Network Security
Policy Object: Devices
Table of Contents
Expand All
|
Collapse All
Network Security Docs
-
- Security Policy
-
- Security Profile Groups
- Security Profile: AI Security
- Security Profile: WildFire® Analysis
- Security Profile: Antivirus
- Security Profile: Vulnerability Protection
- Security Profile: Anti-Spyware
- Security Profile: DNS Security
- Security Profile: DoS Protection Profile
- Security Profile: File Blocking
- Security Profile: URL Filtering
- Security Profile: Data Filtering
- Security Profile: Zone Protection
-
- Policy Object: Address Groups
- Policy Object: Regions
- Policy Object: Traffic Objects
- Policy Object: Applications
- Policy Object: Application Groups
- Policy Object: Application Filter
- Policy Object: Services
- Policy Object: Auto-Tag Actions
- Policy Object: Devices
-
- Uses for External Dynamic Lists in Policy
- Formatting Guidelines for an External Dynamic List
- Built-in External Dynamic Lists
- Configure Your Environment to Access an External Dynamic List
- Configure your Environment to Access an External Dynamic List from the EDL Hosting Service
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Policy Object: HIP Objects
- Policy Object: Schedules
- Policy Object: Quarantine Device Lists
- Policy Object: Dynamic User Groups
- Policy Object: Custom Objects
- Policy Object: Log Forwarding
- Policy Object: Authentication
- Policy Object: Decryption Profile
- Policy Object: Packet Broker Profile
-
-
-
- The Quantum Computing Threat
- How RFC 8784 Resists Quantum Computing Threats
- How RFC 9242 and RFC 9370 Resist Quantum Computing Threats
- Support for Post-Quantum Features
- Post-Quantum Migration Planning and Preparation
- Best Practices for Resisting Post-Quantum Attacks
- Learn More About Post-Quantum Security
-
-
-
- Investigate Reasons for Decryption Failure
- Identify Weak Protocols and Cipher Suites
- Troubleshoot Version Errors
- Troubleshoot Unsupported Cipher Suites
- Identify Untrusted CA Certificates
- Repair Incomplete Certificate Chains
- Troubleshoot Pinned Certificates
- Troubleshoot Expired Certificates
- Troubleshoot Revoked Certificates
Policy Object: Devices
Where Can I Use This? | What Do I Need? |
---|---|
|
Also known as the Device Dictionary, the Devices page contains metadata for device objects.
Review information for existing device objects or add new device objects. Using device
objects as match criteria in Security policy allows you to create device-based policy,
where the Security policy is dynamically updated and applied to new and existing
devices. Palo Alto Networks updates the Device Dictionary via dynamic updates.
To configure this and any other Object settings, go to:
- ManageConfigurationNGFW and Prisma AccessObjects on Cloud Managed deployments, and select the object you want to configure.
- Objects on PAN-OS and Panorama Managed deployments, and select the object you want to configure from the panel on the left.
Devices Fields
Here are the fields in a Devices object:
Button/Field | Description |
---|---|
Name | The name of the device object. |
Location | The location of the device group for the device object. |
Category | The category of the device object (for example, Video Audio Conference). |
Profile | The device profile for the device object. |
Model | The model of the device object. |
OS Version | The OS version of the device object. |
OS Family | The OS family of the device object. |
Vendor | The vendor for the device object. |
Add | Click Add to add a new device object. Enter a Name and optionally, a Description. Select additional metadata for the device, such as Category, OS, and Model. You can also Browse the list of devices to select the device you want to add. Click OK to confirm your changes. |
Delete | Select a device object you no longer need then Delete it. |
Move | Select the device object you want to move then Move it. |
Clone | Select the device object on which to base the new device profile and Clone it. |
PDF/CSV | Export the list of devices in PDF/CSV format. You can apply filters to create more specific outputs as needed. Only visible columns in the web interface will be exported. |