Enterprise Vault™ Compatibility Charts

Total Page:16

File Type:pdf, Size:1020Kb

Enterprise Vault™ Compatibility Charts Enterprise Vault™ Compatibility Charts 10.0, 11.0, 12 February 09, 2018 Enterprise Vault™: Compatibility Charts Last updated: 2018-02-09. Legal Notice Copyright © 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, Enterprise Vault, Compliance Accelerator, and Discovery Accelerator are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This product may contain third-party software for which Veritas is required to provide attribution to the third party ("Third-party Programs"). Some of the Third-party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Refer to the Third-party Legal Notices document accompanying this Veritas product or available at: https://www.veritas.com/about/legal/license-agreements The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Veritas Technologies LLC and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Veritas as on-premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Veritas Technologies LLC 500 E Middlefield Road Mountain View, CA 94043 https://www.veritas.com Contents Chapter 1 About this guide ................................................................... 8 Introduction ................................................................................... 8 End of support policy for Veritas software ............................................ 8 Enterprise Vault and Microsoft products .............................................. 9 Original releases and service packs ................................................... 9 Key ........................................................................................... 10 Chapter 2 Enterprise Vault core dependencies ............................ 11 Introduction ................................................................................. 12 Operating system ......................................................................... 12 Standalone Enterprise Vault Administration Console ............................ 13 Enterprise Vault API Runtime .......................................................... 14 Enterprise Vault Server support for Add-Ins ....................................... 16 Domain and forest functional levels .................................................. 16 Microsoft SQL Server .................................................................... 17 .NET Framework .......................................................................... 18 Microsoft ISA Server and Forefront TMG ........................................... 19 Microsoft Outlook on the Enterprise Vault server ................................. 20 Microsoft Management Console (MMC) ............................................ 21 Web browsers ............................................................................. 21 Server virtualization ...................................................................... 22 Clustering ................................................................................... 23 Citrix .......................................................................................... 24 Microsoft Operations Manager (MOM) and System Center Operations Manager (SCOM) ................................................................... 25 Veritas backup agents for Enterprise Vault ......................................... 26 FIPS 140-2 compliance ................................................................. 27 IPv6 support ................................................................................ 28 Chapter 3 Storage devices, appliances, and software ............... 29 Introduction ................................................................................. 29 Storage devices: CIFS/SMB ........................................................... 30 Storage devices: streamer API ........................................................ 35 Dell EMC Centera and Atmos ......................................................... 37 Contents 4 Dell EMC Centera SDK, CentraStar, and Atmos ........................... 37 Storage software: NTFS ................................................................ 39 Secondary storage devices ............................................................ 39 Secondary storage software ........................................................... 42 Chapter 4 Exchange archiving .......................................................... 44 Introduction ................................................................................. 44 Exchange Server .......................................................................... 45 Exchange Online .......................................................................... 47 Enterprise Vault Data Classification Services ..................................... 47 Exchange Server 2003 OWA control file versions ................................ 48 Enterprise Vault OWA Extensions compatibility with Enterprise Vault Server .................................................................................. 48 Enterprise Vault Office Mail App for OWA compatibility with Enterprise Vault Server .......................................................................... 49 Chapter 5 Exchange archiving client compatibility ...................... 50 About Exchange archiving client compatibility ..................................... 50 Windows operating systems for Outlook Add-In .................................. 51 Windows email clients ................................................................... 52 Web browsers ............................................................................. 54 Browser support for Enterprise Vault Office Mail App for Exchange 2013 and Exchange 2016 ........................................................ 54 Mac client operating systems .......................................................... 55 Mac email clients .......................................................................... 56 Mac client browsers ...................................................................... 57 Desktop search utilities .................................................................. 58 Windows Search (WS) ............................................................ 58 X1® Content Connector for Enterprise Vault ................................ 59 Screen reader .............................................................................. 59 Chapter 6 File System Archiving (FSA) .......................................... 60 Content platforms ......................................................................... 60 Support for FSA Agent ............................................................ 60 Unix, Linux, and NFS .............................................................. 63 Support for Dell EMC Celerra/VNX Series ................................... 63 Support for NetApp Data ONTAP ............................................... 64 Support for IBM N series .......................................................... 65 Unsupported content platforms .................................................. 66 Client access ............................................................................... 66 Supported client access ........................................................... 66 Contents 5 Unsupported client access ....................................................... 68 Content protocols ......................................................................... 68 Supported content protocols ..................................................... 68 Unsupported content protocols .................................................. 71 Supported Windows components ..................................................... 71 Cluster support for FSA services ..................................................... 75 Operating system requirements when configuring when configuring FSA with clustered file servers ............................................ 77 Supported applications .................................................................
