![]() You can identify individual devices by hostname, IP address, or MAC address. ![]() ![]() To set up the white list, add rules that identify the devices to be included. Any device that connects to your network that is not on this list will appear in the Rogue Device widget, and will trigger the appropriate alert. UDT lets you create a list of these devices, referred to as the White List. There are usually devices that are never moved, and can be regarded as safe. ![]() You could monitor every device on your network, but in most cases this is not necessary. Rogue devices and setting up a White List of allowed devices
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |