Put our resources to work, for you.

Information and insights to help you get more from SolarWinds

Popular Search:

ObservabilityNetwork Monitoring
filter
Featured resources
eBook: Five Pillars of Modern IT Management for US Defense

This document provides an introduction to SolarWinds services for US Defense. As agencies move toward "Zero Trust" security models and navigate the complexities of "Secure by Design" initiatives.

Read eBook
eBook: Ultimate Guide to ITSM Maturity
eBook: Ultimate Guide to ITSM Maturity

Modernize IT operations with a strategic roadmap. This guide breaks down the five pillars of ITSM maturity—Incidents, Assets, Experience, Services, and Changes—to move your team from firefighting to operational excellence. 

Read eBook
Qore Tech: Unifying African Fintech via SolarWinds

Ayobami Ishola, Lead Network Ops at Qore Technologies, says SolarWinds fixed their lack of real-time visibility. Key wins: automated alerts, faster response, and easy deployment with Ha-Shem Limited. He highly recommends its scalability for all IT teams.

Watch Video
What is SQL Server Agent?

This Windows service executes scheduled jobs in SQL Server.

Read IT Glossary
What is Network Traffic Management?

Network traffic management is the practice of controlling and optimizing how data moves through a network to ensure smooth performance, avoid network congestion, and maintain overall network health.

Read IT Glossary
What is Workflow Automation?

Learn more about workflow automation, automated workflow software, and the benefits to organizations after implementing such solutions.

Read IT Glossary
What Is Incident Response?

What you need to know about incident response, how it works, and more.

Read IT Glossary
What Is a DDoS Attack?

A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt the regular traffic of a server, service, or network.

Read IT Glossary
What Is Knowledge Management in ITSM?

Understand what knowledge management is and how it can benefit your organization.

Read IT Glossary
What Are the Key Differences Between SFTP and FTPS?

Learn about SFTP vs. FTPS, their differences, common use cases, and more

Read IT Glossary
What Is collectd?

collectd is a Unix daemon written in C language, and it’s designed to collect metrics pertaining to system resources and application performance.

Read IT Glossary
What Is Full Stack Observability?

Full stack observability involves monitoring and managing your entire technology stack’s performance, health, and security.

Read IT Glossary
What Is an Observability Pipeline?

An observability pipeline, or a telemetry pipeline, is a system that helps gather, process, and send data from various sources to the right tools.

Read IT Glossary
Serv-U Integration and Customization

Serv-U FTP Server and Serv-U MFT Server can be integrated with third-party applications and shared databases. Check out more!

Read IT Glossary
What Is Cloud Monitoring?

Discover cloud monitoring, its benefits, and the top solutions for keeping a close eye on your cloud infrastructure.

Read IT Glossary
What Are Service Level Objectives (SLOs )?

Learn what service level objectives are, how they work, and why they are vital for ensuring reliable, high-quality IT services.

Read IT Glossary
From Code to Control: A Practical Guide to Unifying Change and Incident Management

Connect your change and incident management processes to reduce outages and lower risk. This guide provides a blueprint for safe deployments and rapid incident response using a unified ITSM platform.

View Whitepaper
AI-Powered Operational Resilience: The Path to an Autonomous IT Future

SolarWinds® AI helps IT teams anticipate issues, automate responses, and improve resilience. Learn how unified AI tools reduce noise, prevent downtime, and support strategic work across observability, databases, and incident response.

Learn More
How Observability Solves Key IT Challenges in K-12 Education

Staffing constraints, cybersecurity threats, and tool proliferation are making IT increasingly difficult for schools and districts to manage and secure. Technology can help ease those challenges and streamline operations.

View Whitepaper
SolarWinds MSP partner 3GLA converts leading LATAM bank to SolarWinds Observability Self-Hosted

SolarWinds MSP partner 3GLA works with a leading LATAM bank to integrate a flexible solution that seamlessly integrates with their existing systems, apps, technologies, and future solutions.

Learn More
Breathing Life into Healthcare Data

Accessing and analyzing data efficiently is critical for healthcare organizations and health agencies to deliver optimal patient care, maintain security, and drive innovation. Download this whitepaper to learn more about the complexities of healthcare data modernization and the importance of Observability solutions.

View Whitepaper
See How SolarWinds Observability Enables You to Observe Everything in Your IT Environment

Watch SolarWinds Day, where you’ll experience how SolarWinds is solving what others can’t – abstracting complexity, increasing visibility, and automating remediation across on-prem, hybrid, and cloud-native estates.

Watch Webcast
Observability Is the Answer to Growing IT Complexity in Higher Education

In an era when IT teams are continually tasked with doing more with less, observability tools provide a unified view into campus systems—as well as help identify and remediate incidents and ensure that operations run smoothly.

View Whitepaper
Discover Why SolarWinds is a Leader in the 2024 GigaOm Radar for Cloud Observability

SolarWinds named a leader in the 2024 GigaOm Radar for Cloud Observability

View Whitepaper
Delivering Application Performance in a Hybrid World

This GigaOm survey, of 352 senior and technical decision makers across North America and Western Europe, assessed architectures, challenges, and approaches to building and managing performant applications.

View Survey
Distributed Cloud Series: Observability and Demystifying AIOps.

We surveyed 374 IT and DevOps/AppDev professionals to gain insights into observability trends. Read this eBook to learn about:

Most impactful benefits of observability

Biggest challenges when deploying observability.

Biggest challenges when using observability in production.

Learn More
SolarWinds Observability – Self-Hosted or SaaS Datasheet

SolarWinds® Observability delivers expanded monitoring and management of both on-premises and cloud environments, leveraging AIOps-powered capabilities to help accelerate issue remediation.

View Datasheet
Distributed Cloud Series: Observability and Demystifying AIOps.

Do you know that 85% of organizations with observability practices use six or more tools to collect data from their application environment? TechTarget’s Enterprise Strategy Group recently surveyed IT and DevOps/AppDev professionals.

View Infographic
State of ITSM Report: Are You Keeping Pace?

Compiled from a normalized sample of our customer base. This report encompasses over 2,000 ITSM systems, and over 60,000 aggregated and anonymized data points from July 1, 2023, to July 31, 2024. Users of IT Service Management tools will gain  valuable, actionable insights from the report.

Learn More
UK Next-Gen Government IT: AI and Observability Insights

SolarWinds partnered with Market Connections to create a report and AI, observability, and cybersecurity. The initial survey targeted 100 public sector counterparts in the U.K.

Learn More
US Next-Gen Government IT: AI and Observability Insights

SolarWinds partnered with Market Connections to survey 200 U.S. IT decision-makers and influencers from Federal, State & Local, and Education sectors.

Learn More
Exclusive First Look: 2025.1 GA Release of SolarWinds Observability Self-Hosted and Orion Modules

Join product leaders from SolarWinds for an exclusive preview of the latest features in SolarWinds® Observability Self-Hosted and Orion® modules. Learn exactly how to use this solution to transform your operations.

