Documentation forSolarWinds Platform

SolarWinds Platform 2024.2 release notes

Release date: June 4, 2024

Here's what's new in SolarWinds Platform 2024.2.

Learn more

New features and improvements in SolarWinds Platform

Maps improvements

In Intelligent Maps, users can:

  • Define custom topology links based on status of child entities
  • Disable specific automatically added links
  • Show multiple links between two nodes when there are multiple links
  • Track wireless heat maps history

Users can import Network Atlas maps to Intelligent Maps.

Other improvements

  • Administrators can configure a mandatory notice to be displayed and acknowledged before users log in.
  • When users log in to the web console, a toast message with the date and time of the previous successful login is displayed in the top right.
  • Improved stability, installation, and upgrade experience
  • Improved performance of the SolarWinds Platform
  • Various security and compliance improvements
  • Stability improvements for agents and pollers
  • SNMP v3 traps with the authentication method SHA-256 or SHA-512 are supported.


Case number Description
413124, 00583729, 00917555, 01509843, 01590830

On the Manage Nodes page, all nodes are displayed when nodes are grouped by Maintenance Window, even for users connecting to the SolarWinds Platform server from a different time zone.

01570284, 01589174

On the modern Manage Nodes page, custom properties can be successfully imported.

01558137, 01573518, 01583277, 01585187, 01585743

Installing an additional polling engine no longer fails if the SolarWinds Administration Service (SWA) was updated on the main polling engine, resulting in the message The communication to the main polling engine server failed.

00347151, 00583729, 00609433, 00808352, 01086612, 01351960, 01445837

Scheduled maintenance mode times are displayed correctly when multiple nodes are selected and when the nodes and the SolarWinds Platform server are in different time zones.

00971087, 01337532, 01522899, 01526029, 01526147, 01550288, 01570302

A memory leak in the SWJobEngineWorker2x64.exe process for the Solarwinds.Orion.Core.Collector plugin is fixed. This issue affected WMI polling. It caused slow performance, failures due to out of memory errors, other errors and warnings in logs, and missed polls.

01560597, 01562147, 01565729, 01567347, 01571619, 01571639, 01558789, 01566874, 01561654, 01560265, 01573988, 01571865, 01572094, 01580802, 01564082

Object icons on the Active Alerts page are displayed correctly.

01559327, 01556253, 01562533

The check to determine whether time settings across agents are synchronized was removed from the Deployment Health check in the SolarWinds Platform Web Console. In the stand-alone Active Diagnostics application, the check no longer indicates problems when there are none.

01051176, 01221567, 01314256, 01546461, 01563438, 01560376, 01564113, 01564143, 01568945, 01576335, 01564113

The test to identify mismatches between the SWIS URI System Identifier and the system identifiers in URIs no longer fails. The test has been added back to Active Diagnostics.

01521004, 01567098

On the Collect new diagnostics page, the search results display the correct nodes, and pagination works correctly.


Remote installation of an agent no longer fails on non-English computers running a Linux-based operating system.

01559272, 01561292, 01563910, 01566566, 01550711, 01560088

Intelligent Maps no longer display black objects instead of icons.


Intelligent Maps display all icons correctly when they are selected from the Icon property panel.


Hovering over interfaces on an Intelligent Map no longer causes an error to be displayed, similar to:

RunQuery failed, check fault information. Value not provided for parameter @'InterfaceID'

01533680, 01552117

Job engine clear messages are no longer sent between polling engines, which could cause polling to stop.

01455555, 01423586

The Linux agent no longer uses the wrong path to search for certificates, which prevented the agent service from starting.

01502617, 01544348

A query that lead to deadlocks in the SolarWinds Platform database has been tuned.

00894876, 00952370, 01316477, 01542041

When a user logs out of the SolarWinds Platform Web Console, the resulting login dialog populates the Username field based on the credentials of the user who logged out, rather than always Admin.


Node availability data is no longer displayed incorrectly if a node enters fast poll from the Critical status.


On the configuration dialog for the Send a GET or POST Request to a Web Server alert action, you can enter user names and passwords of up to 150 characters when you choose Basic or NTLM authentication. The previous limit was 50 characters.


On the Add SMTP Server dialog, you can enter a host name with a segment that starts with a number.


