Manage the risks and network access requirements associated with the increase of IP devices with SolarWinds User Device Tracker (UDT). UDT delivers automated user and device tracking along with powerful switch port management capabilities so you can stay in control of who and what connects to your network. Quickly find a computer or user, as well as track down lost or rogue devices with a simple search on a username, IP address, hostname, or MAC address. And, if the user or device is no longer connected, historical data shows the device’s last known location. You can even create a whitelist or set up a watch list and be alerted immediately when a specific user or device connects. Switch port shutdown enables you to immediately block unauthorized network access and the switch port mapping feature allows you to proactively plan for your switch port capacity needs.
Quickly Locate Network Devices
Locating missing or rogue devices is a common predicament in networks with hundreds of devices. Trying to track and locate a missing or unknown device manually often takes several hours and you still may or may not be successful. SolarWinds User Device Tracker (UDT) helps you easily track down device locations on your LAN and wireless network.
Trace and Block Unauthorised Users
With the advent of Bring Your Own Device (BYOD) and the Internet of Things (IoT), there are large numbers of devices in the network that you need to keep track of. Knowingly or unknowingly, these devices may cause problems in the network. Some devices may be consuming large amounts of network resources and others may be trying to access sensitive information. SolarWinds UDT helps you quickly find rogue devices/users on the LAN or wireless network. By retrieving current and past connection information, you can quickly verify if the device is unauthorised.
Map and Monitor Switch Ports
Administrators often find it difficult to keep track of the switch ports that are in use and those that are free. Sometimes, administrators discover that there are no available switch ports when setting up a new device like application servers, user devices, or other network devices. Switch port usage information is important for capacity planning and meeting compliance requirements. SolarWinds UDT helps you gain in-depth insight into port status and usage, CPU load, memory used, and more.
Network User and Device Watch List
A suspicious device or user on the network may not be always connected, making it difficult for them to be detected and blocked. How can you know when an unauthorised device tries to access the network? SolarWinds UDT can help. When you detect unauthorised activity, you can place the unauthorised device/user on a watch list. By tagging the suspicious device through UDT, you receive an alert the next time the specified device/user connects to the network.
As an administrator, you need to constantly be aware of your infrastructure activity and what devices/users access or try to access your network. To simplify your job, SolarWinds UDT lets you create a whitelist. This list carries the details of devices that are authorised to access your organisation’s network. This is also a mechanism to identify “safe' and “rogue' devices trying to access the network.