Submit a ticketCall us

WebinarUpcoming Webinar: How Help Desk and Remote Support Pays for Itself

Learn how help desk software can simplify ticketing management, allow you to track hardware and software assets, and accelerate the speed of IT support and service delivery. Gain insights on how remote support tools allow your IT team to maximize their efficiency and ticket resolution by expediting desktop troubleshooting, ultimately helping keep end-users happy and productive.

Register here.

Home > Success Center > User Device Tracker (UDT) > User Device Tracker (UDT) Documentation > UDT Administrator Guide > Manage the UDT White List > Add Endpoints to the White List

Add Endpoints to the White List

Table of contents
No headers
Created by Steven Bansil_ret, last modified by Steven Bansil_ret on Jan 18, 2017

Views: 188 Votes: 0 Revisions: 2

UDT uses inclusion rules to determine which endpoints are connected to UDT both monitored devices that are safe and unsafe. Endpoints that are determined by UDT as unsafe are not covered by the White List rules but can be found in the Rogue Devices resource.

UDT White List determines endpoints using the following rules by default: host name, IP Address, and MAC addresses. With these rules enabled, all endpoints connected to your monitored UDT devices are placed on your white list.

For further information, see:

 

 
Last modified

Tags

Classifications

Public