A view in the SolarWinds Platform database has been tuned to improve performance when retrieving application availability data and to prevent high database CPU usage.

00158062, 00334434, 01459950

Reports that contain a SWQL query are displayed correctly when they are sent through the report scheduler as an HTML email.


Special characters, such as the German umlaut, are displayed correctly in the user interface.

01423540, 01499591, 01508573

Database maintenance performance has been improved to run more quickly.

01330047, 01395989, 01469949, 01511737

The speed and accuracy of topology calculation to show connections on network maps has been improved.

01462551, 01399856

During provisioning, the AIX agent no longer queries its DNS server to resolve its IP address in order to send this information to the SolarWinds Platform.

00655331, 01492460

Searches based on a custom property value work correctly when the custom property name is SiteID.


If any metrics are missing from a PerfStack project, the PerfStack Widget displays the available metrics instead of the Load PerfStack Project button.

01430167, 01497213

In a deployment with High Availability configured, the Deployment Health tab no longer shows invalid issues on standby servers because of SWIS connection failures.

00637986, 00640711, 01504141

Having special characters in a report name no longer causes the report scheduler to fail.

01253523, 01468220, 01495488

The next poll and next rediscovery times for volume polling are shown in the time zone of the server, not in the UTC time zone.


When multiple alert actions are triggered simultaneously, the AlertDetailsUrl and AlertObjectID macros return the correct values.

01250912, 01384999, 01493532

The Power Control Unit (PCU) status is displayed on Node Details page after an upgrade.


The software version and other information about PCU/UPS devices is updated with the latest polled values.


When you run the Discovery Wizard with a set of more than 35 nodes, statistics for PCUs are not lost.

00787337, 01266827

Assigning UPS devices to a Universal Device Poller (UnDP) in bulk is successful, data is polled from UPS devices, and UPS inventory reports are displayed correctly.

01155223, 01424647

Polling of UPS devices without Battery Temperature no longer results in UPS and Battery Status being reported as unknown.

00384424, 00483466, 00565220, 01482010

Custom reports and charts with custom time periods no longer incorrectly add "UTC" to the title, even though the time is shown in the server's local time zone.


Network Discovery using Seed Router on some newer devices no longer fails with the error Unable to find subnets.


An issue that resulted in the incorrect notification You have used more than 90% of your available licenses! in HA deployments is fixed.

01002109, 01231236, 01140657, 01198400, 01353300, 01428595

An issue was fixed that caused alert actions to fail with errors such as:

You must implement a default accessor on SolarWinds.Newtonsoft.Json.Linq.JObject because it inherits from ICollection


Hovering over a location on a map no longer produces unexpected results, such as the pop-up appearing in the wrong location or staying open after the mouse moves.


Applying account limitations no longer slows down operations with the Orion.Group entity, causing performance issues in widgets, such as active alerts or maps.


The issue with inconsistent SNMP information is resolved by updated OIDs.

00909898, 01119224, 01385636

Operations on custom properties no longer cause deadlocks, which were leading to issues such as the inability to delete a custom property or to edit multiple nodes at the same time.

01359275, 01389703

Duplicating a dashboard from the Manage Dashboards page no longer assigns the same ID, which was causing upgrades to fail.


When a Group Member alert is triggered, macros in the alert notification are parsed correctly. The notification no longer shows the macro instead of the resulting text.

01227054, 01335583

When you create a report, the Resource Preview pane includes orange column width indicators, and Custom is selected as the default column width setting.

01228625, 01242391, 01468064

The installer no longer fails while attempting to upgrade the Oracle ODBC driver.


If you use Windows Agents with disabled automatic update of Agents and upgrade your deployment to the latest version, Agents no longer stop polling CPU, memory, and disks.


The Map It feature is displayed correctly when you hold the Alt key on an Intelligent Map.

01539957, 01579210

The timeout limit for the Verify MessageBus connection test on the Deployment Health page has been increased. This change prevents tests that should succeed from failing with the message Diagnostic timed out.

01559991, 01564082, 01571168, 01571561, 01580158, 01580981, 01600664, 01608819

When a node is added to an existing Network Atlas map that is already displayed, the node's status is shown correctly instead of always being shown as Unknown.


