User Device Tracker

Always know when and where users and endpoint devices are connected to your network

Starts at $1895
DOWNLOAD FREE TRIAL Fully functional for 30 days

Track endpoint devices by MAC and IP address on wired and wireless networks

Always know who and what is connected to your network, and when and where they are connected—without tracing cables or digging through ARP and MAC tables.

Manage switch and switch port capacity

Always know how switches and ports are being used, and which switches are nearing capacity.

Key Features

Endpoint device search

Locate connected devices easily by searching IP or MAC address, user, host, node, port, or vendor.

Screenshot

Device connection and user logon histories

Investigate incidents using extensive device connection and user logon histories.

Screenshot

User identification

View Active Directory® details for device users, including user name and contact information.

Screenshot

Endpoint device vendor identification

Know whether an endpoint device is a server or mobile phone.

Screenshot

Device and user watch lists

Detect rogue devices and users to improve network security using watch lists, alerts, and port shutdown.

Screenshot

WAP, switch, and port monitoring

Monitor wireless access points, switches, and ports for errors, performance, and capacity usage.

Screenshot

More Features

Multi-vendor device support

Compatible with many SNMP-managed switches and access points.

Remote port administration

Remotely turn switch ports on and off to improve security, or block endpoints and users.

Performance and capacity reporting

Out-of-the-box reports show current utilization metrics that help forecast capacity requirements.

Single pane of glass

One console to help locate users and devices and identify network and systems monitoring faults.

View port status and details

View port description, VLAN assignment, connected MACs, and port configuration.

Quick installation

Install, configure, and begin using User Device Tracker in about an hour.

Screenshots

  • screenshot Zoom

    Endpoint device search

  • screenshot Zoom

    Device connection and user logon histories

  • screenshot Zoom

    User identification

  • screenshot Zoom

    Endpoint device vendor identification

  • screenshot Zoom

    Device and user watch lists

  • screenshot Zoom

    WAP, switch, and port monitoring

  • screenshot Zoom

    Multi-vendor device support

  • screenshot Zoom

    Performance and capacity reporting

  • screenshot Zoom

    View port status and details

  • screenshot Zoom

    Remote port administration

  • screenshot Zoom

    Single pane of glass

System Requirements

SolarWinds recommends installing your SolarWinds product on its own server, with the Orion® Platform database hosted separately on its own SQL Server. Installations of multiple SolarWinds UDT servers using the same database are not supported. SolarWinds installations on VMware® virtual machines and Microsoft® virtual servers are fully supported. Please review all system requirements including those for virtual servers in the SolarWinds® User Device Tracker Administrator Guide.
  • Hard Drive 20GB
  • Memory4GB
  • CPUDual processor 3GHz
  • .NET Framework.NET 3.5 SP1 or .NET 4.0
  • Database
  • SQL Server® 2008 Express, Standard, or Enterprise, or SQL Server 2008 R2 / SQL Server 2012 Express, Standard, or Enterprise
  • Operating System
  • Windows Server® 2003 R2, 2008, and 2012 (32-bit or 64-bit), and with IIS installed, running in 32-bit mode
  • Web Console Browser
  • Microsoft Internet Explorer® 7, 8, or 9, Mozilla® Firefox® 3 or later or Google® Chrome® 8

Case Studies

With User Device Tracker, [we] receive detailed metrics on switch port utilization, top access points by current endpoints, and top SSIDs."

Michael Low
Systems Engineer, Marina Bay Sands

We use UDT so we can secure and properly document service accounts."

Kasey Kollar
Program Director of Technology, Bucks County Intermediate Unit #22

Our remote IT teams can find out what ports are being used or what ports are in which VLANs."

Napoleon Crowe
Systems Architect, FPP Business Services

By creating a white list for MAC addresses that should be on the network, the monitoring team is immediately alerted when a device that’s not on the white list appears on the network."


A leading provider of industrial cyber security solutions.

Award-Winning

Used by Companies Worldwide

Take the Next Step
Let's Talk it Over

Call Us at 866.530.8100