Watch Webcast
From Observability to Operational Resilience: Connecting IT and Business

Learn why companies struggle to align IT and business objectives despite abundant monitoring tools and observability platforms. Discover an approach that unifies and streamlines IT operations by integrating service management and observability.

Learn More
The Hidden Costs of Disconnected IT

Learn why businesses must align people, processes, and technology to thrive. This alignment not only improves day-to-day operations but also ensures the organization can withstand disruptions and adapt to future challenges. Deep dive into key strategies for achieving alignment.

View Whitepaper
SolarWinds Service Desk Customer Report

See how customers feel about the benefits of using SolarWinds Service Desk from improvement in time to resolution to building a better end-user experience.

View Survey
Customer Transformations – Powered by SolarWinds

SolarWinds gives organizations the power to accelerate transformation, regardless of the size or complexity of their business.

Don’t take our word for it — See how businesses just like yours have used the power of SolarWinds to drive success.

Learn More
SolarWinds Day—The Era of Operational Resilience

Join our virtual event to discover new observability, database, and service management capabilities that enhance operational resilience. Explore Generative AI upgrades for smarter root cause analysis and automation. Plus, hear expert insights from Enterprise Strategy Group’s Torsten Volk.

Watch Webcast
Discover why OpenTelemetry is the new standard for observability data collection.

Find out how OpenTelemetry is benefiting organizations worldwide. Prepared for SolarWinds by EMA this report is based on insights from 400 respondents across industries, and examines the perception, adoption, usage, and future of OpenTelemetry.

View Whitepaper
See What’s New in 2025.2!

The 2025.2 release of SolarWinds Observability Self-Hosted features improved cloud monitoring, PoE monitoring, enhanced app component monitoring, recurring maintenance windows, wireless dashboard upgrades, increased poller scalability, and more.

Watch Webcast
SQL Best Practices

In this 45-minute session, Technical Evangelist, Database at SolarWinds, Kevin Kline, teaches critical techniques to transform database efficiency. Learn how to write SQL SELECT statements for maximum efficiency.

Watch Webcast
Explore the Future of Network Observability: GigaOm Radar 2025

The GigaOm Radar for Network Observability evaluates leading network observability solutions highlighting their key capabilities, strengths, and areas for improvement. The report helps organizations choose the right network observability tools.

Learn More
Beyond Orion Modules: Transitioning to SolarWinds SolarWinds Observability Self-Hosted

Explore SolarWinds Observability Self-Hosted in an exclusive on-demand webcast. You will discover how easy it is to upgrade from your existing Orion modules, learn about the more flexible node-based licensing model, delve into AIOps features and security Observability, as well as get expert insights to elevate your IT strategy.

Watch Webcast
SolarWinds Observability Self-Hosted Enables Consolidated IT Service After Merger

After a merger, a global law firm needed to consolidate multiple environments and IT solutions. See how SolarWinds partner Prosperon Networks helped the organization adopt SolarWinds Observability Self-Hosted.

Learn More
Unlocking The Future of Observability

Find out how OpenTelemetry is benefiting organizations worldwide. Prepared for SolarWinds by EMA this report is based on insights from 400 respondents across industries, and examines the perception, adoption, usage, and future of OpenTelemetry.

Watch Webcast
SolarWinds Joins the 2025 Gartner® Magic Quadrant™ for Observability Platforms

SolarWinds Joins the 2025 Gartner® Magic Quadrant™ for Observability Platforms. Find out why SolarWinds Observability was recognized in the report for our flexible self-managed and SaaS capabilities.

Learn More
Improve ITSM with Practical Self-Service Portal Strategies

Learn how to build a high-impact portal with a searchable knowledge base, automated workflows, and AI-powered virtual agents.

Learn More
Optimize ITSM Efficiency with SLA Driven Service Management

In this free eBook you’ll discover how IT service providers use SLAs to prioritize IT service delivery.

Learn More
Introduction to SolarWinds Plan Explorer: SQL Query Tuning Done Right

Quickly find and fix SQL Server query performance issues with ease

Watch Video
Maximizing Efficiency Through Integrated ITSM Strategies

Learn how to align IT services with business goals, overcome implementation challenges, and stay ahead of future trends like AI, DevOps integration, and cloud evolution.

Learn More
Optimizing Database Performance

A practical guide for DBAs and IT pros to optimize relational databases. Learn best practices in indexing, SQL tuning, execution plans, and observability in today’s hybrid IT environments.

Learn More
Council transforms IT culture and earns 95% satisfaction with help from SolarWinds Service Desk

Central Bedfordshire Council transformed IT from low trust to a 95%+ satisfaction rate with SolarWinds Service Desk. By combining modern ITSM with cultural change, they boosted visibility, automation, and service quality across departments.

Learn More
Incident Response by Squadcast Datasheet

AI-powered unified incident response solution for engineering and support teams to bring alerts into one place and manage incidents from consolidation to resolution.

View Datasheet
Observability Masterclass Session 2: Go from Uh-Oh to All-fixed in the Age of Alert Fatigue

Learn how to cut through alert fatigue with intelligent incident response. This master class shows how to reduce noise, map dependencies, and triage smarter—so your team can focus on what matters and resolve issues faster with Squadcast.

Watch Webcast
Smarter Infrastructure, Stronger Outcomes: IDC Public Sector Resilience Report 2025

The SolarWinds 2025 IT Trends Report provides insights into operational resilience, surveying over 600 IT leaders from various roles, experience levels, and global regions. It highlights the challenges and strategies for staying agile in 2025.

Learn More
Increasing Productivity in Your IT Environment with SolarWinds Observability Self-Hosted

Troubleshooting complex IT problems can consume your financial and physical resources. Read this whitepaper to learn how SolarWinds Observability Self-Hosted (formerly known as Hybrid Cloud Observability) delivers end-to-end visibility and leverages artificial intelligence for IT operations (AIOps) to accelerate root cause identification and remediation.

View Whitepaper
Getting Started with Network Topology Mapper (NTM)

Introductory walkthrough of SolarWinds Network Topology Mapper (NTM), covering scan setup, device discovery via SNMP/WMI/VMware, and map customization. Ideal for showcasing core functionality to new users.

Watch Video
How SolarWinds Observability Delivers ROI: Cut Costs, Reduce Incidents, and Improve MTTR

Manage your complex hybrid infrastructure and consolidate tools with confidence. This visual guide helps you quantify the value of full-stack observability, explaining how it can save you money while boosting operational control and customer satisfaction.

View Infographic
Big Brothers Big Sisters of America Unifies Nationwide IT and Cuts Resolution Time by 40% With SolarWinds Service Desk

Big Brothers Big Sisters of America unified nationwide IT and cut resolution time by 40% with SolarWinds Service Desk. They replaced disparate tools to gain visibility, centralize support, and provide faster, proactive service for thousands of users.

Learn More
Operational Resilience in 2025: Global and Regional IT Trends — North America

Join us for Operational Resilience in 2025: Global and Regional IT Trends, a 30-minute webcast where we’ll reveal key findings from Fragile to Agile: The State of Operational Resilience—including exclusive regional insights.

