Submit a ticketCall us

Announcing NCM 7.7
With NCM 7.7, you can examine the rules that make up an access control list for a Cisco ASA device. Then you can apply filters to display only rules that meet the specified criteria, order the rules by line number or by the hit count, and much more.
See new features and improvements.

Home > Success Center > User Device Tracker (UDT) > UDT Administrator Guide > Manage the UDT White List > Add Endpoints to the White List

Add Endpoints to the White List

Table of contents
No headers
Created by Steven Bansil_ret, last modified by Steven Bansil_ret on Jan 18, 2017

Views: 42 Votes: 0 Revisions: 2

UDT uses inclusion rules to determine which endpoints are connected to UDT both monitored devices that are safe and unsafe. Endpoints that are determined by UDT as unsafe are not covered by the White List rules but can be found in the Rogue Devices resource.

UDT White List determines endpoints using the following rules by default: host name, IP Address, and MAC addresses. With these rules enabled, all endpoints connected to your monitored UDT devices are placed on your white list.

 
Last modified
18:08, 17 Jan 2017

Tags

Classifications

Public