching, hardware and configuration, and monitoring, with practical examples to improve application efficiency and user experience.

The Key Stages of Database Schema Design
Learn about the key concepts and best practices in database schema design, including design stages, entity-relationship modeling, and normalization, to create efficient, scalable, and secure systems.

The Key Differences Between Clustered vs. Nonclustered Index
Learn the differences between clustered and nonclustered indexes, their structures, performance, and maintenance in relational databases, with practical examples using SQL Server.
IT Terminology Glossary
The IT industry is chock full of its own lingo. Below are definitions for some of the most of the common words and terms in today's technology vocabulary.
A
What is an Access Control List?
An access control list is a list of permission rights used to assign roles and responsibilities.
Read Definition:Related Solution:What is Active Directory?
Active Directory is an important part of IT infrastructure. It can be used to manage devices, users, domains, and objects within a network.
Read Definition:Related Solution:What are Active Directory Groups?
Active Directory (AD) groups help keep a tab on the access permissions to various resources in your network, such as computers.
Read Definition:Related Solution:What Is Advanced Persistent Threat?
Advanced persistent threat (APT) is a planned, stealthy cyberattack that allows attackers to penetrate a company's network and stay inside for a prolonged duration to exfiltrate valuable information.
Read Definition:Related Solution:What is agentless monitoring?
Agentless monitoring helps you monitor your overall network health without deploying any third-party agent software.
Read Definition:Related Solution:What is AI in ITSM?
AI in IT Service Management (ITSM) is the use of artificial intelligence technologies, including machine learning, to automate and enhance IT service delivery and support processes. This includes employing AI tools to streamline tasks, improve efficiency, and provide better user experiences.
Read Definition:Related Solution:What Is Apache Cassandra Monitoring?
What you need to know about Apache Cassandra monitoring, its best practices, and more.
Read Definition:Related Solution:What is Application Performance Monitoring?
Application performance monitoring (APM) is a continuous process of monitoring the availability of mission-critical applications.
Read Definition:Related Solution:What Is Application Infrastructure?
Application infrastructure refers to all the software and hardware assets necessary for the smooth functioning of your application.
Read Definition:Related Solution:What Are Application Logs?
Learn about the significance of application logs in software development and how to conduct effective log analysis.
Read Definition:Related Solution:What is Application Pool in IIS?
IIS Application Pool is a logical collection of websites or applications served by one or multiple worker processes with the same configuration.
Read Definition:Related Solution:What Is AWS CloudTrail?
AWS CloudTrail is a service that tracks activity within an organization's AWS environment. Learn about CloudTrail features and benefits.
Read Definition:Related Solution:What Is AWS CloudWatch? Definition and Top Tips
Understand AWS CloudWatch and its key benefits
Read Definition:Related Solution:
A
Definitions | Quick Description | What We Offer |
|---|---|---|
An access control list is a list of permission rights used to assign roles and responsibilities. | ||
Active Directory is an important part of IT infrastructure. It can be used to manage devices, users, domains, and objects within a network. | ||
Active Directory (AD) groups help keep a tab on the access permissions to various resources in your network, such as computers. | ||
Advanced persistent threat (APT) is a planned, stealthy cyberattack that allows attackers to penetrate a company's network and stay inside for a prolonged duration to exfiltrate valuable information. | ||
Agentless monitoring helps you monitor your overall network health without deploying any third-party agent software. | ||
AI in IT Service Management (ITSM) is the use of artificial intelligence technologies, including machine learning, to automate and enhance IT service delivery and support processes. This includes employing AI tools to streamline tasks, improve efficiency, and provide better user experiences. | ||
What you need to know about Apache Cassandra monitoring, its best practices, and more. | ||
Application performance monitoring (APM) is a continuous process of monitoring the availability of mission-critical applications. | ||
Application infrastructure refers to all the software and hardware assets necessary for the smooth functioning of your application. | ||
Learn about the significance of application logs in software development and how to conduct effective log analysis. | ||
IIS Application Pool is a logical collection of websites or applications served by one or multiple worker processes with the same configuration. | ||
AWS CloudTrail is a service that tracks activity within an organization's AWS environment. Learn about CloudTrail features and benefits. | ||
Understand AWS CloudWatch and its key benefits |
B
Definitions | Quick Description | What We Offer |
