Solution Overview

SolarWinds User Device Tracker

Locate users and devices on your network with User Device Tracker

At A Glance

Manage risks and network access requirements associated with the rise of IP-devices, with SolarWinds® User Device Tracker (UDT). UDT delivers automated user and device tracking along with powerful switch port management capabilities so you can stay in control of who and what is connecting to your network. Quickly find a computer or user, as well as track down lost or rogue devices with a simple search on a username, IP address, hostname, or MAC address. And, if the user or device is no longer connected, historical data shows the last known location. You can even create a whitelist, set up a watch list, and be alerted immediately when specific users or devices connect.

Features Overview

  • Quickly locate network devices
  • Map and monitor WAPs, switches, and ports
  • Manage switch and switch port capacity
  • Detect rogue devices and users
  • Turn ports on and off remotely
  • Unified IT administration dashboard

Key Features

Quickly locate network devices

Track endpoint devices by MAC and IP address on wired and wireless networks.

Immediately locate network devices on your LAN and wireless network, and retrieve switch name, port, port description, VLAN, VRF data, vendor information, all from a single console.

Map and monitor WAPs, switches, and ports

Monitor wireless access points, and switches for performance and errors.

Gain knowledge of port status and usage, response time, packet loss, CPU load, memory utilization and more.

Manage switch and switch port capacity

Always know how switches and ports are being used, and which switches are nearing capacity.

Easily identify switches operating at near capacity and see where you can reclaim unused ports. With out-of-the-box reports you’ll also receive current utilization metrics to help forecast capacity requirements.

Detect rogue devices and users

Trace unauthorized users and rogue devices on the LAN or wireless network.

Receive alerts when suspicious devices connect to your network. Create a device watch list by MAC address, IP address, or host name for both your wired and network devices.

Turn ports on and off remotely

Remotely turn switch ports on and off to improve security, or resolve issues such as IP conflicts.

Remotely shutdown a compromised network device port with point-and-click simplicity. Detect rogue devices and shutdown the port to mitigate security risks or prevent network problems.

Unified IT administration dashboard

UDT is part of the Orion® platform enabling a unified IT administration dashboard.

The UDT dashboard integrates with other SolarWinds management products including Network Performance Monitor, IP Address Manager, Network Configuration Manager, and more.

