User Device Tracker Automated Device Tracking & Switch Port Management

Starts at $1795
  • Automatically discovers, maps, and monitors switches, ports, and network devices
  • Easily identify, locate, and block unauthorized devices and users on the network
  • Reliable and up-to-date information for switch port capacity planning and compliance requirements
  • Allows whitelisting and watch lists with automatic alerts and click-of-a-button port shutdown
  • Investigate device/user access with detailed information on switch port data and connection history
Still doing research? Get Online Quote Or... Skip Trial & Buy Now

Guided Tour

How do you find a user or device on your network when all you have is a name, IP address, or MAC address? SolarWinds® User Device Tracker
(UDT) makes it easy
to instantly find a user or device and retrieve the username, access point, switch name, port, port description, VLAN, and more. Simply search on a username, IP address, hostname, or MAC address and SolarWinds UDT quickly finds the current location of your user or device.

Download Free Trial Fully Functional For 30 Days

Quickly Find Missing and Rogue Devices and Get Critical Insight into Switch Port Utilization!

Are you having trouble controlling and keeping track of devices inside and outside of your network? Is there an unknown device that is stealthily stealing confidential company information? Do you discover that your switch is running at full capacity when you are about to set up a new server on your network?


Eliminate these unwanted situations and take complete control of your network access security. Manage the risks and network access requirements associated with the increase of IP devices with SolarWinds User Device Tracker (UDT). UDT delivers automated user and device tracking along with powerful switch port management capabilities so you can stay in control of who and what connects to your network. Quickly find a computer or user, as well as track down lost or rogue devices with a simple search on a username, IP address, hostname, or MAC address. And, if the user or device is no longer connected, historical data shows the device’s last known location. You can even create a whitelist or set up a watch list and be alerted immediately when a specific user or device connects. Switch port shutdown enables you to immediately block unauthorized network access and the switch port mapping feature allows you to proactively plan for your switch port capacity needs.

Top 5 Reasons to Use User Device Tracker

  • Quickly Locate Network Devices

    Quickly Locate Network Devices

    Locating missing or rogue devices is a common predicament in networks with hundreds of devices. Trying to track and locate a missing or unknown device manually often takes several hours and you still may or may not be successful. SolarWinds User Device Tracker (UDT) helps you easily track down device locations on your LAN and wireless network.

    Using SolarWinds UDT you can:

    • Quickly find network devices and retrieve switch name, port, port description, VLAN, VRF data, vendor information and more
    • Respond to security and network problems quickly by simply searching for devices/users by MAC address, IP address, or hostname
    • Receive an alert when a device from a new vendor connects to the network
    • Retrieve device data for wireless devices, including vendors Motorola® and Ruckus®

    To further support troubleshooting, UDT integrates with SolarWinds IP Address Manager (IPAM) to provide you with detailed information on IP-related data along with endpoint details.

    Learn More »
  • Trace and Block Unauthorized Users

    Trace and Block Unauthorized Users

    With the advent of Bring Your Own Device (BYOD) and the Internet of Things (IoT), there are large numbers of devices in the network that you need to keep track of. Knowingly or unknowingly, these devices may cause problems in the network. Some devices may be consuming large amounts of network resources and others may be trying to access sensitive information. SolarWinds UDT helps you quickly find rogue devices/users on the LAN or wireless network. By retrieving current and past connection information, you can quickly verify if the device is unauthorized.

    Using SolarWinds UDT you can:

    • Retrieve user connection details, including switch name or access point, port or SSID, hostname, and more
    • View current location and historical login information
    • Find endpoints where a specific user is or has been connected to the network
    • Create watch lists to track suspicious users

    You can now easily identify and locate unauthorized users. The switch port shutdown option further gives you the flexibility of cutting off network connectivity for the unauthorized device right from your workstation.

    SolarWinds UDT also seamlessly integrates with SolarWinds NetFlow Traffic Analyzer (NTA). This integration aids in identifying, locating, and blocking devices/users that hog network bandwidth unnecessarily.

    Learn More »
  • Map and Monitor Switch Ports

    Map and Monitor Switch Ports

    Administrators often find it difficult to keep track of the switch ports that are in use and those that are free. Sometimes, administrators discover that there are no available switch ports when setting up a new device like application servers, user devices, or other network devices. Switch port usage information is important for capacity planning and meeting compliance requirements. SolarWinds UDT helps you gain in-depth insight into port status and usage, CPU load, memory used, and more.

    Using SolarWinds UDT you can:

    • Display switches by ports used, CPU load, memory used, and more
    • Monitor port usage and capacity on every switch
    • Drill down from the switch level to specific ports for detailed port data
    • Create active and historical port utilization reports for switch capacity planning and meeting compliance requirements

    UDT allows you to easily discover switches operating at near capacity, as well as switches from which you can reclaim unused ports to facilitate intelligent capacity planning and purchase decisions.