|---|---|---|
Bandwidth consumption happens when a node connects to and exchanges information over a network. | ||
Learn about bandwidth management and bandwidth control. | ||
Learn about brute-force attacks, their types, and how to protect against them with strong passwords and multi-factor authentication (MFA). |
C
Definitions | Quick Description | What We Offer |
|---|---|---|
Learn about the benefits and importance of centralized log management. | ||
Discover the role of change agents in driving innovation and aligning IT with business goals. | ||
Classless Inter-Domain Routing (CIDR) refers to the standard process of efficiently allocating and organizing IP addresses across networks and devices. | ||
Cloud computing allows companies to rent software, data storage, and other IT resources instead of managing them in-house. | ||
Discover cloud monitoring, its benefits, and the top solutions for keeping a close eye on your cloud infrastructure. | ||
Read about collectd and its plug-in ecosystem | ||
Learn about the process, challenges, and best practices of compliance monitoring. | ||
Hardware refers to the external and internal devices and equipment that enable you to perform major functions such as input, output, storage, communication, processing, and more. | ||
Everything you need to know about configuration drift and more. | ||
A CMDB is a crucial part of the ITIL framework. It enables organizations to manage, control, and configure assets. | ||
A container is a lightweight package that includes code and dependencies together. | ||
Learn how Containerization works and what are its benefits | ||
CPU utilization indicates the amount of load handled by individual processor cores to run various programs on a computer. | ||
Serv-U FTP Server and Serv-U MFT Server can be integrated with third-party applications and shared databases. Check out more! | ||
Learn about cyber risk management and its importance. | ||
Cybersecurity refers to the practice of protecting networks, hardware, software, data, and confidential information from cyberthreats such as unauthorized access, theft, damage, or other malicious digital attacks by employing a comprehensive set of technologies and best practices. | ||
Cyberthreat intelligence provides critical knowledge about existing and evolving cyber threats and threat actors. |
D
Definitions | Quick Description | What We Offer |
|---|---|---|
Learn about data observability’s benefits, importance, and more. | ||
IT storage management, also called data storage management, involves tracking and streamlining the central component of big data that collects and retains digital information using computers and other devices. | ||
Database cardinality can be defined as the set of elements arranged in tables and rows. | ||
Database concurrency is a unique characteristic enabling two or more users to retrieve information from the database at the same time without affecting data integrity. | ||
An index offers an efficient way to quickly access the records from the database files stored on the disk drive. | ||
Database performance management system is designed to help admins more easily troubleshoot and resolve DBMS performance issues by monitoring performance and providing root-cause analysis of your database using multi-dimensional views to answer the who, what, when, where, and why of performance issues. | ||
Database monitoring offers the ability to gather essential database performance metrics to help optimize and tune database processes for high performance. | ||
It's the process of ensuring smooth and optimal database performance by using varied techniques, tools, and best practices. | ||
In everyday language, a query is simply a request for information. Similarly, the meaning of a query in database management is a request for data. If you need to access, manipulate, delete, or retrieve data from your relational database, you’ll need a database query written using a specific syntax. | ||
A database schema refers to the logical and visual configuration of the entire relational database. | ||
Database software helps streamline database management by ensuring seamless data storage, monitoring, backup, recovery, and reporting. | ||
A database is a collection of business-critical data organized to ensure the relevant information is easily accessible and manageable. | ||
DDI is an abbreviated term that refers to the amalgamation of DNS, DHCP, and IP Address Management into a single service or solution. | ||
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the regular traffic of a server, service, or network. | ||
DHCP intelligently manages IP address allotment and renewal activities in a network. | ||
Distributed tracing is vital to manage the performance of applications that use microservices and containerization | ||
Dive into the details of the DNS hierarchy from root servers to subdomains and learn how it simplifies internet navigation and domain resolution. | ||
Learn what DNS resolution is, how it works, the types of DNS servers involved, and why it’s essential for internet connectivity. | ||
A domain controller is a server computer that authenticates and validates user access on a network. |
E
Definitions | Quick Description | What We Offer |
|---|---|---|
A technique commonly used in phishing attacks and spam to trick users by sending emails from a forged sender address. | ||
