Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17


Monitoring and detecting new connecting deviced to th network

Posted on 2011-02-23
Medium Priority
Last Modified: 2012-05-11
hi guys
i am looking for an application that detect any new devices connecting to my network and alert me with a popup message or an email
many thanks
Question by:Engamt
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2

Assisted Solution

BasementCat earned 600 total points
ID: 34967230
If you have a linux machine handy or some other unix-like OS around, you can do a quick and dirty cron job using nmap:
nmap -sP |grep "^Nmap scan report for" >devices1 && diff devices0 devices1 |grep "^>" && rm devices0 && mv devices1 devices0

Open in new window

cron can automatically email you when a command produces output, so in this case you would get a list of all new devices on the network that respond to an ICMP ping.

There probably is better software to do this, but this should work in a pinch

Assisted Solution

Rick_at_ptscinti earned 1400 total points
ID: 34967333
depending the size of the network and how tightly you want to control it, you could simply restrict access by MAC address authentication on the network switches.

Author Comment

ID: 34978704
MR.BasementCat and MR.Rick_at_ptscinti's
thanks for your reply
i dont have linux or unix machine in my network but i can have VM in my network but hte problem is that i am not femilior with OSs other than Windows  and i need to know more about this command and how to use it in linux machine
about my network i have about 50 pcs and i dont have managed switshes and i want an application to notifiy me when a computer or mobile is connected to my network
Understanding Web Applications

Without even knowing it, most of us are using web applications on a daily basis. Gmail and Yahoo email, Twitter, Facebook, and eBay are used by most of us daily—and they are web applications. We often confuse these web applications tools for websites.  So, what is the difference?


Accepted Solution

Rick_at_ptscinti earned 1400 total points
ID: 34979633
You can do that with a script like BasementCat recommended or with monitoring software....The issue you are going to have is that unless your environment is extremely static (no laptops and people don't turn off their PCs) you will get so many alerts that your will won't have the time to investigate each and determine if it is a rogue machine, or just some restarting their device.

You can build as much logic into the script as you needed and reach your goal, but I just think you would be better off to buy some managed switches and be done.  (if security is truly that important then the customer will spend the money)

It's always a balancing act when it comes to asking people to spend money, but I look at it like this.  If it going to cost me more money (because of my time) than it's going to save the company then it's time to spend the money.

Author Comment

ID: 35034847
i found the solution by using Network Magic , thanks every one for your help

Author Comment

ID: 35034849
i found the solution by using Network Magic , thanks every one for your help

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question