*The SecObs Bussiness Layer in the SolarWinds Platform no longer uses the Microsoft Distributed Transaction Coordinator (MSDTC) service, which could lead to the following error:

Service was unable to open new database connection when requested.
TransactionManagerCommunicationException: Network access for Distributed Transaction Manager (MSDTC) has been disabled. Please enable DTC for network access in the security configuration for MSDTC using the Component Services Administrative tool.

01567667, 01567696, 01583341, 01590138, 01602301

*When Microsoft Visual C++ (MSVC) 14 is installed on an agent, the installation is accurately detected.

01572326, 01573594

*The Search For option in the Add/Edit Groups wizard works correctly and can be used to locate objects to add to the group.

01495450, 01568838, 01590138

*When an agent service gets into a status of 5, the SolarWinds Platform attempts to redeploy it. (This status indicates that a dependent prerequisite 'Core Polling Agent Plugin' failed to be installed.)


*If you click the Submit button multiple times after editing a node, the operation no longer fails with an error.

01610271, 01610891, 01613582

*In certain environments, upgrades no longer fail because the Configuration Wizard cannot create a table due to legacy time series driver structures in the database.

*This fix was added after the RC release.


SolarWinds would like to thank our Security Researchers below for reporting on the issue in a responsible manner and working with our security, product, and engineering teams to fix the vulnerability.

SolarWinds CVEs

CVE-ID Vulnerability title Description Severity Credit
CVE-2024-28996 SolarWinds Platform SWQL Injection Vulnerability The SolarWinds Platform was determined to be affected by a SWQL Injection Vulnerability. Attack Complexity is high for this vulnerability. 7.5 High Nils Putnins from NATO
CVE-2024-28999 SolarWinds Platform Race Condition Vulnerability The SolarWinds Platform was determined to be affected by a Race Condition Vulnerability affecting the web console. 6.4 Medium ElHussain Fathy (0xSphinx)
CVE-2024-29004 SolarWinds Platform Stored XSS Vulnerability The SolarWinds Platform was determined to be affected by a stored cross-site scripting vulnerability affecting the web console. High-privileged user credentials are needed, and user interaction is required to exploit this vulnerability. 7.1 High Jakub Brzozowski, Kamil Falkiewicz, Szymon Jacek with STM Cyber

Third-party CVEs

CVE-ID Vulnerability title Description Severity
CVE-2021-4321 Authenticated XSS Vulnerability A vulnerability was found in Angular up to 11.0.4/11.1.0-next.2. It has been classified as problematic. Affected is the handling of comments. The manipulation leads to cross site scripting. It is possible to launch the attack remotely but it might require an authentication first. Upgrading to version 11.0.5 and 11.1.0-next.3 is able to address this issue. The name of the patch is ba8da742e3b243e8f43d4c63aa842b44e14f2b09. It is recommended to upgrade the affected component. 5.4 Medium
CVE-2023-0215 Denial of Service Vulnerability The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected. 7.5 High
CVE-2022-0778 Denial of Service Vulnerability The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc). 7.5 High
CVE-2021-23840 Denial of Service Vulnerability Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). 7.5 High
CVE-2023-0286 Denial of Service Vulnerability There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network. 7.4 High
CVE-2021-3712 Denial of Service Vulnerability ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y). 7.4 High
CVE-2018-0732 Denial of Service Vulnerability During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o). 7.5 High
CVE-2020-1971 Denial of Service Vulnerability The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the "-crl_download" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w). 5.9 Medium
CVE-2019-1559 Denial of Service Vulnerability If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q). 5.9 Medium
CVE-2018-0737 Side Channel Attack Vulnerability The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to a cache timing side channel attack. An attacker with sufficient access to mount cache timing attacks during the RSA key generation process could recover the private key. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2b-1.0.2o). 5.9 Medium
CVE-2017-3736 Sensitive Data Disclosure Vulnerability There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. 6.5 Medium

Return to top

Before you upgrade!

Starting with 2024.2, SolarWinds Information Service (SWIS) will officially move to TCP 17774 exclusively and will stop listening on port TCP 17778. Please ensure all firewalls have been updated accordingly prior to upgrading. See End of support for details.

Return to top

Installation or upgrade

For new SolarWinds Platform deployments, download the installation file from the SolarWinds Platform product page on or from the Customer Portal. For more information, see Get the installer.

To activate SolarWinds Platform in an existing SolarWinds Platform deployment, use the License Manager.