Watch Webcast
State of ITSM Report 2025: Measuring the AI Effect on Resolution Efficiency

Explore the 2025 State of ITSM report to uncover how generative AI impacts resolution efficiency. Get data-driven insights, ROI benchmarks, and strategies to close the AI performance gap.

Learn More
SolarWinds Day: The Future of IT Has Arrived

SolarWinds Day is now available on demand - See how SolarWinds AI predicts issues before they strike. Watch the Keynote for major updates, then dive into THWACKcamp sessions with experts on optimizing systems, managing databases, resolving tickets, and hybrid IT operations.

Watch Webcast
How Observability Solutions Support Proactive IT Strategies in Government

The whitepaper discusses Observability Solutions for Proactive IT management, detailing strategies and tools for effective system monitoring.

View Whitepaper
Effortless ITSM: Crush Your SLAs with AI, Automation, and UX

In this Webcast, SolarWinds will dive deeper into how you can leverage artificial intelligence, automation, and modern user experience to crush your SLAs and ensure exceptional service delivery every time.

Watch Webcast
Operational Resilience in 2025: Global and Regional IT Trends—EMEA

Operational resilience isn't just a buzzword; it's a critical component of a healthy business. Join Operational Resilience in 2025: Global and Regional IT Trends, a 30-minute session to learn the biggest barriers to resilience and how to overcome them.

Watch Webcast
Operational Resilience in 2025: Global and Regional IT Trends—APJ

Join Operational Resilience in 2025: Global and Regional IT Trends, a 30-minute session to learn what steps you can take to strengthen your organization in the year ahead.

Watch Webcast
Effortless ITSM: Save Hours per Ticket With SolarWinds Service Desk

IT teams are under pressure to do more with less. This session shows you how to make that a reality. Raj Pandya (solutions engineer) and Lauren Okruch (senior product marketing manager) will walk you through practical ways to route tickets instantly using smart automation and eliminate delays with artificial intelligence (AI), dynamic forms, and integrated knowledge.

Watch Webcast
Actionable ITSM Strategies to Drive Towards the “Effortless” Experience

Effective artificial intelligence (AI) implementation in IT service management isn’t just adding technology. View our Webcast, Actionable ITSM Strategies to Drive Towards the “Effortless” Experience, to get insights into the sources of chaos and complexity.

Watch Webcast
The 2025 State of Database Report

Explore how DBAs are adapting to rising complexity and AI adoption. This report reveals key trends, risks, and strategies shaping the future of database management, and what separates high-performing teams from those falling behind.

Learn More
Bridging the Observability Gap

Agile and DevOps accelerate app delivery, but database management often lags behind. This paper shows how unified observability, automated CI/CD, and closer Dev-DBA collaboration bridge that gap—improving speed, reliability, and resilience.

View Whitepaper
Other resources
Unified. Proactive. Automated.

Modern IT generates more signals that teams can interpret. This eBook explains how leading organizations reduce cognitive overload by unifying operational context, reducing alert noise, and introducing safe automation across hybrid and multi-cloud environments.

Read eBook
The SolarWinds Service Desk Incident Automation Cookbook

Get 20 ready-to-use automation recipes for SolarWinds Service Desk, covering triage, routing, SLA management, and more to reduce resolution times and eliminate manual work.

Read eBook
eBook: Five Pillars of Modern IT Management for US K-12 Education

This document provides an introduction to SolarWinds services for US K-12 Education. As agencies move toward "Zero Trust" security models and navigate the complexities of "Secure by Design" initiatives.

Read eBook
The 2026 State of Monitoring and Observability Report

Get the insights from 750+ IT pros on where monitoring and observability fall short.

Find out how AI is transforming incident response, visibility and operational resilience.

Read Report
A Framework for Human-in-the-loop Decision Making

Unlock strategic AI with this framework that helps you ditch manual fatigue by categorizing IT tasks into four high-impact zones, from the "Agentic Sweet Spot" to expert human-led architecture.

Read Infographic
What is Network Discovery?

Network discovery refers to the identification of devices available on a network to ensure their validity.

Read IT Glossary
What are Network Devices?

Network devices facilitate data transmission and manage digital connections on a computer network.

Read IT Glossary
What is Network Troubleshooting? How to Fix Network Issues

Do you know how to troubleshoot network issues? Learn about network troubleshooting steps and best practices.

Read IT Glossary
What are Network Protocols?

Discover the nuances of network protocols, the OSI model layers, and the function of protocols in each OSI model layer.

Read IT Glossary
What Is a Network Node?

Network nodes are the endpoints, communication, or redistribution points over a network that can receive, create, store, and send data along distributed routes.

Read IT Glossary
What is Network Configuration Compliance?

Network configuration compliance refers to implementing the proper controls, policies, and device settings to safeguard your network from attackers and comply with the latest industry requirements for standards like HIPAA and PCI DSS.

Read IT Glossary
What is a Database Query?

In everyday language, a query is simply a request for information. Similarly, the meaning of a query in database management is a request for data. If you need to access, manipulate, delete, or retrieve data from your relational database, you’ll need a database query written using a specific syntax.

Read IT Glossary
What is MIB?

MIB is an organized, up-to-date repository of managed objects for identifying and monitoring SNMP network devices.

Read IT Glossary
What is agentless monitoring?

Agentless monitoring helps you monitor your overall network health without deploying any third-party agent software.

Read IT Glossary
What is Uptime?

Uptime is a metric used to measure the availability of a website or business application.

Read IT Glossary
What Is Ping?

Ping is a powerful TCP/IP command designed to help track and resolve connectivity issues between two or more networked devices.

Read IT Glossary
What are Computer and Server Operating Systems?

Your complete guide to operating system concepts, types, features, examples, and more.

Read IT Glossary
What Is Windows Server?

Windows Server is a group of operating systems to support enterprises and small and medium-sized businesses with data storage, communications, and applications.

Read IT Glossary
What Is Network Backup?

Network Backup is the process of replicating business-critical data to ensure data is always available.

Read IT Glossary
What is Database Performance Tuning?

It's the process of ensuring smooth and optimal database performance by using varied techniques, tools, and best practices.

Read IT Glossary
Remote Desktop Services

Remote desktop services (RDS) is a technology that enables users to connect to a remote computer's desktop and programs over a network connection. This allows users to work on a laptop far from the desktop as long as they have internet access and the right log-in credentials. With this technology, an IT department can manage, troubleshoot, update, and maintain various computers remotely and centrally.

Read IT Glossary
What is CPU usage?

CPU utilization indicates the amount of load handled by individual processor cores to run various programs on a computer.

Read IT Glossary
What Is Network Access Control?

Network access control includes the security policies designed to control network access, such as authorization controls and authentication checks.

Read IT Glossary
What Is QoS in Networking?

A collection of technologies that help efficiently manage network traffic by setting priorities for critical resource-intensive applications within the network.