Recommended publications
  • Storage Resource Monitor Informes Y Análisis De Administración De Recursos De Almacenamiento
    HOJA DE DATOS Storage Resource Monitor Informes y análisis de administración de recursos de almacenamiento Obtenga visibilidad completa del desempeño y la capacidad de su PRUÉBELO GRATIS entorno de almacenamiento heterogéneo con el monitoreo y los informes de almacenamiento de NAS y SAN sin agentes. Vea su entorno de 30 días, versión completa almacenamiento, incluidos los volúmenes, grupos RAID, conjuntos de almacenamiento, discos, etc. Amplíe el monitoreo e informes de SolarWinds® Server & Application Monitor (SAM) y Virtualization Manager (VMAN) hasta el nivel de dispositivo mediante la integración con Storage Resource Manager Orion® Platform. FUNCIONES • Monitoreo del desempeño del almacenamiento y detección de puntos calientes • Visualización del estado de hardware y los arreglos de almacenamiento • Planificación de la capacidad de almacenamiento con vistas históricas y previstas • Alertas e informes predefinidos y personalizados • Vistas detalladas de la capacidad y el desempeño de controladores, arreglos, capacidad LUN y desempeño página 1 HOJA DE DATOS: STORAGE RESOURCE MONITOR VISIBILIDAD INTEGRAL DE LA PILA DE APLICACIONES Utilice Storage Resource Monitor (SRM) para acceder a los paneles de AppStack™ y PerfStack™ y lograr una visibilidad integral del desempeño de las aplicaciones e infraestructuras, incluidos sus recursos de almacenamiento. AppStack se diseñó para detectar problemas de desempeño de las aplicaciones y permitirle determinar rápidamente la causa, sea de la infraestructura de servidores, virtual o de almacenamiento. Puede evaluar rápidamente el estado de todo su entorno y detectar y solucionar problemas específicos e interrelacionados, todo desde una sola vista. PerfStack presenta mediciones y datos de desempeño en las diversas pilas de todos sus arreglos de almacenamiento, virtualización, aplicaciones, sistemas y sistemas de red a lo largo del tiempo.
    [Show full text]
  • Vxrack-1000-Overview.Pdf
    PRODUCT OVERVIEW DELL EMC VXRACK SYSTEM 1000 SERIES Hyper-Converged Infrastructure at scale Converged infrastructure brings together the disparate infrastructure elements that power IT, including servers, data storage devices, networking functions, virtualization, management software, orchestration, and applications. The purpose: To simplify IT by breaking down the silos in the data center, reversing the status quo of static and inflexible pools of resources. Converged infrastructure solutions are proven to significantly speed deployments, make infrastructure more agile, and simplify IT operations—all of which is critical to successfully deliver IT as a service. In contrast to traditional converged infrastructure solutions, hyper-converged infrastructure (HCI) is a software-defined architecture with integrated compute, networking, software-defined storage, and virtualization. It enables compute, storage, and networking functions to be decoupled from the underlying infrastructure and run on a common set of physical resources that are based on VxRack System industry-standard x86 components. Using hyper-converged infrastructure, customers can start with 1000 Series a small deployment, and then flexibly scale out to support dynamic workloads and evolving Modular hyper-converged infrastructure business needs. system that delivers extreme scalability The VxRack System 1000 series is a hyper-converged platform that complements Dell EMC and flexibility converged infrastructure systems. These self-contained units of servers and networking are well
    [Show full text]
  • Global Aerospace Replaces Aging Dell EMC Data Domain with Highly Scalable Exagrid System
    Global Aerospace Replaces Aging Dell EMC Data Domain with Highly Scalable ExaGrid System CUSTOMER SUCCESS STORY Customer Overview Global Aerospace, headquartered in London, is a leading provider of aerospace insurance with a worldwide portfolio of clients engaged in every aspect of the aviation and space industries. Insurer Seeks Alternative to “Switching to ExaGrid has Aging Data Domain System resulted in more reliable Global Aerospace found that its Dell EMC backups. We haven’t run out Data Domain system was running out of space like we had before. of space as it reached its end of life. The Backup windows are smaller— company began to look into replacements several hours shorter for our for the aging system and considered other largest backup job.” Data Domain models, but also looked at Paul Draper alternate solutions that would support its Technical Analyst backup applications, Veritas Backup Exec and Veeam. Landing Zone and Superior “My manager had been to a storage Key Benefits: exhibition and learned about ExaGrid there,” Deduplication Deliver More Seamless integration said Paul Draper, Global Aerospace’s technical Reliable Backups with backup apps led to analyst. “We realized that ExaGrid had better Paul backs up Global Aerospace’s data in replacement of Data Domain integration with the backup software that daily incrementals and weekly fulls. The data we were using. We liked the fact that the Scalability is ‘one of ExaGrid’s is a mix of operating systems, files, and SQL ExaGrid system was modular and easily best features’ databases. Non-critical data is stored on tape, expandable, so we decided to replace Data which can cause a bit of a delay in the overall Backups are more reliable; Domain with ExaGrid.” production schedule, but Paul has noticed backup windows are shorter and that delays have been less frequent since don’t impede production hours Global Aerospace installed ExaGrid systems switching to ExaGrid, and that the backup at its primary site and also at a secondary window is shorter in general.