Resources

SolarWinds Helps Combat Industrial Cyber Threats
A leading provider of industrial cyber security solutions that focuses on protecting process industry facilities recommends SolarWinds IT management solutions to combat the growing risk of industrial cyber security threats and vulnerabilities.
Modularity, Scalability, and Reporting Helps Marina Bay Sands
When looking for a solution to replace PRTG, Marina Bay Sands sought out a modular and scalable family of products with advanced alerting and reporting that could be easily implemented.
How SolarWinds saves Immofori from staff downtime
Sven Meinks believes that if the computer systems running financial services companies AG Services Deutschland and Service Advisors Deutschland were to crash, it would take only two hours before their combined staff of 130 were unable to work or serve their customers. Fortunately Sven has implemented SolarWinds solutions which provide critical pre-emptive warning of possible network problems, and as a result there have been no systems failures.
Datasheet: User Device Tracker
SolarWinds User Device Tracker (UDT) makes it easy to instantly find a device and retrieve the switch name, port, port description, VLAN and more.
SolarWinds Overview Brochure
SolarWinds: IT Management That’s Powerful, Affordable, & Easy-to-Use!
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.
ebook: Redefining the network
Learn to tame your network now and transform it for the future.
Best Practices for Managing IP Resources
The proliferation of IP connected devices have created new challenges for network and systems administrators who manage DHCP, DNS and IP Addresses. In this paper, Brien Posey, freelance technology author, Microsoft MVP and former CIO, discusses best practices and what to look for in a DHCP, DNS and IP address management solution.
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.
The Stand: SolarWinds on Continuous Monitoring
Continuous monitoring is recognized as a powerful tool for identifying and mitigating potential threats to an agency’s infrastructure. But that’s just one aspect of its value, says SolarWinds. Continuous monitoring also can provide information technology professionals with invaluable insight into the health of that infrastructure. It’s all about dual use.
SolarWinds Federal Cybersecurity Survey Summary Report
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the results for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.
SolarWinds in the Enterprise
SolarWinds offers enterprise solutions that are the powerful, scalable, extensible and customizable.
Five Priorities for Network Security: EMA Essential IT Monitoring Series
Is your network security management strategy complete? Download this detailed assessment of the top ten priorities that ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) advocates for best practices in network security management.
How to Locate and Quarantine Unidentified Systems on Your Network
The challenge of finding rogue devices is complicated by two factors. The first is network complexity and the second is the persistence of forensic data. Clearly this is a problem for mobile or intermittent rouge systems and may make it impossible to perform an analysis days after an incident has occurred. Learn how SolarWinds User Device Tracker delivers automated user and device tracking along with port tracker and powerful switch port management capabilities so you can stay in control of who and what are connecting to your network.
Detecting and Preventing Rogue Devices
We live in an IP-connected world. Because your IP network is designed to provide distributed access, it’s porous and intended to be accessible by many types of devices. Therefore the objective of IT administrators is to limit access only to authorized devices. Learn how to manage the risks of rogue detection in this free whitepaper. Take an in-depth look at some of the challenges of efficiently tracking endpoints, keeping your network safe from rogue devices, and then offer best practices for keeping everything safe and running at peak performance.
eBook: 3 Simple Steps to Take Charge of Your Network Access Security
To help protect and safely resolve high-risk situations on the network, organizations need to take a proactive stance in controlling who and what is allowed on the network. SolarWinds User Device Tracker (UDT) can be tactically deployed to help you manage the onslaught of mobile devices and keep rogue devices from wreaking havoc on your network. UDT can help you set up and take charge of your network access security in 3 simple steps! Read to learn how.
Case Studies
SolarWinds Helps Combat Industrial Cyber Threats
A leading provider of industrial cyber security solutions that focuses on protecting process industry facilities recommends SolarWinds IT management solutions to combat the growing risk of industrial cyber security threats and vulnerabilities.
Modularity, Scalability, and Reporting Helps Marina Bay Sands
When looking for a solution to replace PRTG, Marina Bay Sands sought out a modular and scalable family of products with advanced alerting and reporting that could be easily implemented.
How SolarWinds saves Immofori from staff downtime
Sven Meinks believes that if the computer systems running financial services companies AG Services Deutschland and Service Advisors Deutschland were to crash, it would take only two hours before their combined staff of 130 were unable to work or serve their customers. Fortunately Sven has implemented SolarWinds solutions which provide critical pre-emptive warning of possible network problems, and as a result there have been no systems failures.
Data Sheets
Datasheet: User Device Tracker
SolarWinds User Device Tracker (UDT) makes it easy to instantly find a device and retrieve the switch name, port, port description, VLAN and more.
SolarWinds Overview Brochure
SolarWinds: IT Management That’s Powerful, Affordable, & Easy-to-Use!
Infographics
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.
White Papers
ebook: Redefining the network
Learn to tame your network now and transform it for the future.
Best Practices for Managing IP Resources
The proliferation of IP connected devices have created new challenges for network and systems administrators who manage DHCP, DNS and IP Addresses. In this paper, Brien Posey, freelance technology author, Microsoft MVP and former CIO, discusses best practices and what to look for in a DHCP, DNS and IP address management solution.
Continuous Monitoring: Managing the Unpredictable Human Element of Cybersecurity
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the infographic for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.
The Stand: SolarWinds on Continuous Monitoring
Continuous monitoring is recognized as a powerful tool for identifying and mitigating potential threats to an agency’s infrastructure. But that’s just one aspect of its value, says SolarWinds. Continuous monitoring also can provide information technology professionals with invaluable insight into the health of that infrastructure. It’s all about dual use.
SolarWinds Federal Cybersecurity Survey Summary Report
SolarWinds® partnered with leading government research provider Market Connections to survey 200 federal IT and IT security professionals to find out their top cybersecurity concerns and the obstacles they face when implementing IT security strategies. View the results for data on Security Event Detection, Continuous Monitoring Implementation and return on investment, top obstacles and frustrations, and cybersecurity threats and threat sources.
SolarWinds in the Enterprise
SolarWinds offers enterprise solutions that are the powerful, scalable, extensible and customizable.
Five Priorities for Network Security: EMA Essential IT Monitoring Series
Is your network security management strategy complete? Download this detailed assessment of the top ten priorities that ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) advocates for best practices in network security management.
How to Locate and Quarantine Unidentified Systems on Your Network
The challenge of finding rogue devices is complicated by two factors. The first is network complexity and the second is the persistence of forensic data. Clearly this is a problem for mobile or intermittent rouge systems and may make it impossible to perform an analysis days after an incident has occurred. Learn how SolarWinds User Device Tracker delivers automated user and device tracking along with port tracker and powerful switch port management capabilities so you can stay in control of who and what are connecting to your network.
Detecting and Preventing Rogue Devices
We live in an IP-connected world. Because your IP network is designed to provide distributed access, it’s porous and intended to be accessible by many types of devices. Therefore the objective of IT administrators is to limit access only to authorized devices. Learn how to manage the risks of rogue detection in this free whitepaper. Take an in-depth look at some of the challenges of efficiently tracking endpoints, keeping your network safe from rogue devices, and then offer best practices for keeping everything safe and running at peak performance.
eBook: 3 Simple Steps to Take Charge of Your Network Access Security
To help protect and safely resolve high-risk situations on the network, organizations need to take a proactive stance in controlling who and what is allowed on the network. SolarWinds User Device Tracker (UDT) can be tactically deployed to help you manage the onslaught of mobile devices and keep rogue devices from wreaking havoc on your network. UDT can help you set up and take charge of your network access security in 3 simple steps! Read to learn how.