Read IT Glossary
What is an Access Control List?

An access control list is a list of permission rights used to assign roles and responsibilities.

Read IT Glossary
What is Role-Based Access Control (RBAC)? RBAC Guide

Learn about how RBAC can help with automating user access rights management, minimizing risk, securing data, demonstrating compliance, and improving cybersecurity.

Read IT Glossary
What Is Remote Access?

What you need to know about remote access, protocols, benefits, key considerations, and more.

Read IT Glossary
What Is AWS CloudWatch? Definition and Top Tips

Amazon CloudWatch is a monitoring, observability, and management service designed specifically for site reliability engineers (SREs), IT, and DevOps teams.

Read IT Glossary
What is Network Infrastructure?

Network infrastructure is the broader collection of fundamental components that work cohesively to run an IT network.

Read IT Glossary
What Is an Oracle Database?

An Oracle database is a fully configurable and scalable enterprise database solution that uses a relational model for information management.

Read IT Glossary
What is a Network Administrator?

A network administrator proactively identifies and resolves a computer network's security, reliability, and performance issues.

Read IT Glossary
What is Database Management System (DBMS)?

Database performance management system is designed to help admins more easily troubleshoot and resolve DBMS performance issues by monitoring performance and providing root-cause analysis of your database using multi-dimensional views to answer the who, what, when, where, and why of performance issues.

Read IT Glossary
What is a Database Index?

An index helps in rapid access of database records by storing pointers to their actual disk location.

Read IT Glossary
What is the MFT Protocol?

Managed file transfer (MFT) protocol includes automation capabilities to help companies securely share various types of data over the internet.

Read IT Glossary
What is Network Optimization?

Network optimization leverages a variety of strategies, tools, and programs to improve network performance.

Read IT Glossary
What Is Application Infrastructure?

Application infrastructure refers to all the software and hardware assets necessary for the smooth functioning of your application.

Read IT Glossary
What is Database Concurrency?

Database concurrency is a unique characteristic enabling two or more users to retrieve information from the database at the same time without affecting data integrity.

Read IT Glossary
What is Index Fragmentation in SQL Server?

SQL Server index fragmentation is an overarching problem arising from an excessive number of alterations in the database.

Read IT Glossary
What Is Remote Desktop Protocol?

Remote Desktop Protocol (RDP) enables users to remotely access and control physical and virtual devices running on Windows.

Read IT Glossary
What is Hyper-V?

Hyper-V is a Microsoft virtualization product allowing you to create and run multiple VMs on a physical host.

Read IT Glossary
What is Packet Capture (PCAP)?

Packet capture is a networking practice involving the interception of data packets traveling over a network.

Read IT Glossary
What Is Network Congestion?

Network congestion refers to the reduced quality of service that occurs due to overloaded network nodes or links.

Read IT Glossary
What Is Packet Loss? How to Fix It

Explore how to identify, analyze, and troubleshoot packet loss issues.

Read IT Glossary
What is WSUS? Windows Server Update Services Guide

Windows Server Update Services (WSUS) definition, how WSUS works, and learn how to deploy it efficiently.

Read IT Glossary
What Is Network Capacity?

Network capacity quantifies the maximum amount of data that can be transmitted over a network from one point to another.

Read IT Glossary
What is Network Bandwidth?

Find out what network bandwidth is and how to optimize and increase your network capacity.

Read IT Glossary
What is Network Configuration?

Do you know what network configurations are and how to automate configuration management using tools? Learn how to start managing your network efficiently.

Read IT Glossary
What is Windows Event Log?

The Windows event log records specific events related to the system, security, and applications on a Microsoft system.

Read IT Glossary
What is Website Monitoring?

Your complete guide to website monitoring concepts, types, tools, and more.

Read IT Glossary
What is a virtual machine (VM)?

Learn more about virtual machines (VMs), including what they’re used for, types of virtual machines, and differences between VMs and virtualization.

Read IT Glossary
Subnetting: What Is a Subnet? How It Works

Subnetting is the process of logically dividing an IP network into more subnetworks.

Read IT Glossary
What is Syslog?

What you need to know about standard protocol enabling network devices to interact with a logging server and exchange event data.

Read IT Glossary
What is an SSL certificate?

SSL certificates are small data files designed to strengthen the overall website security through strong encryption and identity verification methods.

Read IT Glossary
What is SSAS (SQL Server Analysis Services)?

Your intro to a popular data analytics solution.

Read IT Glossary
What is SNMP Walk, and How Does It Work?

Know the value of each OID on a device instantly.

Read IT Glossary
What is an SNMP Trap? All About SNMP Traps

SNMP traps are unrequested notifications an SNMP agent of a managed device sends to an SNMP manager in the network.

Read IT Glossary
What is SNMP?

SNMP is a networking protocol used to monitor network devices.

Read IT Glossary
What are SharePoint Permissions?

Learn about automating SharePoint permission rights, simplifying management, providing safe access to data, and demonstrating compliance.

Read IT Glossary
What Is Advanced Persistent Threat?

Advanced persistent threat (APT) is a planned, stealthy cyberattack that allows attackers to penetrate a company's network and stay inside for a prolonged duration to exfiltrate valuable information.

Read IT Glossary
What is Server Infrastructure?

Learn about server infrastructure, server types, and the importance of monitoring and identifying server performance issues in real time.

Read IT Glossary
What Is SIEM? Security Information and Event Management Guide

Learn how to aggregate, correlate, analyze, and monitor security logs and events to prevent and mitigate security threats.

Read IT Glossary
What is MariaDB?

MariaDB is a secure enterprise database system using pluggable storage engines to store and manage different types of data.

Read IT Glossary
What Is Network Visualization?

Network visualization allows you to pictographically showcase the network architecture, including device arrangement and data flows.

Read IT Glossary
What Is SQL Performance Tuning?

SQL performance tuning, or performance tuning, is checking and resolving issues potentially affecting the efficiency of a SQL database.

Read IT Glossary
What is Storage Resource Monitoring?

Track the performance and capacity of your storage arrays with Storage Resource Monitoring (SRM) to keep tabs on any storage-related issues slowing your system down.

Read IT Glossary
How to Identify Devices on a Network

Learn more about identifying network devices, including how to identify unknown devices and identifying devices on wireless networks.

Read IT Glossary
What is HTTP?

HTTP is a standard protocol enlisting the recommended guidelines and procedures for exchanging information over the internet.

Read IT Glossary
What is Linux Server?

Linux® server refers to a specific type of server based on the free, open-source, and modular Linux operating system.

Read IT Glossary
What is Network Downtime?

Outage, human errors, failure of equipment, or ongoing maintenance can cause network downtime. Find out how to reduce and avoid it to minimize business losses.

Read IT Glossary
Patch Management Software

Simplify and automate patch management

Read IT Glossary
Syslog Server vs. SIEM

Understand the difference between Syslog Server and SIEM solution.

Read IT Glossary
What Is Database Monitoring?

