The most recent content from our members.
I'm having a bit of an issue with the UDT rogue alert criteria. It seems to simply be "is this a rogue device?" and therefore when something triggers it triggers perpetually, such as if I clear the alert. Is this because I copied the canned alert, or is there some way to have this criteria not be forever triggered once a…
Unidentified devices on your network could be any device that intentionally or unintentionally attempts to breach sensitive company information or resources. The biggest risk posed by unidentified devices is that by the time they are detected and a breach has been discovered, it is possible that attackers have already…
Most network admins might have faced a “finding Waldo” situation – where Waldo is an unknown device that sometimes appears in your reports or logs: in your ‘ACL Deny’ logs as using non-business applications, in your NetFlow report as a bandwidth hog, as a problematic server in the cluster, as an unapproved NAS device in…
It appears that upon installation of UDT, the Wireless nodes already discovered in NPM are automatically added to UDT and we would like to have the ability to remove these wireless devices from UDT but not NPM. We are situated in an office block with other companies on other floors. Our wireless network is broadcast and…
I tried looking for an answer to my question and if there is one, I apologize for asking it again.... We are using UDT for rogue/unknown devices within our network. Currently I am allowing all IP addresses and MAC addresses but filtering on Hostnames. The reasoning behind this is that we use DHCP for a few of our devices…
It looks like you're new here. Sign in or register to get started.