Submit a ticketCall us

Cloud Workloads: Meet Your New Hybrid IT Reality
Have you found yourself in that evolving, hybrid IT grey area and wondering if cloud workloads are now part of your purview? And if so, will monitoring cloud workloads require a new set of dedicated cloud monitoring tools? Your answers: yes, they should be, and no, they don’t.

Find out how SolarWinds® Server & Application Monitor (SAM) can help you monitor your cloud workloads side by side with your on-premises workloads. Register Now.

Home > Success Center > User Device Tracker (UDT) > UDT Administrator Guide > Manage the UDT White List > Add Endpoints to the White List

Add Endpoints to the White List

Table of contents
No headers
Created by Steven Bansil_ret, last modified by Steven Bansil_ret on Jan 18, 2017

Views: 53 Votes: 0 Revisions: 2

UDT uses inclusion rules to determine which endpoints are connected to UDT both monitored devices that are safe and unsafe. Endpoints that are determined by UDT as unsafe are not covered by the White List rules but can be found in the Rogue Devices resource.

UDT White List determines endpoints using the following rules by default: host name, IP Address, and MAC addresses. With these rules enabled, all endpoints connected to your monitored UDT devices are placed on your white list.

 
Last modified

Tags

Classifications

Public