IoT Security
Monitor IoT Security Health
Table of Contents
Expand All
|
Collapse All
IoT Security Docs
-
-
- Firewall Deployment Options for IoT Security
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
-
Monitor IoT Security Health
Monitor the health of your IoT Security app to ensure that you have full
visibility into your networks.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
To ensure that you get the most out of IoT Security, use the provided tools to
monitor the health of your IoT Securitysolution.
Reports let you to generate, schedule, and view detailed reports on device inventory,
risks, alerts, and utilization. You can customize report types, schedules, and filters
to focus on the most relevant information for your needs. Use reports to get a
high-level view of your network, track trends, and see the breadth and depth of
monitoring that IoT Security does.
To ensure IoT Security is working effectively, use the Data Quality Diagnostics
page to check the quality of network data being received. This helps identify issues
like IP endpoints without unique identifiers or low-confidence device classifications.
By monitoring these metrics, you can take steps to improve data quality and device
identification accuracy.
The IoT Security integration status pages for firewalls and Prisma Access
provide visibility into connectivity, log forwarding, and policy recommendation
requests. This helps you verify that IoT Security receives the necessary data to
perform its analysis and provide protection.
When deeper investigation is needed, the on-demand PCAP feature enables authorized
packet captures on firewalls. When you authorize on-demand PCAP, the IoT Security
Research Team can access network traffic metadata for offline analysis of unknown
devices or applications, enhancing threat detection capabilities.
By leveraging the full suite of monitoring and diagnostics tools, you ensure
IoT Security has high-quality data to work with, integration issues are quickly
identified, and you have the insights needed to remediate issues and maintain a strong
security posture for your IoT devices. This holistic approach lets you maximize
the value of IoT Security in protecting your critical IoT assets.