End-user network experience monitoring allows teams to assess the impact of network performance on end users' experiences. | ||
Enterprise network refers to the physical, virtual, or logical connectivity of the organization’s users, devices, systems, and applications. | ||
Learn about ESM’s importance, objectives, and best practices. |
F
Definitions | Quick Description | What We Offer |
|---|---|---|
File integrity is a security mechanism that analyzes critical system files to check unauthorized modifications and cyberattacks. | ||
File-sharing security is all about utilizing the right set of file security tools, transfer protocols, and procedures while exchanging sensitive business documents inside or outside the company network. | ||
File transfer protocol server (commonly known as FTP Server) is computer software that facilitates the secure exchange of files over a TCP/IP network. | ||
Full stack observability involves monitoring and managing your entire technology stack’s performance, health, and security. |
G
Definitions | Quick Description | What We Offer |
|---|
H
Definitions | Quick Description | What We Offer |
|---|---|---|
Help desk software helps streamline and simplify processes to save time and improve efficiency for troubleshooting end-user requests. | ||
High availability indicates a system's capability of being resilient to known or unknown failures. | ||
HTTP is a standard protocol enlisting the recommended guidelines and procedures for exchanging information over the internet. | ||
Learn about hybrid cloud solutions, architecture, and benefits. | ||
Hyper-V is a Microsoft virtualization product allowing you to create and run multiple VMs on a physical host. |
I
Definitions | Quick Description | What We Offer |
|---|---|---|
Internet Information Services, also known as IIS, is a Microsoft web server that runs on Windows operating system and is used to exchange static and dynamic web content with internet users. | ||
What you need to know about incident response, how it works, and more. | ||
SQL Server index fragmentation is an overarching problem arising from an excessive number of alterations in the database. | ||
Learn how IT infrastructure management optimizes business operations, security, and scalability. | ||
An insider threat is a user with authorized access to sensitive company assets or data who may misuse their access rights to compromise the organization's security. | ||
Internet of things (IoT) refers to the network of smart devices embedded with sensors, software, or any other technology to exchange data over the internet. | ||
IPv6 is the revised version of the Internet protocol designed to overcome the IPv4 limitations and address exhaustion problem. | ||
IT assets are the integral components of the organization's IT environment used for storage, management, control, display, data transmission, and more. | ||
Learn about what change management is, its best practices, and the types employed by organizations. | ||
IT incident refers to an unexpected event that disrupts business operational processes or reduces the quality of a service. | ||
Learn about the role, importance, and best practices of ITOM. | ||
IT risk management involves procedures, policies, and tools to identify and assess potential threats and vulnerabilities in IT infrastructure. | ||
ITIL is a set of best practice guidelines focused on aligning the delivery of IT services with business goals. | ||
Defined in the IT infrastructure library, the IT service catalog is an organized repository of an organization’s active IT servicesend users can request and use efficiently. It falls under the ambit of the IT service portfolio, which provides more in-depth insights into a company's IT services, including active and retired services and products, as well as products currently in the production pipeline. | ||
IT service management (ITSM) is the set of processes and activities involved in planning, designing, delivering, managing, and maintaining IT services. | ||
ITSM service portal brings end-user queries from multiple sources into a single interface or shared repository allowing support agents to collaborate and resolve them effectively. |
J
Definitions | Quick Description | What We Offer |
|---|
K
Definitions | Quick Description | What We Offer |
|---|---|---|
A knowledge base is an organized repository of information, resources, and solutions designed to help users find answers to common questions, troubleshoot issues, and gain insights without direct assistance. | ||
Understand what knowledge management is and how it can benefit your organization. |
L
Definitions | Quick Description | What We Offer |
|---|---|---|
Linux® server refers to a specific type of server based on the free, open-source, and modular Linux operating system. | ||
Log management is a continuous process of centrally collecting, parsing, storing, analyzing, and disposing of data to provide actionable insights for supporting troubleshooting, performance enhancement, or security monitoring. | ||
Learn everything you need to know about log monitoring. |
M
Definitions | Quick Description | What We Offer |
|---|---|---|
What is MFT transfer? What are the advantages of this protocol, and what tools make it possible to transfer files via MFT. | ||
