Submit a ticketCall us

whitepaperYour VM Perplexities Called, and They Need You to Read This.

Virtualization can give you enormous flexibility with future workloads and can be a key enabler for other areas, like cloud computing and disaster recovery. So, how can you get a handle on the performance challenges in your virtual environment and manage deployments without erasing the potential upside? Learn the four key areas you need to be focusing on to help deliver a healthy and well-performing data center.

Get your free white paper.

Home > Success Center > User Device Tracker (UDT) > User Device Tracker (UDT) Documentation > UDT Administrator Guide > Manage the UDT White List > Add Endpoints to the White List

Add Endpoints to the White List

Table of contents
No headers
Created by Steven Bansil_ret, last modified by Steven Bansil_ret on Jan 18, 2017

Views: 256 Votes: 0 Revisions: 2

UDT uses inclusion rules to determine which endpoints are connected to UDT both monitored devices that are safe and unsafe. Endpoints that are determined by UDT as unsafe are not covered by the White List rules but can be found in the Rogue Devices resource.

UDT White List determines endpoints using the following rules by default: host name, IP Address, and MAC addresses. With these rules enabled, all endpoints connected to your monitored UDT devices are placed on your white list.

For further information, see:

 

 
Last modified

Tags

Classifications

Public