Monitor IoT Security Health
Focus
Focus
IoT Security

Monitor IoT Security Health

Table of Contents

Monitor IoT Security Health

Monitor the health of your IoT Security app to ensure that you have full visibility into your networks.
Where Can I Use This?What Do I Need?
  • IoT Security (Managed by IoT Security)
  • IoT Security subscription for an advanced IoT Security product (Enterprise Plus, Industrial OT, or Medical)
To ensure that you get the most out of IoT Security, use the provided tools to monitor the health of your IoT Securitysolution.
Reports let you to generate, schedule, and view detailed reports on device inventory, risks, alerts, and utilization. You can customize report types, schedules, and filters to focus on the most relevant information for your needs. Use reports to get a high-level view of your network, track trends, and see the breadth and depth of monitoring that IoT Security does.
To ensure IoT Security is working effectively, use the Data Quality Diagnostics page to check the quality of network data being received. This helps identify issues like IP endpoints without unique identifiers or low-confidence device classifications. By monitoring these metrics, you can take steps to improve data quality and device identification accuracy.
The IoT Security integration status pages for firewalls and Prisma Access provide visibility into connectivity, log forwarding, and policy recommendation requests. This helps you verify that IoT Security receives the necessary data to perform its analysis and provide protection.
When deeper investigation is needed, the on-demand PCAP feature enables authorized packet captures on firewalls. When you authorize on-demand PCAP, the IoT Security Research Team can access network traffic metadata for offline analysis of unknown devices or applications, enhancing threat detection capabilities.
By leveraging the full suite of monitoring and diagnostics tools, you ensure IoT Security has high-quality data to work with, integration issues are quickly identified, and you have the insights needed to remediate issues and maintain a strong security posture for your IoT devices. This holistic approach lets you maximize the value of IoT Security in protecting your critical IoT assets.