MariaDB is a secure enterprise database system using pluggable storage engines to store and manage different types of data. | ||
Find out about MFT vs. SFTP, including their key differences, common use cases, and which one is right for you. | ||
MIB is an organized, up-to-date repository of managed objects for identifying and monitoring SNMP network devices. | ||
MySQL is a popular open-source enterprise database solution that relies on the relational data model for data storage and management operations. |
N
Definitions | Quick Description | What We Offer |
|---|---|---|
Network access control (NAC) can be defined as the set of rules, protocols, and processes that govern access to network-connected resources such as network routers, conventional PCs, IoT devices, and more. | ||
Network activity monitoring helps identify bottlenecks impacting overall network performance, health, and uptime. | ||
Network administration aims to manage, monitor, maintain, secure, and service an organization’s network. | ||
A network administrator proactively identifies and resolves a computer network's security, reliability, and performance issues. | ||
Network automation is the process of automating the management of a network’s physical and virtual devices using software to maximize efficiency. | ||
Network availability, also referred to as network uptime, denotes the overall duration for which the clients can seamlessly access the resources, such as servers and printers, available on a computer network.. | ||
Network Backup is the process of replicating business-critical data to ensure data is always available. | ||
Network bandwidth is the maximum possible amount of data transfer between two points of a network in a specific time. | ||
Network capacity quantifies the maximum amount of data that can be transmitted over a network from one point to another. | ||
Network configuration compliance refers to implementing the proper controls, policies, and device settings to safeguard your network from attackers and comply with the latest industry requirements for standards like HIPAA and PCI DSS. | ||
Network configuration refers to the organization, governance, and maintenance of a network with the right set of controls and policies. | ||
Network congestion refers to the reduced quality of service that occurs due to overloaded network nodes or links. | ||
Network device identification, also known as device discovery, is the process of finding network equipment and gathering detailed information about them, such as device status, response time, and IP address. | ||
Network devices facilitate data transmission and manage digital connections on a computer network. | ||
Network discovery is a process of finding devices that also allows systems and nodes to connect and communicate on the same network. This helps network administrators locate devices, create network maps, organize device inventories, enforce accurate device access policies, and gain better control of the infrastructure. Network discovery also helps to find static, dynamic, reserved, and abandoned IP addresses. | ||
Network downtime is a specific period for which the network is inaccessible. This could be due to multiple reasons such as an outage, failure of equipment, and ongoing maintenance or upgrade activities. | ||
Network infrastructure is a set of software and hardware components that help build, run, and maintain an IT network. | ||
Network metrics are qualitative and quantitative ways to observe and determine network behavior. | ||
Network monitoring is a critical IT process to discover, map, and monitor computer networks and network components, including routers, switches, servers, firewalls, and more. | ||
A network node can be defined as the connection point among network devices such as routers, printers, or switches that can receive and send data from one endpoint to the other. | ||
Network optimization leverages a variety of strategies, tools, and programs to improve network performance. | ||
Network protocols are a set of rules outlining how connected devices communicate across a network to exchange information easily and safely. | ||
A network sniffer is a tool that captures and analyzes data packets as they travel across a computer network. | ||
Network topology offers a diagrammatic explanation of the logical and physical setup of different components, such as routers and switches, in a network. | ||
Network traffic management is the practice of controlling and optimizing how data moves through a network to ensure smooth performance, avoid network congestion, and maintain overall network health. It involves several techniques, such as prioritizing important data, balancing the load more evenly across servers, and setting specific limits on data flow to prevent bottlenecks. | ||
Learn about the significance of network traffic monitoring for a more efficient IT environment. | ||
Network troubleshooting is the process of measuring, identifying, and resolving network-related issues. It’s also defined as a logical process network engineers follow to improve the overall network operations. | ||
Network visibility means monitoring and understanding all network activities in real-time to ensure smooth, secure, and efficient operations. | ||
Network visualization allows you to pictographically showcase the network architecture, including device arrangement and data flows. | ||