Learn more about the basics of database monitoring, including why monitoring, optimizing, and tuning database performance is crucial.

Read IT Glossary
What is Log Monitoring?

Learn everything you need to know about log monitoring.

Read IT Glossary
What is IPv6?

IPv6 is the revised version of the Internet protocol designed to overcome the IPv4 limitations and address exhaustion problem.

Read IT Glossary
What are Network Performance Metrics?

Network metrics are qualitative and quantitative ways to observe and determine network behavior.

Read IT Glossary
What is Data Storage Management?

Learn how to streamline access to critical data by optimizing organizational data storage policies.

Read IT Glossary
What Is IIS Server?

Learn more about IIS, including what it’s used for, benefits, and how to configure IIS web servers and virtual directories.

Read IT Glossary
What Is File Integrity Monitoring?

A security mechanism that analyzes critical system files to check unauthorized modifications and cyberattacks.

Read IT Glossary
What is File-sharing security?

File-sharing security is all about utilizing the right set of file security tools, transfer protocols, and procedures while exchanging sensitive business documents inside or outside the company network.

Read IT Glossary
What Is FTP Server?

What you need to know about the FTP server process, types, benefits, and more.

Read IT Glossary
What Is an Enterprise Network?

Learn more about enterprise networking, including the components, architecture, and monitoring best practices.

Read IT Glossary
What is Network Availability?

Network availability, also referred to as network uptime, denotes the overall duration for which the clients can seamlessly access the resources, such as servers and printers, available on a computer network.

Read IT Glossary
What is Network Administration?

Learn about network administration, including key areas of focus, what a network admin does, and differences between a network admin and a network engineer.

Read IT Glossary
What Is a Domain Controller?

A domain controller is a server computer that authenticates and validates user access on a network.

Read IT Glossary
What is Network Activity?

Network activity monitoring helps identify bottlenecks impacting overall network performance, health, and uptime.

Read IT Glossary
What is Application Pool in IIS?

It’s a logical collection of websites or applications served by one or multiple worker processes with the same configuration.

Read IT Glossary
What is DDI?

DDI is an abbreviated term that refers to the amalgamation of DNS, DHCP, and IP Address Management into a single service or solution.

Read IT Glossary
What Is a Database? Relational and Non-Relational Database Guide

Monitor, analyze, and optimize cross-platform database performance.

Read IT Glossary
What Is Database Cardinality?

Database cardinality can be defined as the relationship between tables consisting of elements in a set.

Read IT Glossary
What Is Cyberthreat Intelligence?

Cyberthreat intelligence provides critical knowledge about existing and evolving cyber threats and threat actors.

Read IT Glossary
What Is Bandwidth Consumption?

Bandwidth consumption happens when a node connects to and exchanges information over a network.

Read IT Glossary
What are Active Directory Groups?

Active Directory (AD) groups help keep a tab on the access permissions to various resources in your network, such as computers.

Read IT Glossary
What is Active Directory?

Active Directory can be used for the management of user permissions and access rights.

Read IT Glossary
What Is a Service Desk?

A Service Desk is the central point of contact between IT and end-users within an organization. It supports the entire IT service management (ITSM) lifecycle, handling incidents, service requests, problems, and changes to ensure that IT services align with business needs. The ultimate goal of a service desk is to drive productivity and satisfaction across the organization by delivering high-quality IT services.

Read IT Glossary
What is AI in ITSM?

AI in IT Service Management (ITSM) is the use of artificial intelligence technologies, including machine learning, to automate and enhance IT service delivery and support processes. This includes employing AI tools to streamline tasks, improve efficiency, and provide better user experiences.

Read IT Glossary
What Is Network Visibility?

Network visibility means monitoring and understanding all network activities in real-time to ensure smooth, secure, and efficient operations.

Read IT Glossary
What Is IT Asset Management (ITAM)?

Learn about IT assets, including information about managing IT assets and why IT asset management is important.

Read IT Glossary
What Is Configuration Drift?

Everything you need to know about configuration drift and more.

Read IT Glossary
What Are the Key Differences Between SCP and SFTP?

Learn the definitions of SCP and SFTP, their differences, common use cases, and more.

Read IT Glossary
What Is SQL Server?

SQL Server is a relational database management system used to store, manage, and retrieve data efficiently.

Read IT Glossary
What Are the Key Differences Between MFT and SFTP?

Find out about MFT vs. SFTP, including their key differences, common use cases, and which one is right for you.

Read IT Glossary
What Is IT Operations Management?

Learn about the role, importance, and best practices of ITOM.

Read IT Glossary
What Is IT Change Management?

Learn about what change management is, its best practices, and the types employed by organizations.

Read IT Glossary
What Is PostgreSQL?

Discover what PostgreSQL is, its features, functions, and more.

Read IT Glossary
What Is SFTP (SSH File Transfer Protocol)?

SFTP (SSH File Transfer Protocol) allows for the secure transfer of files over remote systems.

Read IT Glossary
What Is FTPS (FTP Secure)?

File transfer protocol with Secure Sockets Layer (SSL) definition.

Read IT Glossary
What Is Data Observability?

Learn about data observability’s benefits, importance, and more.

Read IT Glossary
What Is a Hybrid Cloud?

Learn about hybrid cloud solutions, architecture, and benefits.

Read IT Glossary
What Is Enterprise Service Management?

Learn about ESM’s importance, objectives, and best practices.

Read IT Glossary
What Is a Protocol Analyzer?

What you need to know about protocol analyzers, their benefits, and more.

Read IT Glossary
What Is Bandwidth Management?

Learn about bandwidth management and bandwidth control.

Read IT Glossary
What Is Cloud Computing?

Cloud computing allows companies to rent software, data storage, and other IT resources instead of managing them in-house.

Read IT Glossary
What Is Container Technology?

A container is a lightweight package that includes code and dependencies together.

Read IT Glossary
What Is Log Management?

A complete guide to log management best practices to help you collect, organize, and monitor logs effectively.

Read IT Glossary
What Is Remote Monitoring and Management (RMM)?

Learn about remote monitoring and management, its benefits, and more.

Read IT Glossary
What Is Centralized Log Management?

Learn about the benefits and importance of centralized log management.

Read IT Glossary
What Is Cyber Risk Management?

Learn about cyber risk management and its importance.

Read IT Glossary
What Is Secure Remote Access?

Discover what secure remote access is, key strategies, and more.

Read IT Glossary
What Is Incident Management?

Incident management is a process within IT service management (ITSM) aimed at restoring normal operations as quickly as possible when disruptions occur.

Read IT Glossary
What Is a Knowledge Base?

Learn about knowledge bases, including how to build and maintain a knowledge base.

Read IT Glossary
What Is a Service Level Agreement (SLA) in ITSM?

Learn about SLAs, including different types, how to manage them, and why it’s important.

Read IT Glossary
What is IT Service Management (ITSM)?