For upgrades, go to Settings > My Deployment to initiate the upgrade. The SolarWinds Installer upgrades your entire deployment (all SolarWinds Platform products and any scalability engines).

For more information, see the SolarWinds Platform Product Installation and Upgrade Guide.

For supported upgrade paths to 2024.2, see Upgrade an existing deployment.

Return to top

End of life

Version EOL Announcements EOE Effective Dates EOL Effective Dates
2022.4 June 4, 2024: End-of-Life (EoL) announcement – Customers on SolarWinds Platform 2022.4 should begin transitioning to the latest version of SolarWinds Platform. July 4, 2024: End-of-Engineering (EoE) – Service releases, bug fixes, workarounds, and service packs for SolarWinds Platform 2022.4 will no longer be actively supported by SolarWinds. July 4, 2025: End-of-Life (EoL) – SolarWinds will no longer provide technical support for SolarWinds Platform 2022.4.
2022.3 February 6, 2024: End-of-Life (EoL) announcement – Customers on SolarWinds Platform 2022.3 should begin transitioning to the latest version of SolarWinds Platform. March 7, 2024: End-of-Engineering (EoE) – Service releases, bug fixes, workarounds, and service packs for SolarWinds Platform 2022.3 will no longer be actively supported by SolarWinds. March 7, 2025: End-of-Life (EoL) – SolarWinds will no longer provide technical support for SolarWinds Platform 2022.3.
2022.2 November 1, 2023: End-of-Life (EoL) announcement – Customers on SolarWinds Platform 2022.2 should begin transitioning to the latest version of SolarWinds Platform. December 1, 2023: End-of-Engineering (EoE) – Service releases, bug fixes, workarounds, and service packs for SolarWinds Platform 2022.2 will no longer be actively supported by SolarWinds. December 1, 2024: End-of-Life (EoL) – SolarWinds will no longer provide technical support for SolarWinds Platform 2022.2.

See the End of Life Policy for information about SolarWinds product life cycle phases. To see EoL dates for earlier SolarWinds Platform versions, see SolarWinds Platform release history.

Return to top

End of support

This version of SolarWinds Platform no longer supports the following platforms and features.

Type Details
TCP Port 17778 —SolarWinds Information Service (SWIS)

In previous versions, the SolarWinds Information Service (SWIS) listened on TCP 17778 and 17774. Starting in 2024.2, SWIS will officially move to TCP 17774 exclusively and will stop listening on port TCP 17778. Please ensure all firewalls have been updated accordingly prior to upgrading.

The SolarWinds Agent port will remain on TCP 17778 for agent-initiated connections.

If you are using DPAIM, make sure you are running DPA 2024.2 or later to switch to port 17774. Earlier DPA versions cannot send data to DPAIM on port 17774. See Specify the port DPA uses... for more information.

You can enable the port in Advanced Configuration by clearing the DisableSwisRestEndpointOnPort17778 option. See Enable/disable the SWIS endpoint port.

Return to top

Deprecation notice

The following platforms and features are still supported in the current release. However, they will be unsupported in a future release. Plan on upgrading deprecated platforms, and avoid using deprecated features.

Type Details
Network Atlas

Network Atlas is deprecated as of Orion Platform 2020.2. It is still available and supported in the current release, but will be removed in a future release. Deprecation is an indication that you should avoid expanded use of this feature and formulate a plan to discontinue using the feature. SolarWinds recommends that you start using Intelligent Maps in the SolarWinds Platform Web Console to display maps of physical and logical relationships between entities monitored by the SolarWinds Platform products you have installed.

Return to top

SolarWinds Platform products release notes

Hybrid Cloud Observability (all versions)

Network Management

Systems Management

Return to top

Legal notices

© 2024 SolarWinds Worldwide, LLC. All rights reserved.

This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software, services, and documentation are and shall remain the exclusive property of SolarWinds, its affiliates, and/or its respective licensors.


The SolarWinds, SolarWinds & Design, Orion, and THWACK trademarks are the exclusive property of SolarWinds Worldwide, LLC or its affiliates, are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other SolarWinds trademarks, service marks, and logos may be common law marks or are registered or pending registration. All other trademarks mentioned herein are used for identification purposes only and are trademarks of (and may be registered trademarks) of their respective companies.