New Features in March 2025
Focus
Focus
IoT Security

New Features in March 2025

Table of Contents

New Features in March 2025

Review the new features introduced in IoT Security in March 2025.
Where Can I Use This?What Do I Need?
  • IoT Security (Managed by IoT Security)
  • IoT Security subscription for an advanced IoT Security product (Enterprise Plus, Industrial OT, or Medical)
The following new features and enhancements were introduced for IoT Security in March 2025.
New Features
Vulnerability signatures
The IoT Security Research team added detections for 394 vulnerabilities this month. Of the 394 vulnerabilities, 44 of them had a critical CVSS score. You can see a complete list of the CVEs for which detections have been added in the IoT Security portal by clicking the blue Announcements icon ( ? )Security Announcements.
Dictionary file update
There were four dictionary file updates in March 2025. The following summarizes what was added in each update:
  • March 05 update – 4 new profiles and 7 new vendors
  • March 12 update – 15 new profiles, 1 new vendor, 149 new OSes, and 105 new models
  • March 19 update – 7 new profiles and 2 new vendors
  • March 27 update – 21 new profiles, 5 new vendors, 1 new category, 10 new OSes, and 54 new models

Juniper Networks Mist AI Integration

IoT Security supports integrating with Juniper Networks Mist AI to learn about devices and wireless clients from Mist AI. IoT Security can retrieve device details from Mist AI and use that information to enrich device information in the IoT Security assets inventory. IoT Security also creates new devices in the asset inventory for devices learned through the Mist AI integration.

Telemetry Status for Firewalls

You can view the telemetry status of your firewalls under AdministrationFirewallsFirewalls. To view telemetry status on the Firewalls table, select Telemetry Enabled in the column selector. When you click on an individual firewall, the firewall details popup also displays the telemetry status. Firewall telemetry helps IoT Security learn additional subnet details, such as VLAN and security zone based on NGFW interface. When enabling telemetry on your firewall, select Device Health and Performance and Product Usage to help IoT Security learn subnet details.

PAN-OS Integration

IoT Security supports integrating with PAN-OS Next-Generation Firewalls to learn device details about the firewalls. This integration provides an alternative way to learn firwall data if a firewall doesn't have telemetry enabled. Through the integration, IoT Security learns firewall information such as hostname, MGMT interface IP address, and other network interfaces. If you want to learn subnets, you need to enable telemetry on the respective firewalls.

Redesigned Data Quality Page

We improved the AdministrationData Quality page to present more robust information on data quality issues, as well as guided workflows on how to improve the data. You can view three breakdowns: Basic Health Check, Low Inventory, and Missing Devices. Each breakdown provides a more granular view into gaps in your network visibility, as well as recommendations for improving visibility and coverage across your network.

Custom Alerts Enhancement

IoT Security supports using the Site attribute when defining the target devices in the Rule Engine Editor. You can access the Rule Engine Editor by going to AlertsCustom Alert Rules and creating a new custom alert rule or editing an existing alert rule.

Vulnerability Details Enhancement

When search for vulnerabilities using the query builder, you can now search by keyword, such as Apach log4j, or by advanced persistent threat (APT) associated with the vulnerability. The vulnerability keyword attribute maps to the NVD Title attribute on the Vulnerability Details page.
In the APT column in the vulnerabilties table, IoT Security now displays the number of APTs associated with each vulnerability. Click on the APT number to view more information about the APTs.

Multi-interface Enhancement

You can now search for interfaces based on their MAC addresses, even when there are multiple MAC addresses for a single interface, or for multi-interface devices. When viewing interface information on a primary device's Device Details page, you can see the MAC addresses of the individual interfaces and the source from which those interfaces were learned.

Subnet Monitoring Enhancement

IoT Security updated the subnet monitoring workflow for a more intuitive experience. When you start or stop monitoring a block, all of its children networks (blocks and subnets) inherit the same monitoring status. You can vew the monitoring status of your network in the Networks table under NetworksNetworks and SitesNetworks.
When you stop monitoring a subnet, IoT Security removes all of the devices and IP endpoints associated with that subnet. IoT Security also resolves the alerts, and removes the vulnerability instances, associated with the subnet's devices. If you start monitoring the subnet again, IoT Security adds the related assets back to the inventory, reopens alerts, and adds back the vulnerability instances.