The most recent content from our members.
Now with version 3.0 of SolarWinds User Device Tracker (UDT) you can define a set of rules to determine if a network device belongs on your white list. If so, the device appears in UDT resources list as a safe device. Devices connected to your network that are not on the white list will appear in the Rogue Devices resource…
I'm trying to identify rogue switches on my network. I don't have UDT but I was trying to write a SQL query to identify nodeaccesspoints with multiple associated MAC addresses. Here's what I had so far: SELECT TOP 1000 nodeaccesspoint, portname, macaddress FROM [dbo].[UDT_MACCurrentInformation] GROUP BY…
Access control through whitelists can limit unwarranted users from gaining access to an organization’s network. But once it is found that users belong to the network, additional authorization determines what services they have access to. Even then, the possibility of a threat or a breach from a rogue within is something…
An important part of monitoring is reducing the noise of unnecessary alerts. In monitoring the connection ports on your network devices, while you want to know what endpoints are connected through which ports, you can usually function best when those connections are presented through an event log. In contrast, an alert is…
I tried looking for an answer to my question and if there is one, I apologize for asking it again.... We are using UDT for rogue/unknown devices within our network. Currently I am allowing all IP addresses and MAC addresses but filtering on Hostnames. The reasoning behind this is that we use DHCP for a few of our devices…
It looks like you're new here. Sign in or register to get started.