Learn how to monitor NGINX with metrics, logging, and insights. | ||
NoSQL databases store and retrieve information in a nontabular format, unlike relational databases. |
O
Definitions | Quick Description | What We Offer |
|---|---|---|
Observability is the measurement of a system's internal state determined from its external outputs. | ||
An observability pipeline, or a telemetry pipeline, is a system that helps gather, process, and send data from various sources to the right tools. | ||
OpenTelemetry is an open-source observability framework for standardizing the collection and export of telemetry data. | ||
An operating system (OS) facilitates the interaction between a user and the computer hardware components while offering an environment to manage and control the execution of software applications. | ||
An Oracle database is a fully configurable and scalable enterprise database solution that uses a relational model for information management. | ||
OSI layers enable standardized, reliable communication between two or more network devices. |
P
Definitions | Quick Description | What We Offer |
|---|---|---|
Packet loss occurs when a network packet fails to reach its expected destination, resulting in information loss. | ||
Simplify and automate patch management | ||
Packet capture is a networking practice involving the interception of data packets travelling over a network. | ||
Ping is a command-line program designed to allow network admins to track the availability status of different devices in a network. | ||
Discover what PostgreSQL is, its features, functions, and more. | ||
Learn how problem management enhances IT reliability and improves service delivery. | ||
What you need to know about protocol analyzers, their benefits, and more. |
Q
Definitions | Quick Description | What We Offer |
|---|---|---|
A collection of technologies that help efficiently manage network traffic by setting priorities for critical resource-intensive applications within the network. |
R
Definitions | Quick Description | What We Offer |
|---|---|---|
Real user monitoring (RUM), also known as end-user experience monitoring, provides visibility into real-time problems affecting the experience users have while navigating your website. | ||
A relational database allows you to easily find, scan, and sort specific information based on the relationship among the different fields defined within a table. | ||
Remote access is built to help connect and gain access to internal network resources, such as IT services, data, and applications, from any location. | ||
Remote Desktop Protocol (RDP) enables users to remotely access and control physical and virtual devices running on Windows. | ||
Remote desktop services (RDS) is a technology that enables users to connect to a remote computer's desktop and programs over a network connection. This allows users to work on a laptop far from the desktop as long as they have internet access and the right log-in credentials. With this technology, an IT department can manage, troubleshoot, update, and maintain various computers remotely and centrally. | ||
Learn about remote monitoring and management, its benefits, and more. | ||
A reverse proxy facilitates seamless communication in a client-server architecture with intelligent traffic routing, filtering, and distribution. | ||
Role-based access control (RBAC) is a method of protecting sensitive data from improper modification, addition, or deletion. | ||
Read about root cause analysis, its methods and benefits. |
S
Definitions | Quick Description | What We Offer |
|---|---|---|
SD-WAN is a software-based network technology that offers a modern, flexible, and more effective way to administer wide-area networks. | ||
Discover what secure remote access is, key strategies, and more. | ||
Explore the essential role of servers, from web and email to database and application services, in supporting modern digital infrastructure. | ||
Server infrastructure consists of physical and virtual resources, along with hardware, software, network resources, to support the management of servers in an IT environment. | ||
Dive into the essentials of serverless architecture, from its core concepts and benefits to the challenges and comparisons with other models. | ||
A Service Desk is the central point of contact between IT and end-users within an organization. It supports the entire IT service management (ITSM) lifecycle, handling incidents, service requests, problems, and changes to ensure that IT services align with business needs. The ultimate goal of a service desk is to drive productivity and satisfaction across the organization by delivering high-quality IT services. | ||
A Service Level Agreement (SLA) is a documented agreement between the client and the service provider regarding the specific and measurable aspects of service offerings, including quality, responsibility, and availability. | ||
Learn what service level objectives are, how they work, and why they are vital for ensuring reliable, high-quality IT services. | ||
Learn about SFTP vs. FTPS, their differences, common use cases, and more | ||
SharePoint permissions are access controls that allow you to restrict user rights to ensure SharePoint assets are safe and protected. | ||
