The Unknown Devices drop-down menu contains functions that you can apply to the
selected Unknown Device. Click the drop-down menu button
next to
the Unknown Device name to display the drop-down menu.


The drop-down menu for unknown devices contains the following functions:
| Function | Description |
|---|---|
|
Alarms |
Accesses the Alarms tab where you can view the alarms for the selected unknown device. See Alarms for more information. |
|
Properties |
Opens the Properties overlay for the selected unknown device. |
|
Rename |
Opens a dialog window to rename the selected unknown device. |
|
Remove |
Removes the selected unknown device from your network. See Remove Devices for more information. |
|
Classification |
Classifies the unknown device as Sanctioned or Unsanctioned. |
|
Action Details |
Displays a table listing specific actions that are occurring to devices seen on your WLAN. |
|
Add to ACL |
Adds the selected Unknown Device to the Access Control List (ACL). |
|
Forensic Analysis |
Opens the Forensic Analysis - Basic window for the specified unknown device. |
|
Live View |
Opens the Live View window for the selected unknown device; allows you to analyze current WLAN activity on the device. |
|
Port Lookup |
Opens the Port Lookup window where you can locate the physical port where the Unknown Device is accessing your network. |
|
Terminate |
Accesses the Terminate options so that you can terminate the connection of the Unknown Device to your network. |
|
Copy MAC |
Copies the MAC address of the selected unknown device for later use. |