    Learn More »
  • Network User and Device Watch List

    Network User & Device Watch List

    A suspicious device or user on the network may not be always connected, making it difficult for them to be detected and blocked. How can you know when an unauthorized device tries to access the network? SolarWinds UDT can help. When you detect unauthorized activity, you can place the unauthorized device/user on a watch list. By tagging the suspicious device through UDT, you receive an alert the next time the specified device/user connects to the network.

    Using SolarWinds UDT you can:

    • Create a device watch list by MAC address, IP address, or hostname for both your wired and wireless devices
    • Receive an alert when a watched user or device connects
    • Obtain details like node/access point, port/SSID, duration of connection, and connection type
    • Verify endpoint details and history of connections to confirm the identity of the device

    UDT enables you to take a proactive approach in finding network users/devices and keeping unwanted users off your network.

    Learn More »
  • Device Whitelisting

    Device Whitelisting

    As an administrator, you need to constantly be aware of your infrastructure activity and what devices/users access or try to access your network. To simplify your job, SolarWinds UDT lets you create a whitelist. This list carries the details of devices that are authorized to access your organization’s network. This is also a mechanism to identify “safe” and “rogue” devices trying to access the network.

    Using SolarWinds UDT you can:

    • Add individual or multiple endpoints based on IP address ranges, MAC address ranges, entire subnets, and custom patterns
    • Receive an alert when a device that’s not on the whitelist connects to the network
    • Define rules to determine if a network device should be ignored

    Devices connected to your network that are not on the whitelist immediately appear on your Rogue Devices resource list and an alert is automatically generated. Based on further investigation, you can allow or deny network access for these devices. If UDT is set to ignore a network device on the whitelist, it discards all related data. This is handy for HSRP and VRRP MAC addresses.

    Learn More »
Download Free Trial Fully Functional For 30 Days

System Requirements - One Software Fits All

Operating System

Windows® Server 2003, 2008, & 2012 (32-bit or 64-bit), and with IIS installed, running in 32-bit mode

CPU

Dual processor, 3 GHz

.Net Framework

.NET 3.5 SP1 or .NET 4.0

Memory

4 GB

Database

SQL Server® 2005 SP1 Express, Standard, or Enterprise / SQL Server 2008 Express, Standard, or Enterprise, or SQL Server 2008 R2 / SQL Server 2012 Express, Standard, or Enterprise

Hard Drive

20 GB

NOTE: The minimum server requirements listed assume default configuration. Significantly increasing the poll rate or statistic collection rate could result in additional load on the server, which may require a larger CPU or additional memory.

Must-Have Features of User Device Tracker

  • Automated Switch Port Discovery

    Automated Switch Port Discovery

    Administrators need to be aware of all devices on the network. Most network activity monitoring or tracking solutions require administrators to manually enter data on devices/users that access the network. SolarWinds UDT starts monitoring devices immediately. The automatic network discovery feature provides a comprehensive list of switch ports and devices that need to be monitored, which saves you the time and effort of performing this task manually.

    Using SolarWinds UDT you can:

    • Automatically discover switch topology and logically connect your devices
    • Schedule regular network scans to discover new or watched users and devices
    • Maintain a real-time list of switches and network devices

    You can schedule regular scans to automatically discover new devices and ensure that you always have an up-to-date view of your network. This saves you time by eliminating manual database entries.

    Learn More »
  • Remote Port Shutdown

    Remote Port Shutdown

    Identifying a rogue device on the network is one thing. But locating and blocking network access before it causes damage is what matters. SolarWinds UDT allows you to remotely shut down a compromised network device port with point-and-click simplicity.

    Using SolarWinds UDT you can:

    • Shut down a port directly from the SolarWinds UDT console with the click-of-a-button
    • View device port details and status with ease
    • Distinguish between ports that are administratively or operationally down

    With UDT, you can actively control who and what connects to your network. Now, when a rogue device connects or an error is caused by an offending device, you can simply shut down the port to mitigate security risks and prevent network problems. UDT integrates with SolarWinds IP Address Manager (IPAM), which provides detailed information on the IP address of a specific device. Receive alerts and easily fix IP conflicts. Troubleshoot and mitigate issues directly from the IPAM summary page.

    Learn More »
  • Customizable Network User & Device Reports

    Customizable Network User & Device Reports

    SolarWinds UDT allows you to automate report creation and distribution using customizable, out-of-the-box templates.

    Using SolarWinds UDT you can:

    • Create user and device reports using out-of-the-box and community-generated templates
    • Customize built-in user and device reports with a few simple mouse clicks
    • Automate report notifications for your management team to receive the relevant data they need
    • Obtain reports on wireless endpoints, active endpoints per node, connected MAC and IP addresses, unused switch ports, VLAN devices, and much more

    Integration with SolarWinds IPAM provides you with detailed IP address information like subnet, mask, status, type of IP address, etc.

