Strata Cloud Manager
Dashboard: IoT Security
Table of Contents
Expand All
|
Collapse All
Strata Cloud Manager Docs
-
- Command Center: Strata Cloud Manager
- Reports: Strata Cloud Manager
-
- Dashboard: Build a Custom Dashboard
- Dashboard: Executive Summary
-
- WildFire Dashboard: Filters
- WildFire Dashboard: Submissions and Verdicts
- WildFire Dashboard: Analysis Insights
- WildFire Dashboard: Verdict Trends
- WildFire Dashboard: Verdict Distribution
- WildFire Dashboard: Recent Submissions
- WildFire Dashboard: Submissions Per Source Application
- WildFire Dashboard: Submission Per Destination User
- WildFire Dashboard: Malware Regions
- WildFire Dashboard: Firewalls
- Dashboard: DNS Security
- Dashboard: AI Runtime Security
- Dashboard: IoT Security
- Dashboard: Prisma Access Usage
-
- Application Experience Dashboard: Mobile User Experience Card
- Application Experience Dashboard: Remote Site Experience Card
- Application Experience Dashboard: Experience Score Trends
- Application Experience Dashboard: Experience Score Across the Network
- Application Experience Dashboard: Global Distribution of Application Experience Scores
- Application Experience Dashboard: Experience Score for Top Monitored Sites
- Application Experience Dashboard: Experience Score for Top Monitored Apps
- Application Experience Dashboard: Application Performance Metrics
- Application Experience Dashboard: Network Performance Metrics
- Dashboard: Best Practices
- Dashboard: Compliance Summary
-
- Prisma SD-WAN Dashboard: Device to Controller Connectivity
- Prisma SD-WAN Dashboard: Applications
- Prisma SD-WAN Dashboard: Top Alerts by Priority
- Prisma SD-WAN Dashboard: Overall Link Quality
- Prisma SD-WAN Dashboard: Bandwidth Utilization
- Prisma SD-WAN Dashboard: Transaction Stats
- Prisma SD-WAN Dashboard: Predictive Analytics
- Dashboard: PAN-OS CVEs
- Dashboard: CDSS Adoption
- Dashboard: Feature Adoption
- Dashboard: On Demand BPA
- Manage: IoT Policy Recommendation
- Manage: Enterprise DLP
- Workflows: SaaS Security
- Manage: Prisma Access Browser
-
-
- Strata Cloud Manager Release Information
-
- New Features in January 2025
- New Features in December 2024
- New Features in November 2024
- New Features in October 2024
- New Features in September 2024
- New Features in August 2024
- New Features in July 2024
- New Features in June 2024
- New Features in May 2024
- New Features in April 2024
- New Features in March 2024
- New Features in February 2024
- New Features in January 2024
- New Features in November 2023
- New Features in October 2023
- New Features in September 2023
- Known Issues
- Addressed Issues
- Getting Help
Dashboard: IoT Security
See information about the devices on the network and their distribution across
subnets.
Where Can I Use This? | What Do I Need? |
---|---|
|
Each of these licenses include access to Strata Cloud Manager:
The other licenses and prerequisites needed for visibility
are:
→ The features and capabilities available to you in Strata Cloud Manager depend on which license(s) you are
using.
|
To get started, select DashboardsMore DashboardsIoT Security.
What does this dashboard show you?
The IoT Security dashboard provides information about the devices on the
network, their device profiles and operating systems, and how they are distributed
by device type across subnets. For advanced IoT Security products (Enterprise IoT Security
Plus, Industrial IoT Security, or Medical IoT Security), the
IoT Security dashboard additionally displays the total
number of active alerts to date and vulnerabilities to date.
- Assets - From here, you can see a dynamically maintained inventory of
the IoT, OT, and IT devices on your network with numerous attributes for
each one such as its IP and MAC addresses; profile, vendor, model, and OS;
and (for advanced IoT Security products) its
device-level risk score. Use the data in this inventory to learn about the assets on your network:
- View a dynamically generated and up-to-date inventory of the devices detected on your network, including IoT, OT, and IT devices.
- While the IoT Dashboard displays the types of devices you have at a high level, the Assets inventory lets you explore individual devices to see more details and assess their security posture.
- Filter the data displayed in the dashboard by site, device type, period of time, and one or more device attributes to see data about devices of interest.
- Show and hide columns to view device attributes that are important to you. There are over 100 attribute columns from which to choose.
- Download the data displayed on the currently active page as a file in CSV format for inclusion in reports or for future reference. The file contains the devices and device attributes that you have on display at the time of the download.
- Vulnerabilities: The Vulnerability tab lets you customize how
information about vulnerabilities and vulnerability instances is presented
so you can view their impact on your devices from different perspectives. By
setting filters, you determine the scope of the information displayed, and
by defining queries and settings, you control the types of vulnerabilities
and the types of devices you want to see.The Vulnerabilities page lists the vulnerabilities that IoT Security has detected or learned about through a third-party integration.You can search for a text string in any of the columns, download the list of vulnerabilities, create a filter to show only the vulnerabilities you want to see, and control which columns you want to show and hide.While a severity level in the IoT Security system reflects a Common Vulnerability Scoring System (CVSS) score, there isn’t always a direct correlation between the two. IoT Security bases the severity level not only on the CVSS score but on other determining risk factors as well. For example, a hard-coded password in a device might have a CVSS score of 10.0, but an IoT Security severity level of High rather than Critical. This can happen when there isn’t proof that the device can be accessed from the Internet or by an unauthorized user. While the National Institute of Standards and Technology (NIST) assigns a CVSS score to a vulnerability generically, IoT Security assigns a “risk severity” level to vulnerabilities based on the specifics of each case.
How can you use the data from this dashboard?
Use the data in this dashboard to learn about the devices on your
network:
Filters (at the top of the page)
- Filter the data displayed in the dashboard by device type and period of time (past year, month, week, day, or hour) to see data about devices of interest.
Summary (across the top of the dashboard)
- See the total number of devices that have been active on your network as determined by the device type and time filters.
- Of the total number of active devices, see how many are specifically IoT devices.
- Develop a sense of the security landscape in which devices operate by seeing the number of active alerts and vulnerabilities detected to date.
Devices
- Learn how many devices there are among various device types and drill down to learn how many devices are among various device categories and then among various device profiles. Find out how many critical risk devices are at each increasingly granular level of device classification and what kind of devices they are.
Top 10 Operating Systems
- Of all the devices whose OS IoT Security detected, see the top 10 most common operating systems, how many devices use each one, and what that percent is.
Subnet Distribution by Device Type
- See how different device types are distributed in subnets throughout the network. If you see a large mix of device types in the same subnet, consider segmenting them into their own, separate subnets.