    [Show full text]
  • Modern Infrastructure for Dummies®, Dell EMC #Getmodern Special Edition
    Modern Infrastructure Dell EMC #GetModern Special Edition by Lawrence C. Miller These materials are © 2017 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited. Modern Infrastructure For Dummies®, Dell EMC #GetModern Special Edition Published by: John Wiley & Sons Singapore Pte Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628, www.wiley.com © 2017 by John Wiley & Sons Singapore Pte Ltd. Registered Office John Wiley & Sons Singapore Pte Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628 All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted by the Copyright Act of Singapore 1987, without the prior written permission of the Publisher. For information about how to apply for permission to reuse the copyright material in this book, please see our website http://www.wiley.com/go/ permissions. Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. Dell EMC and the Dell EMC logo are registered trademarks of Dell EMC. All other trademarks are the property of their respective owners. John Wiley & Sons Singapore Pte Ltd., is not associated with any product or vendor mentioned in this book. LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: WHILE THE PUBLISHER AND AUTHOR HAVE USED THEIR BEST EFFORTS IN PREPARING THIS BOOK, THEY MAKE NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS BOOK AND SPECIFICALLY DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]
  • DES-3611 Dumps DES-3611 Braindumps DES-3611 Real Questions DES-3611 Practice Test DES-3611 Dumps Free
    DES-3611 Dumps DES-3611 Braindumps DES-3611 Real Questions DES-3611 Practice Test DES-3611 dumps free EMC DES-3611 Specialist - Technology Architect, Data Protection https://killexams.com/pass4sure/exam-detail/DES-3611 QUESTION: 58 Which Dell EMC array will use Snap-based replication when protected with RecoverPoint? A. VPLEX B. Unity C. VNX D. XtremIO Answer: B QUESTION: 59 What is the expected compression rate for protections with Dell EMC Data Domain Cloud DR before sending data to the cloud? A. 45% B. 50% C. 60% D. 65% Answer: D QUESTION: 60 Which Dell EMC Data Protection Suite for Application technology enables the Hypervisors Direct backup to Data Domain? A. VMware ESX Avamar B. VRPA and VMware ESXi C. ProtectPOint Client Direct D. ProtectPoint vRPA Answer: B QUESTION: 61 A company Protection VM is being protection asynchronously with a Dell EMC RecoverPoint for Vms Consistency Group. When will this VM receive an acknowledgement that a write a successfully written to storage? A. Once the change is written to the Copy VM B. After the vRPA acknowledges the Write Splitter C. One the change is written to the journal D. As soon as the Write Splitter receives the write Answer: D QUESTION: 62 When sizing a Dell EMC Data Domain solution, what key information should be collected from the customer? A. Amount of data that exists; Amount of data that needs to be backed up; Amount of tapes used for each backup B. Amount of data that is contained in a full backup; Amount of primary data to backup, retain, and replicate offsite; Backup software reporting for a single, complete, and full back up of all data C.
