Monitoring and detecting new connecting deviced to th network

Posted on 2011-02-23
Last Modified: 2012-05-11
hi guys
i am looking for an application that detect any new devices connecting to my network and alert me with a popup message or an email
many thanks
Question by:Engamt
  • 3
  • 2

Assisted Solution

BasementCat earned 150 total points
ID: 34967230
If you have a linux machine handy or some other unix-like OS around, you can do a quick and dirty cron job using nmap:
nmap -sP |grep "^Nmap scan report for" >devices1 && diff devices0 devices1 |grep "^>" && rm devices0 && mv devices1 devices0

Open in new window

cron can automatically email you when a command produces output, so in this case you would get a list of all new devices on the network that respond to an ICMP ping.

There probably is better software to do this, but this should work in a pinch

Assisted Solution

Rick_at_ptscinti earned 350 total points
ID: 34967333
depending the size of the network and how tightly you want to control it, you could simply restrict access by MAC address authentication on the network switches.

Author Comment

ID: 34978704
MR.BasementCat and MR.Rick_at_ptscinti's
thanks for your reply
i dont have linux or unix machine in my network but i can have VM in my network but hte problem is that i am not femilior with OSs other than Windows  and i need to know more about this command and how to use it in linux machine
about my network i have about 50 pcs and i dont have managed switshes and i want an application to notifiy me when a computer or mobile is connected to my network
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.


Accepted Solution

Rick_at_ptscinti earned 350 total points
ID: 34979633
You can do that with a script like BasementCat recommended or with monitoring software....The issue you are going to have is that unless your environment is extremely static (no laptops and people don't turn off their PCs) you will get so many alerts that your will won't have the time to investigate each and determine if it is a rogue machine, or just some restarting their device.

You can build as much logic into the script as you needed and reach your goal, but I just think you would be better off to buy some managed switches and be done.  (if security is truly that important then the customer will spend the money)

It's always a balancing act when it comes to asking people to spend money, but I look at it like this.  If it going to cost me more money (because of my time) than it's going to save the company then it's time to spend the money.

Author Comment

ID: 35034847
i found the solution by using Network Magic , thanks every one for your help

Author Comment

ID: 35034849
i found the solution by using Network Magic , thanks every one for your help

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now