Submit a ticketCall us

AnnouncementsSystem Monitoring for Dummies

Tired of monitoring failures disrupting the system, application, and service? Learn the key monitoring concepts needed to help you create sophisticated monitoring and alerting strategies that can help you save time and money. Read the eBook.

Get your free eBook.

Home > Success Center > User Device Tracker (UDT) > UDT - Knowledgebase Articles > Add all Rogue Device MAC addresses to whitelist

Add all Rogue Device MAC addresses to whitelist

Table of contents

Updated December 27, 2017

Overview

This article provides guidance on building a bulk whitelist of the Rogue Devices based on MAC addresses.

Environment

  • UDT 3.2+

Steps

  1. Log in to the server UDT is installed on. 
  2. Open Database Manager and expand down to UDT database.
  3. Run the following query: SELECT * FROM [dbo].[UDT_Endpoint]
    where Rogue = 1
  4. Click the button Export to CSV. 
  5. Open the file in Excel.
  6. Format the document for comma delineation. 
  7. Copy the MAC addresses only from the MACAddresses column into a new Excel workbook and paste them in column A.
  8. Put the following formula in column B:

    =MID(A1,1,2)&":"&MID(A1,3,2)&":"&MID(A1,5,2)&":"&MID(A1,7,2)&":"&MID(A1,9,2)&":"&MID(A1,11,2)

  9. Drag the formula down to apply to all rows. 

  10. Copy the data from column B into your whitelist.

 

 

Last modified

Tags

Classifications

Public