Security Information and Event Management (SIEM) consolidates Security Information Management (SIM) for real-time aggregation and analysis of log data and Security Event Management (SEM). | ||
SNMP is a networking protocol used to monitor network devices. | ||
SNMP traps are unrequested notifications an SNMP agent of a managed device sends to an SNMP manager in the network. | ||
SNMP walk is an SNMP application that uses SNMP GETNEXT requests to collect SNMP data from network and infrastructure SNMP-enabled devices, such as switches and routers. | ||
Learn more about software-defined networking (SDN), including how it works, implementation, benefits, and differences between SDN and traditional networking. | ||
SQL database or relational database is a collection of highly structured tables, wherein each row reflects a data entity, and every column defines a specific information field. | ||
SQL performance tuning, or performance tuning, is checking and resolving issues potentially affecting the efficiency of a SQL database. | ||
SQL Server is a relational database management system used to store, manage, and retrieve data efficiently. | ||
This Windows service executes scheduled jobs in SQL Server. | ||
SQL Server Analysis Services (SSAS) is a multidimensional online analytical processing (OLAP) server and an analytics engine used for data mining. It allows IT professionals to break up large volumes of data into more easily analyzed parts. A component of Microsoft SQL Server, it helps enable analysis by organizing data into easily searchable cubes. | ||
Learn about SSH, its history, key security features, and how to set it up for secure remote access and file transfers. | ||
SFTP (SSH File Transfer Protocol) allows for the secure transfer of files over remote systems. | ||
SQL Server Integration Services (SSIS) is a Microsoft SQL server database built to be a fast and flexible data warehousing tool to perform high-performance data integrations. | ||
SSL certificates are small data files designed to strengthen the overall website security through strong encryption and identity verification methods. | ||
Track the performance and capacity of your storage arrays with Storage Resource Monitoring (SRM) to keep tabs on any storage-related issues slowing your system down. | ||
Subnetting is the process of logically dividing an IP network into more subnetworks. | ||
Synthetic monitoring, also known as active monitoring, runs automated scripts that simulate the real user actions or behavior to identify and fix the website availability, performance, and functionality issues before end users notice them. | ||
System Logging Protocol facilitates the transfer of information from network devices to a central server, known as syslog server, in a particular message format. | ||
Learn about the structure, types, and importance of the syslog format. | ||
Explore syslog severity levels and their importance in log management. | ||
Understand the difference between Syslog Server and SIEM solution. |
T
Definitions | Quick Description | What We Offer |
|---|---|---|
What you need to know about T-SQL and its functions. |
U
Definitions | Quick Description | What We Offer |
|---|---|---|
Uptime is a metric used to measure the availability of a website or business application. |
V
Definitions | Quick Description | What We Offer |
|---|---|---|
A virtual machine is an emulation of a computer system that shares the resources of its host server. | ||
Virtualization technology creates simulated environments based on physical systems to enable optimal and flexible resource utilization. | ||
A virtual local area network (VLAN) is a virtualized connection that connects multiple devices and network nodes from different LANs into one logical network. | ||
Vulnerability investigation or assessment is a systematic approach to identify the security loopholes or weak points in your IT infrastructure and take active measures to resolve them quickly. |
W
Definitions | Quick Description | What We Offer |
|---|---|---|
A web server is a computer system capable of delivering web content to end users over the internet via a web browser. | ||
Website monitoring is a comprehensive approach to monitor a website or web service by tracking critical performance indicators to ensure consistent availability and seamless user experience. | ||
A Wi-Fi heat map is a visual representation of Wi-Fi signal strength that provides visibility into your network and coverage. | ||
The Windows event log records specific events related to the system, security, and applications on a Microsoft system. | ||
Windows Server is a group of operating systems to support enterprises and small and medium-sized businesses with data storage, communications, and applications. | ||
Learn more about workflow automation, automated workflow software, and the benefits to organizations after implementing such solutions. | ||
WSUS is also known as Windows Server Update Services, and its first version is called Server Update Services (SUS). It helps distribute updates, fixes, and other types of releases available from Microsoft Update. |
X
Definitions | Quick Description | What We Offer |
|---|
Y
Definitions | Quick Description | What We Offer |
|---|
Z
Definitions | Quick Description | What We Offer |
|---|---|---|
Learn more about Zero Trust, including how it works, its architecture, and the benefits of a Zero Trust security model. |