Arrest the Culprit!

dreamstime_xs_33986796_culprit

dreamstime_xs_33986796_culprit dreamstime_xs_33986796_culpritDear JDisc Friends,

I would like to share a pretty nice story that illustrates the value of having an up-to-date network documentation.

Recently one of our clients contacted us and he said: „Look, we have some device on the network that uses the same IP address as our Microsoft Exchange server!“. Of course, that causes trouble and affects the Microsoft Exchange server’s operation. The only thing he knew is the MAC address that has been recorded in the Exchange server’s event log. But the question is how to find the machine with the MAC address! You might check out the ARP caches of your routers in case you have access to them. However, the suspect migth be already offline and thus the entry might have been already deleted from the router’s ARP caches. Finding the device is not so easy without having an up-to-date network documentation. With JDisc Discovery, the client could create a custom report including all MAC addresses and then easily find the device with the suspicious MAC address.

This is just another example why an accurate network documentation is so important…

See ya!
Thomas

About The Author

Thomas Trenz
I own and manage JDisc and its network inventory and discovery products. Before I started JDisc, I worked quite a long time for Hewlett-Packard developing software for network assessments and inventory projects. Feel free to contact me on Linked-In or Xing.

Leave A Comment


Der Zeitraum für die reCAPTCHA-Überprüfung ist abgelaufen. Bitte laden Sie die Seite neu.