    [Show full text]
  • Dell EMC : Cloud Insights
    Dell EMC Cloud Insights NetApp September 24, 2021 This PDF was generated from https://docs.netapp.com/us- en/cloudinsights/task_dc_emc_datadomain.html on September 24, 2021. Always check docs.netapp.com for the latest. Table of Contents Dell EMC . 1 DELL EMC Data Domain data collector. 1 Configuring the EMC ECS data collector . 2 Dell EMC Isilon data collector . 3 Dell EMC PowerStore data collector . 4 Dell EMC RecoverPoint data collector . 6 DELL EMC ScaleIO data collector . 7 Configuring the EMC Unity data collector . 8 Dell EMC VMAX and PowerMax Family of Devices data collector . 9 Dell EMC VNX Block Storage (NaviCLI) data collector . 13 DELL EMC VNX File (formerly Celerra Unified Storage System) data collector . 15 Configuring the EMC VNX Unified data collector. 17 Configuring the EMC VPLEX data collector. 18 Dell EMC XtremeIO data collector . 20 Dell EMC DELL EMC Data Domain data collector This data collector gathers inventory and performance information from DELL EMC Data Domain deduplication storage systems. To configure this data collector, there are specific configuration instructions and usage recommendations you must follow. Terminology Cloud Insights acquires the following inventory information from the Data Domain data collector. For each asset type acquired by Cloud Insights, the most common terminology used for this asset is shown. When viewing or troubleshooting this data collector, keep the following terminology in mind: Vendor/Model Term Cloud Insights Term Disk Disk Array Storage FC Port Port File System Internal Volume Quota Quota NFS and CIFS share FileShare Note: These are common terminology mappings only and might not represent every case for this data colletor.
    [Show full text]
  • Veritas Netbackup ™ Enterprise Server and Server 8.2 - 8.X.X Hardware and Cloud Storage Compatibility List (HCL) Created on August 27, 2021
    Veritas NetBackup ™ Enterprise Server and Server 8.2 - 8.x.x Hardware and Cloud Storage Compatibility List (HCL) Created on August 27, 2021 Click here for the HTML version of this document. <https://download.veritas.com/resources/content/live/OSVC/100046000/100046445/en_US/nbu_82_hcl.html> Copyright © 2021 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC in the U.S. and other countries. Other names may be trademarks of their respective owners. Veritas NetBackup ™ Enterprise Server and Server 8.2 - 8.x.x Hardware and Cloud Storage Compatibility List (HCL) 2021-08-27 Introduction This Hardware and Cloud Storage Compatibility List (HCL) document contains information about hardware and cloud storage solutions supported with Veritas NetBackup Enterprise Server and Server 8.2 - 8.x.x. The HCL contains separate sections for each solution type. These sections can be accessed by expanding the bookmarks on the left. (For information on other NetBackup versions, see <http://www.netbackup.com/compatibility>) To ensure Veritas' support, tape libraries , tape drives , virtual tape devices , NDMP devices , snapshot solutions , Veritas OpenStorage Cloud solutions and Storage Servers must be present on the HCL and must be supported by the hardware manufacturer or cloud provider and the operating system vendor in the desired environment. (The list of Fibre Channel devices contained in the Infrastructure Used for Testing section represents equipment that has been used during NetBackup qualification testing in other sections of this document and is not intended to be a list of supported devices.) Note: Our support policy is not the same for all solution types, so please read the notes at the beginning of each section for information on supported solution software and firmware versions.
    [Show full text]
  • Technology Architect, Data Protection Version 1.0 Certification Description
    Specialist – Technology Architect, Data Protection Version 1.0 Certification Description Certification Overview This certification formally validates the Specialist level skills necessary to recommend and design data protection solutions using the latest Dell EMC Data Protection products and become a trusted advisor to customers. Certification Requirements To complete the requirements for this certification you must: 1. Achieve one of the following Associate level certifications* Proven Professional • Associate - Data Protection and Management Version 1.0 Website • Associate - Data Protection and Management Version 2.0 • Associate - Backup Recovery Education Services • Associate - Information Storage and Management Version 2.0 • Associate - Information Storage and Management Version 3.0 Community • Associate - Information Storage and Management Version 4.0 2. Pass the following Specialist exam on or after November 02, 2018: • DES-3611 Specialist – Technology Architect, Data Protection Exam Note: These details reflect certification requirements as of November 02, 2018. The Proven Professional Program periodically updates certification requirements. *Please check the Proven Professional CertTracker website regularly for the latest information and for other options to meet the Associate level requirement. Dell Inc. Hopkinton Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 DES-3611 Specialist – Technology Architect, Data Protection Exam Exam Description Overview This exam is a qualifying exam for the Specialist – Technology Architect, Data Protection (DCS-TA) track. This exam focuses on recommending and designing data protection solutions using the latest Dell EMC Data Protection products. Dell Technologies provides free practice tests to assess your knowledge in preparation for the exam. Practice tests allow you to become familiar with the topics and question types you will find on the proctored exam.
