Network Monitoring Tools – Network Management | Technosoft Solutions

SolarWinds® User Device Tracker (UDT) is equipped with risk management and network access requirements making it easy to tackle the
swift increase in IP devices.Control and manage the record of all users

with an automated user and device tracking feature and switch port management capabilities which keep you informed about who and what is connecting to your network. Locate any connected devices without any hassle by searching IP or MAC address, user, host, node, port, or vendor. UDT also enables you to search for previous users along with their last known location. With easy-to-use, point-and-click Web interface, it allows you to monitor switch port usage and make well-researched resource planning decisions.

  • Saves time by ditching the manual practice of tracking and locating an unknown device. UDT helps to instantly find network devices and retrieve switch name, port, port description, VLAN, VRF data, vendor information, and more. Track the device location on your WAN or wireless network. To provide you more detailed information, it seamlessly integrates with SolarWinds IP Address Manager (IPAM).
  • Prevents unauthorised users from hogging the network by retrieving current and past connection information. By integrating it with SolarWinds NetFlow Traffic Analyzer (NTA), you can quickly identify, locate, and block devices/users that unnecessarily consume network bandwidth.
  • UDT helps to identify switches operating at full capacity, as well as switches from which unused ports can be recovered. This helps in giving in-depth information into port status and usage, CPU load, memory used, and more. With out-of-the-box reports that are equipped with current utilization metrics, you can forecast the capacity requirements.
  • UDT schedules regular scans which allow new devices to be discovered automatically, thereby saving time and effort while making sure you always have an up-to-date view of your network.
  • Creates a device watch list by MAC address, IP address, or hostname for both your wired and wireless devices. By tagging the suspicious device through UDT, you receive an alert the next time the specified device/user connects to the network.