Submit a ticketCall us

Putting Your Logs Where They Belong with the New SolarWinds Log Manager for Orion

The new SolarWinds® Log Manager for Orion® finally puts your log data right where it belongs, in the heart of your Orion console. Gain insight into the performance of your infrastructure by monitoring your logs in a unified console allowing you to see a wealth of information about the health and performance of your network and servers.

Reserve a Seat for Wednesday May 23rd 11am CDT | Reserve a Seat for Tuesday May 22nd 10:30am GMT | Reserve a Seat for Tuesday May 22nd 1pm SGT / 3pm AEST

Home > Success Center > User Device Tracker (UDT) > UDT Administrator Guide > Manage the UDT White List

Manage the UDT White List

Table of contents
No headers

Updated February 22nd, 2017

The White List enables you to tell UDT which endpoints on your network you consider safe. Using that list UDT can report a list of endpoints on the network that you do not consider safe, and these endpoints appear in the Rogue Devices resource.

The White List also enables you to tell UDT which endpoints on your network to ignore altogether. Any endpoint that you want UDT to ignore becomes completely invisible to all its resources.

Rules determine how the White List influences UDT's endpoint monitoring behavior. By default UDT creates and enables three rules in the White List during software installation: any host name, any IP Address, and any MAC Address.

With default rules enabled, all endpoints connected to your monitored UDT devices are placed on the UDT White List list; and as a result no endpoints appear on the list in the Rogue Devices resource.

UDT treats an endpoint's MAC address, IP address, and host name as separate objects. Depending on white list inclusion rules, one or more of those objects could possibly appear in the Rogue Devices resource at the same time.

 
Last modified

Tags

Classifications

Public