Collection: SolarWinds User Device Tracker

SolarWinds User Device Tracker

Filter products

56 Products

SolarWinds User Device Tracker

SolarWinds User Device Tracker (UDT) is a monitoring tool that keeps an eye on the devices, ports, and users within your network. It allows you to assess port usage and capacity, receive alerts about potential issues, pinpoint device locations within your network, and access detailed capacity analysis information. UDT regularly gathers data from switches and routers to compile a database containing current and historical data about device connections. This data helps track where a particular device has been connected over time. Additionally, UDT monitors user login activity by polling Active Directory domain controllers' event logs. With this information, it offers real-time and historical insights into the network endpoints that users have been linked to. It also provides focused device and port monitoring for network engineers.

DESCRIPTION

  • The SolarWinds UDT shows the wireless access point, network switch, and switch port the endpoint device is connected to.
  • SolarWinds User Device Tracker (UDT) automates network tracking and monitors both users and devices.
  • Designed to automatically discover, map, and monitor switches, ports, and network devices.
  • Use a watch list to track sensitive or questionable devices.

FEATURES

How does SolarWinds User Device Tracker work?

SolarWinds UDT sends SNMP requests to your network framework to deliver real-time information about your monitored devices. Users and trends are tracked using statistics saved in the SolarWinds Platform database. In accordance with the SolarWinds common components framework, no agents are deployed on your servers, and there is no remote software to manage. All calls are made in real time and shown on a web interface that can be accessed using any compatible browser.

What are the capabilities of UDT?

UDT provides automatic tracking of users and devices on your network. It also helps you manage switch ports effectively so you can monitor who and what is connected to your network. You can easily locate a computer or user and identify lost or unauthorized devices by searching using a username, IP address, computer name, or MAC address.

FAQs