    Learn More »
Download Free Trial Fully Functional For 30 Days

Demos

  • Demo: User Device Tracker

    Take a test drive and see how to instantly find a device and manage your switch names and ports with SolarWinds User Device Tracker.

Datasheets

Videos

Product FAQ

  • Q:  What is the difference between Switch Port Mapper and SolarWinds User Device Tracker (UDT)?

    A:  Switch Port Mapper is more of a troubleshooting tool when you need to look at the devices on a certain switch. Switch Port Mapper is used manually, and looks at one switch at a time. SolarWinds User Device Tracker scans your entire network and queries all of the switches, and does so automatically on a regular interval. UDT also saves this information so you can look up information in the past. In addition, User Device tracker allows you to track users and provides support for wireless infrastructure.

  • Q:  How is User Device Tracker licensed?

    Tier Ports
    UT2500 2500
    UT5000 5,000
    UT10000 10,000
    UT25000 25,000
    UT50000 50,000
    UTX Unlimited

  • Q:  Is SolarWinds User Device Tracker a module? Does it require SolarWinds Network Performance Monitor?

    A:  SolarWinds User Device Tracker can be installed either standalone or with existing products. No previous software is required.

Download Free Trial Fully Functional For 30 Days

Extensions

As your IT infrastructure grows, SolarWinds’ products scale to meet your monitoring and management needs.

Enterprise Operations Console (EOC)

Enterprise Operations Console (EOC)

Enterprise Operations Console delivers a consolidated command center for unified visibility into the remote SolarWinds deployments throughout your geographically distributed networks.

Learn More »

Additional Polling Engines

Additional Polling Engines

By adding additional polling engines, you can distribute the polling load between multiple servers to provide scalability for large IT infrastructures.

Learn More »

Failover Engine (FoE)

Failover Engine (FoE)

SolarWinds Failover Engine monitors the health of your SolarWinds servers to ensure you never lose visibility of the performance of monitored elements in your IT infrastructure. If something should happen to your primary SolarWinds server, the Failover Engine automatically fails over to a remote server.

Learn More »

Web Server Engine

Web Server Engine

By adding an additional web server engine, you can enable more users to access the dashboards and reports in the SolarWinds web portal without potential performance degradation.

Learn More »
Download Free Trial Fully Functional For 30 Days

Version History

v 3.2
SolarWinds User Device Tracker (UDT) v3.2 offers the following enhancements:

Advanced integration between SolarWinds IP Address Manager (IPAM) and SolarWinds User Device Tracker (UDT)

  • To help troubleshoot IP conflicts, display contextual IPAM data like subnet, mask, IP type (static/DHCP), and conflict type with endpoint details
  • To integrate subnet details with links to IPAM pages in port details resource
+ Read More
v 3.1
SolarWinds User Device Tracker (UDT) v3.1 offers the following enhancements:
  • Ports discovery has been moved to Orion’s Network Sonar Discovery engine, allowing re-use of existing discoveries used in other Orion products
  • Vendor pie chart displaying all actively connected endpoints summarized per vendor
  • Vendor identification based on MAC address added to Endpoint Details, Active Alerts, Rogue Devices, and other resources
  • Alert whenever a new MAC vendor appears on the network
  • Support for native Motorola and Ruckus APs and controllers
  • Scalability and performance optimization
+ Read More
v 3.0
User Device Tracker (UDT) v3.0 incorporates new key features to help you take a more proactive stance in managing who and what is connected to your network.
  • Whitelisting – Set up a whitelist of devices based on MAC address, IP address, or hostname.
  • Port Shutdown - Remotely shutdown a compromised device port.
  • Watch List - Add users to the Watch List.
  • Trap notifications - Get connectivity information in "real time"; receive an alert when a device not on whitelist connects to the network.
  • Domain Controller Wizard - Facilitate collection of user login information by configuring appropriate logging level on Windows® servers.
  • Virtual Route and Forwarding (VRF) - Polls devices for VRF data.
  • Alerts - Get an alert when an endpoint port changes.
  • Reports - See a report on Wireless Endpoints.
  • Groups - Add UDT ports to groups.
+ Read More
v 2.5
Support for wireless controllers and autonomous Access Points
v 2.0
User Tracking – quickly find where a user is logged in and who was logged in at a specific time
To see a complete version history for SolarWinds User Device Tracker, please visit our release notes .

Tips and Training

Tips and Training

Take a Guide Tour of Solarwinds User Device Tracker

Watch the Video
Awards & Props

We are known for our award-winning solutions, and we continue to strive for excellence with applications designed by IT pros, for IT pros.

  • awards
  • awards
  • awards
  • awards
Some of the companies that rely on us

SolarWinds is trusted by Fortune 500 companies, & small businesses alike.

  • awards
  • awards
  • awards
  • awards