You must create device objects for any devices that
do not have an IoT Security policy rule recommendation. For example,
you cannot secure devices such as laptops and smartphones using
IoT Security policy rule recommendations, so you must create device
objects for these types of devices and use them in your Security
policy to secure these devices.