Scans the network for new devices that may have connected to the network without permission.
The Rogue Machine Event Monitor searches your network for unrecognized systems.
This event monitor provides the following options:
This option tells the event monitor to look in the local NetBIOS tables for unrecognized systems.
This option lets you specify IP address ranges where the even monitor will search for unrecognized systems.
The event monitor can use multiple protocols to detect unrecognized systems. Use this option to tell it to use ICMP pings. ICMP pings are one of the best methods to detect rogue machines.
Use this option to tell the event monitor to use ARP requests to detect unrecognized systems. ARP requests only work on the local subnet.
Use this option to tell the event monitor to use HTTP requests to detect unrecognized systems. HTTP requests will detect systems that are hosting web servers.
Use this option to tell the event monitor to use SNMP requests to detect unrecognized systems. SNMP requests will detect networking equipment and other systems that support SNMP.
With this option enabled, the event monitor will remember the list of systems it found on the last run. If the current run detects any changes, the event monitor will alert you with the selected status level.
Use this option to exclude selected devices and tell the event monitor not to alert about them.
This event monitor does not require any authentication.
Click on a protocol to learn more.
This event monitor generates the following data points:
Data Point | Description |
---|---|
Rogue Count | The number of rogues detected. |
To view the tutorial for this event monitor, click here.
Add a comment