IT service management (ITSM) is the set of processes and activities involved in planning, designing, delivering, managing, and maintaining IT services. ITSM ensures the appropriate people, technology, and processes are in play to strategically optimize service delivery, improve business processes, and enhance user experiences.

Read IT Glossary
What is a Configuration Management Database (CMDB)?

A CMDB is a crucial part of the ITIL framework. It enables organizations to manage, control, and configure assets.

Read IT Glossary
What Is Help Desk Software?

Learn more about help desk solutions, including why they’re important, the difference between a help desk and a service desk, and how to optimize help desk workflows.

Read IT Glossary
What is ITIL Service Catalog?

ITIL service catalog is a systemic record providing visibility into your organization's active IT services.

Read IT Glossary
What Is an IT Service Management (ITSM) Platform?

Learn about IT service management systems, including how modern ITSM platforms work and what features to look for to advance your service ticket support and delivery.

Read IT Glossary
What Is IoT?

The network of smart devices embedded with sensors, software, or any other technology to exchange data over the internet.

Read IT Glossary
What is IT Risk Management?

IT risk management involves policies, procedures, and tools to identify and assess potential threats and vulnerabilities in IT infrastructure.

Read IT Glossary
What Is Compliance Monitoring?

Learn about the process, challenges, and best practices of compliance monitoring.

Read IT Glossary
What Are Application Logs?

Learn about the significance of application logs in software development and how to conduct effective log analysis.

Read IT Glossary
What Is Network Traffic Monitoring?

Learn about the significance of network traffic monitoring for a more efficient IT environment.

Read IT Glossary
What Is Serverless Architecture?

Dive into the essentials of serverless architecture, from its core concepts and benefits to the challenges and comparisons with other models.

Read IT Glossary
What Are Syslog Levels?

Explore syslog severity levels and their importance in log management.

Read IT Glossary
What Is Syslog Format?

Learn about the structure, types, and importance of the syslog format.

Read IT Glossary
What Is NGINX Monitoring?

Learn how to monitor NGINX with metrics, logging, and insights.

Read IT Glossary
What Is Apache Cassandra Monitoring?

What you need to know about Apache Cassandra monitoring, its best practices, and more.

Read IT Glossary
What Is a Brute-Force Attack?

Learn about brute-force attacks, their types, and how to protect against them with strong passwords and multi-factor authentication (MFA).

Read IT Glossary
What Is a Server?

Explore the essential role of servers, from web and email to database and application services, in supporting modern digital infrastructure.

Read IT Glossary
What Is Problem Management?

Learn how problem management enhances IT reliability and improves service delivery.

Read IT Glossary
What Is DNS hierarchy?

Dive into the details of the DNS hierarchy from root servers to subdomains and learn how it simplifies internet navigation and domain resolution.

Read IT Glossary
What is a Change Agent?

Discover the role of change agents in driving innovation and aligning IT with business goals.

Read IT Glossary
What Is IT Infrastructure Management?

Learn how IT infrastructure management optimizes business operations, security, and scalability.

Read IT Glossary
What is an SSH?

Learn about SSH, its history, key security features, and how to set it up for secure remote access and file transfers.

Read IT Glossary
What Is MySQL Database?

MySQL is a popular open-source enterprise database solution that relies on the relational data model for data storage and management operations. Oracle, Amazon AWS, and other vendors offer proprietary commercial versions.

Read IT Glossary
What is Zero Trust Security?

Learn more about Zero Trust, including how it works, its architecture, and the benefits of a Zero Trust security model.

Read IT Glossary
What Is Virtualization?

Virtualization technology creates simulated environments based on physical systems to enable optimal and flexible resource utilization.

Read IT Glossary
What is Network Automation?

Network automation is the process of automating the management of a network’s physical and virtual devices using software to maximize efficiency.

Read IT Glossary
What Is Email Spoofing?

A technique commonly used in phishing attacks and spam to trick users by sending emails from a forged sender address.

Read IT Glossary
What Is Database Software?

A comprehensive guide to database software concepts, types, examples, and performance monitoring.

Read IT Glossary
What is T-SQL?

What you need to know about T-SQL and its functions.

Read IT Glossary
What Is Reverse Proxy?

A reverse proxy facilitates seamless communication in a client-server architecture with intelligent traffic routing, filtering, and distribution.

Read IT Glossary
What Are OSI Layers?

OSI layers enable standardized, reliable communication between two or more network devices.

Read IT Glossary
What Is a Relational Database?

A relational database allows you to easily find, scan, and sort specific information based on the relationship among the different fields defined within a table.

Read IT Glossary
What Is a NoSQL Database?

NoSQL databases store and retrieve information in a nontabular format, unlike relational databases.

Read IT Glossary
What is High Availability?

High availability indicates a system's capability of being resilient to known or unknown failures.

Read IT Glossary
What Is End-User Network Experience Monitoring?

End-user network experience monitoring allows teams to assess the impact of network performance on end users' experiences.

Read IT Glossary
What Is DHCP?

DHCP intelligently manages IP address allotment and renewal activities in a network.

Read IT Glossary
What Is an Insider Threat?

An insider threat is a user with authorized access to sensitive company assets or data who may misuse their access rights to compromise the organization's security.

Read IT Glossary
What Is Software-Defined Networking?

Learn more about software-defined networking (SDN), including how it works, implementation, benefits, and differences between SDN and traditional networking.

Read IT Glossary
What is Network Topology?

Network topology offers a diagrammatic explanation of the logical and physical setup of different components, such as routers and switches, in a network.

Read IT Glossary
What is a Vulnerability Assessment?

Vulnerability investigation or assessment is a systematic approach to identify the security loopholes or weak points in your IT infrastructure and take active measures to resolve them quickly.

Read IT Glossary
What is Application Performance Monitoring?

Your complete guide to APM concepts, capabilities, tools, and more.

Read IT Glossary
What is a Wi-Fi Heat Map?

A Wi-Fi heat map is a visual representation of Wi-Fi signal strength that provides visibility into your network and coverage.

Read IT Glossary
What Is Root Cause Analysis (RCA)?

Read about root cause analysis, its methods and benefits.

Read IT Glossary
What is Cybersecurity?

A complete guide on cybersecurity types and best practices to help you safeguard against common types of cyberattacks.

Read IT Glossary
What Is a Network Sniffer?

A network sniffer is a tool that captures and analyzes data packets as they travel across a computer network.

Read IT Glossary
What Is Observability (o11y)?

Observability provides proactive insights, automated analytics, and actionable intelligence from collected data.

Read IT Glossary
What is DNS Resolution?

Learn what DNS resolution is, how it works, the types of DNS servers involved, and why it’s essential for internet connectivity.

Read IT Glossary
What Is OpenTelemetry (OTel)?

OpenTelemetry is an open-source observability framework for standardizing the collection and export of telemetry data.

Read IT Glossary
What Is SD-WAN?

SD-WAN is a software-based network technology that offers a modern, flexible, and more effective way to administer wide-area networks.

Read IT Glossary
What Is Containerization?