    [Show full text]
  • Trusted Hybrid Cloud Balancing Cybersecurity Compliance and Operational Requirements
    Dell Customer Communication - Confidential Solution Brief Trusted Hybrid Cloud Balancing Cybersecurity Compliance and Operational Requirements. Overcoming the Challenge Achieving Parallel Goals IT organizations continuously work to balance focus, funding and • Reduced IT costs through unification of resources to protect business critical data from the ever-emerging cybersecurity operations and compliancy cybersecurity threats against their IT infrastructures. Implementing and solutions. maintaining an effective cybersecurity framework that accounts for data • Detailed documentation sets supporting that is continuously expanding at the edge/IOT to the data center and architecture, deployment, operation. into the cloud has never been more important. • 3rd Party security controls and penetration Dell Technologies Trusted Hybrid Cloud testing verification. Dell Technologies has developed a cloud-based architecture that can • Sustainable, repeatable and auditable be deployed both in Public, Private, and Hybrid scenarios that utilizes regulatory compliance verification and the same core architecture and components that can meet both reporting compliance and operational cybersecurity requirements. The solution utilizes best of breed hardware and software from the Dell Technologies • Single pane of glass for the management family allowing customers to run on-demand configurable pool of shared and monitoring of cloud workloads, computing resources within their own architecture. including software configurations and vulnerabilities. • Data protection
    [Show full text]
  • Data Domain? the Business Value of Data Domain
    Deduplication solutions are not all created equal, why data domain? The Business Value of Data Domain Why you should take the time to read this paper • Reduce backup & recovery risks (Eliminate the security risks of using physical tapes for backups with encryption options for data- in-place and data-in-flight.) • Speed up your backups (Achieve up to 68 TB/hr, 1.5 times faster than the closest competitor.) • Save valuable floor space (Protect 50 PB of logical backups in the footprint of just 2 floor tiles.) • Eliminate the application impact of backups (Achieve the performance of snapshots and the functionality of full backups • Increase backup & recovery service levels (Maximize success with revolutionary primary storage array integration.) rates via improved performance and reliability.) • Reduce backup costs (Reduce or eliminate tape infrastructure • Facilitate Chargeback & Capacity Planning (Physical capacity power, cooling, tape media, and backup application licensing measurement provides the mechanism for chargebacks, trending, costs.) capacity planning, and migration planning.) • Improve disaster recovery (Replace tape-based DR with • Increase flexibility (Consolidate backup & archive data and easily bandwidth efficient replication improving performance & reliability adapt to changing requirements over time.) with simplified DR testing.) • Simplify your purchase decision (Be confident in your purchase • Ensure data recoverability (Dell EMC Data Domain Data decision by selecting the clear leader in the market with years of Invulnerability
    [Show full text]
  • Immutable Data Protection for Any Application
    IMMUTABLE DATA PROTECTION FOR ANY APPLICATION Mike van der Steen Principal Systems Engineer Dell Technologies [email protected] Knowledge Sharing Article © 2020 Dell Inc. or its subsidiaries. The Dell Technologies Proven Professional Certification program validates a wide range of skills and competencies across multiple technologies and products. From Associate, entry-level courses to Expert-level, experience-based exams, all professionals in or looking to begin a career in IT benefit from industry-leading training and certification paths from one of the world’s most trusted technology partners. Proven Professional certifications include: • Cloud • Converged/Hyperconverged Infrastructure • Data Protection • Data Science • Networking • Security • Servers • Storage • Enterprise Architect Courses are offered to meet different learning styles and schedules, including self-paced On Demand, remote-based Virtual Instructor-Led and in-person Classrooms. Whether you are an experienced IT professional or just getting started, Dell Technologies Proven Professional certifications are designed to clearly signal proficiency to colleagues and employers. Learn more at www.dell.com/certification 2020 Dell Technologies Proven Professional Knowledge Sharing 2 Table of Contents Introduction .................................................................................................................................................. 4 Protecting Data from Cyber-Attacks ............................................................................................................
    [Show full text]
  • SRM 2020.2 Administrator Guide
    ADMINISTRATOR GUIDE Storage Resource Monitor Version 2020.2 Last Updated: Wednesday, June 3, 2020 © 2020 SolarWinds Worldwide, LLC. All rights reserved. This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors. SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS, OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON THE DOCUMENTATION, INCLUDING WITHOUT LIMITATION NONINFRINGEMENT, ACCURACY, COMPLETENESS, OR USEFULNESS OF ANY INFORMATION CONTAINED HEREIN. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY, EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be
    [Show full text]