Traditionally, application code was developed in a specific computing environment. Relocating application code to another environment, such as from computer systems to virtual machines, often resulted in bugs and errors. Containerization removes this problem by isolating application code and dependencies in an isolated user space known as containers.

Read IT Glossary
What Is AWS CloudTrail?

AWS CloudTrail is a service that tracks activity within an organization's AWS environment. Learn about CloudTrail features and benefits.

Read IT Glossary
What Is ITIL?

ITIL is a set of best practice guidelines focused on aligning the delivery of IT services with business goals.

Read IT Glossary
What Is Computer Hardware?

Learn about computer hardware, including the importance of monitoring hardware in enterprise and data center environments.

Read IT Glossary
What Is a VLAN?

Learn about VLAN, including the different types of VLAN, managing and configuring VLAN, and key differences between VLAN and LAN.

Read IT Glossary
What Is Network Monitoring?

Network monitoring is a critical IT process to discover, map, and monitor computer networks and network components, including routers, switches, servers, firewalls, and more.

Read IT Glossary
What Is Real User Monitoring?

Real user monitoring (RUM), also known as end-user experience monitoring, provides visibility into real-time problems affecting the experience of users while navigating your website.

Read IT Glossary
What Is Synthetic Monitoring?

Learn more about synthetic monitoring, including different types of synthetic monitoring.

Read IT Glossary
What Is a Web Server?

Learn more about web servers, including how web servers work, what they’re used for, and key differences between web servers and application servers.

Read IT Glossary
What Is an SQL Database?

What you need to know about SQL database structure, types, benefits, performance metrics, and more.

Read IT Glossary
What Is CIDR?

Classless Inter-Domain Routing (CIDR) refers to the standard process of efficiently allocating and organizing IP addresses across networks and devices.

Read IT Glossary
What Is Distributed Tracing?

Distributed tracing is vital for managing the performance of applications that use microservices and containerization.

Read IT Glossary
What Is a Database Schema?

A database schema is the structure or organization of data in a database management system. 

Read IT Glossary
What Are SQL Server Integration Services?

What you need to know about Microsoft SQL Server Integration Services (SSIS), SSIS packages, and SSIS monitoring.

Read IT Glossary
Kilvington Grammar School Simplifies IT Monitoring and Reduces Downtime with SolarWinds

Kilvington Grammar School partnered with SolarWinds on tailored monitoring, reducing unplanned downtime by 50%. This empowered staff to identify issues instantly, ensuring smooth adoption and improved service reliability for the school community.

Learn More
DBA Burnout: The $80K Crisis Your Business Can’t Afford

Get a 5‑minute snapshot of DBA burnout from the 2025 State of Database Report. Learn why this growing challenge impacts resilience and why leaders must act now.

Learn More
How to Use Internet Proxy for Remote Support with Dameware Central Server

SolarWinds Head Geeks dive into setting up Dameware Central Server and its remote features - from mobile remote desktop access to Web Help Desk integration and every Central Server remote tool in between. Learn how Central Server can help with license and user management. Free trial!

Watch Video
Azure Database Performance Monitoring and Optimization

SolarWinds Database Performance Analyzer provides performance tuning and optimization for Azure cloud databases, and it can be deployed in Azure.

Watch Video
Gaylor Electric Modernizes Network and Systems Management

Over the past decade, as Gaylor Electric transitioned from an on-premises data center to a modern private cloud environment, they faced the challenge of gaining unified oversight of the increasingly distributed environment. Their infrastructure utilized a hodgepodge of monitoring tools across three principal IT support locations and on managed servers running software as a service (SaaS) and platform as a service (PaaS) solutions in a virtualized private cloud.

Learn More
Kiwi CatTools Datasheet

Kiwi CatTools is a configuration management and network automation tool for network devices that saves time and reduces errors by automating common tasks, including backups and roll-outs.

View Datasheet
The Complete Guide to Keeping IT Simple

IT organizations face the challenge of adapting to rapidly evolving
technology trends such as the Internet of Things (IoT), artificial
intelligence (AI), IT service management (ITSM), and cybersecurity.

View Whitepaper
Step up Threat Detection with Security Observability

Gain visibility across your environments (across networks, infrastructures, applications, and databases) to reduce the time needed to detect, alert, and remediate security incidents on a single pane of glass.

Watch Webcast
Driving Better Outcomes with APM and Observability

The GigaOm report, Driving Better Outcomes with APM and Observability, reviews the state of play for organizations considered actively cloud-native.

View Whitepaper
Manage Your Multiple Database Journey

This whitepaper explores the strategic implementation and management of multiple enterprise database environments. It uses the latest industry studies to look at trends and options to guide managers responsible for diverse database platforms.

View Whitepaper
Virtualization Monitoring 101. Virtually everything you need to know about monitoring VMs, containers, the cloud, and more

This eBook is designed to discuss virtualization realities from the age-old debate of on-prem vs. cloud vs. hybrid (Spoiler… nearly everyone is hybrid) to newer technology like containers.

Learn More
Is it Really the Bandwidth

This whitepaper will identify three components of network performance to look at when you get a demand for more bandwidth.

View Whitepaper
SolarWinds Education Solutions Overview

SolarWinds is a leading provider of powerful and affordable IT management and monitoring solutions. We help eliminate complexity from your infrastructure network and data center operations, systems management, cybersecurity, and IT services management—so you can do more with less.

Read Brochure
Mastering SQL Server: The Art of Smart Automation

The adoption of platforms like Kubernetes has grown as DevOps teams build scalable applications. Monitoring in complex environments with many pods is challenging. Smart automation, incorporating dynamic monitoring, is key. Join Kevin Kline to learn about SQL Server automation and monitoring.

Watch Webcast
Decoding the Future: How Observability Conquers Top 3 IT Challenges for the DoD Intelligence Community

Enhancing Operational Agility in Complex Battlespaces

View Whitepaper
How Observability Guides Successful Cloud Migration

Most organizations are partway through a cloud journey, with many aiming at a hybrid cloud outcome. Observing and managing IT during migration is a challenge. This eBook explores how SolarWinds Observability Self-Hosted can help your cloud migration succeed.

Learn More
Texas State Department of Transportation Implements SolarWinds to Improve Traffic Conditions

SolarWinds and partner Skyline Technology Solutions provide solutions to improve traffic conditions and enhance citizen safety

Learn More
Observability Dilemma: To SaaS or Not to SaaS, That is the Question!

We decode the Observability Dilemma, emphasizing the importance of Observability in shaping your organization's tech ecosystem. Take a look at the advantages and limitations of SaaS and self-hosting solutions.

Watch Webcast
The 5 Executive Blind Spots Around Observability | Webcast

Only 1 in 10 enterprises adopted an observability strategy in 2020. By 2024, Gartner predicts that number will triple among companies progressing cloud-based architectures.

Watch Webcast
End-to-End Virtualization Management and Performance Monitoring

With virtualization ubiquitous across servers, have you considered the impact on the applications running on them? This webcast will discuss how SolarWinds is bridging the gap between the virtual admin who is responsible for the VM infrastructure and the DBA who is responsible for databases running in virtual machines.

Watch Webcast
Evolving Toward Unified Observability Implementation for Hybrid Environments

Many companies are applying observability, but it is often in a fragmented and siloed manner. Adopting a unified observability strategy is key to accelerating problem identification in a hybrid IT environment and opening up new use cases, including those that serve IT leaders.

View Whitepaper
Public Land Management Agency Improves Internal Satisfaction Rate over 30% with SolarWinds Platform Modules

Learn how a public sector network team built a flexible, comprehensive monitoring solution with a tight budget and a small team on the SolarWinds Platform.

Learn More
Communication and Asset Control Increases with Samanage Integrated Asset Management and Service Desk Solution

As a service desk, the IT department at J.F. Brennan Company had users submitting requests multiple ways. Some requests were going to one member of the team, others to multiple members of the team, or the incident would go unreported altogether. “With over 300 employees, our tracking system of spreadsheets, databases, and emails could not keep us on top of our tasks or bigger projects,” said Caleb Rose, IT coordinator.

Learn More
3rd Party Patching with System Center Configuration Manager

Learn how SolarWinds Patch Manager automates the patching process of 3rd party applications that includes researching needed patches, obtaining and running the update installer, documenting the pre & post-installation conditions, creating a package with metadata about the update and post-installation conditions, publishing the package to SUP, synchronizing to the site server, and building a deployment package. System Center Configuration Manager™ provides the ability to update third party patches using SCUP (System Center Updates Publisher).

Watch Video
SolarWinds Server & Application Monitor Datasheet

Troubleshoot application performance issues faster and reduce downtime.

View Datasheet
Account Permissions and Limitations in the Orion Platform

This video briefly demonstrates how to set account limitations and permissions in Orion and provides best practices in which permissions should be enabled for administrators and users.

Watch Video
Accelerating Your Deployment of the SolarWinds Orion Platform to Microsoft Azure

The SolarWinds® Orion® Platform and its modules are now Azure Certified applications and available in the Microsoft® Azure Marketplace.

Watch Video
Access Rights Auditor Free Tool

SolarWinds® Access Rights Auditor is a standalone free tool, designed to scan your file system and evaluate potential security risks due to user access rights.

Watch Video
Adding a New Alert

This video (3:29) demonstrates how to set up user permissions and provides best practices on which permissions should be enabled for administrators and users.

Watch Video
Adding a New User Account

This video (2:30) demonstrates how to set up user permissions and provides best practices on which permissions should be enabled for administrators and users.

Watch Video
Add and assign Universal Device Pollers

This video (4:26) will show you how to add new pollers and assign pollers to devices.

Watch Video
Adding and Customizing Resources

This video will demonstrate how to add resources to a view, rearrange resources in columns, and edit charts and graphs.

Watch Video
Configuring File Integrity Monitoring in SolarWinds® Security Event Manager

Learn how to configure File Integrity Monitoring (FIM) capabilities in SolarWinds Security Event Manager (formerly Log & Event Manager).

Watch Video
Alert Schedules

This video (3:05) will demonstrate how to create alert schedules

Watch Video
Adding Nodes Manually

This video (3:58) will demonstrate how to manually add a node that you want to monitor instead of using Network Sonar Discovery

Watch Video
Adding View Limitations

This video (4:11) will demonstrate how to create views - add resources to a view, rearrange resources in columns, edit charts and graphs - and how to limit views.

Watch Video
Automate Network Management With Kiwi CatTools

In this video, we’ll introduce you to the top three features of SolarWinds Kiwi CatTools.

Watch Video
Actual Tech Media Security Megacast featuring Access Rights Manager

SolarWinds shows you how to protect yourself from internal security threats by analyzing user access to services and file servers with visibility into privileged accounts and group memberships from Active Directory® and file servers.

Watch Video
Collect MIB Walk Data Using the SolarWinds SNMP Walk Tool

Learn how to use the SolarWinds SNMP Walk tool to troubleshoot Orion server issues and collect SNMP walk data.

Watch Video
Building a Map

This video (9:50) demonstrates how to build a map using a tool is called Network Atlas, which is included with Orion products such as Network Performance Monitor or Server & Application Monitor.

Watch Video
Collaboration is Key to Resolving Database Performance Issues

Stop the blame game, with a shared view of the truth on the relationship between DBAs, IT admins and developers, and how Database Performance Analyzer helps bridge that gap.

Watch Video
Clean Up Directories With Direct Permissions in Bulk

SolarWinds® Access Rights Manager (ARM) allows you to clean up directories with direct permissions as bulk action.

Watch Video
Dameware Smart Card Logon & Authentication

Learn how to enable Smart Card logon and authentication with Dameware Remote Support and Mini Remote Control.

Watch Video
Configuring File Integrity Monitoring (LEM v6.0)

This video covers how to install and configure Real-Time File Integrity Monitoring

Watch Video
Configure Advanced Alert Options

This video (4:52) demonstrates how to build more advanced alerts by adding a timer to the alert logic as well as adding new logic sections. In adding timing, you can have the alert trigger after a condition has been met for a period of time.

Watch Video
Create a Manual Discovery Job

This video demonstrates how to add network objects to the database for monitoring using the Orion Platform Network Sonar Discovery wizard.

Watch Video
Create a Scheduled Discovery Job

Watch and learn how to create a scheduled discovery job in NPM.

Watch Video
Create a New View

This video demonstrates how to create a new view, customize views, and manage views for Orion Platform v2016 and above.

Watch Video
Creating Reports using Reports Builder

This video (14:22) shows the steps on how to create a custom report using the reports builder in the Orion web console.

Watch Video
Creating and Modifying Menu Bars

This video (3:17) demonstrates how to set up user permissions and provides best practices on which permissions should be enabled for administrators and users.

Watch Video
Creating Correlation Rules with Security Event Manager

Learn how to create correlation rules with Security Event Manager (formerly Log & Event Manager).

Watch Video
Create Custom Reports in Web Help Desk

This video will show you how to quickly and easily create an action rule that can help automate processes and workflows.

Watch Video
Customer Success with the SolarWinds Support Community

Find out about all the great resources available to help you be successful with your SolarWinds products.

Watch Video
Dameware Remote Everywhere

Dameware Remote Everywhere is a simple, easy to use, cloud-based remote-support solution developed to help IT professionals resolve issues quickly.

Watch Video
Dameware Remote Support and Mini Remote Control Guided Tour

This guided tour of Dameware Remote Support and Mini Remote Control 11.0 shows the Dameware Central Server and Internet Proxy in action. Securely support end-users from an easy-to-use console.

Watch Video
Dameware Remote Support

Dameware® Remote Support is an affordable and easy-to-use remote support software designed to simplify and accelerate remote IT administration tasks for IT admins and support technicians.

Watch Video
Database Performance Analyzer

The cross-platform solution for performance monitoring for both cloud and on-premises databases.

Watch Video