Focus
Strata Cloud Manager

Dashboard: IoT Security

Table of Contents
See information about the devices on the network and their distribution across subnets.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Panorama or Strata Cloud Manager)
  • NGFW, including those funded by Software NGFW Credits
Each of these licenses include access to Strata Cloud Manager:
The other licenses and prerequisites needed for visibility are:
  • A role that has permission to view the dashboard
  • IoT Security
  • Strata Logging Service
→ The features and capabilities available to you in Strata Cloud Manager depend on which license(s) you are using.
To get started, select DashboardsMore DashboardsIoT Security.

What does this dashboard show you?

The IoT Security dashboard provides information about the devices on the network, their device profiles and operating systems, and how they are distributed by device type across subnets. For advanced IoT Security products (Enterprise IoT Security Plus, Industrial IoT Security, or Medical IoT Security), the IoT Security dashboard additionally displays the total number of active alerts to date and vulnerabilities to date.
  • Assets - From here, you can see a dynamically maintained inventory of the IoT, OT, and IT devices on your network with numerous attributes for each one such as its IP and MAC addresses; profile, vendor, model, and OS; and (for advanced IoT Security products) its device-level risk score.
    Use the data in this inventory to learn about the assets on your network:
    • View a dynamically generated and up-to-date inventory of the devices detected on your network, including IoT, OT, and IT devices.
    • While the IoT Dashboard displays the types of devices you have at a high level, the Assets inventory lets you explore individual devices to see more details and assess their security posture.
    • Filter the data displayed in the dashboard by site, device type, period of time, and one or more device attributes to see data about devices of interest.
    • Show and hide columns to view device attributes that are important to you. There are over 100 attribute columns from which to choose.
    • Download the data displayed on the currently active page as a file in CSV format for inclusion in reports or for future reference. The file contains the devices and device attributes that you have on display at the time of the download.
  • Vulnerabilities: The Vulnerability tab lets you customize how information about vulnerabilities and vulnerability instances is presented so you can view their impact on your devices from different perspectives. By setting filters, you determine the scope of the information displayed, and by defining queries and settings, you control the types of vulnerabilities and the types of devices you want to see.
    The Vulnerabilities page lists the vulnerabilities that IoT Security has detected or learned about through a third-party integration.
    You can search for a text string in any of the columns, download the list of vulnerabilities, create a filter to show only the vulnerabilities you want to see, and control which columns you want to show and hide.
    While a severity level in the IoT Security system reflects a Common Vulnerability Scoring System (CVSS) score, there isn’t always a direct correlation between the two. IoT Security bases the severity level not only on the CVSS score but on other determining risk factors as well. For example, a hard-coded password in a device might have a CVSS score of 10.0, but an IoT Security severity level of High rather than Critical. This can happen when there isn’t proof that the device can be accessed from the Internet or by an unauthorized user. While the National Institute of Standards and Technology (NIST) assigns a CVSS score to a vulnerability generically, IoT Security assigns a “risk severity” level to vulnerabilities based on the specifics of each case.

How can you use the data from this dashboard?

Use the data in this dashboard to learn about the devices on your network:
Filters (at the top of the page)
  • Filter the data displayed in the dashboard by device type and period of time (past year, month, week, day, or hour) to see data about devices of interest.
Summary (across the top of the dashboard)
  • See the total number of devices that have been active on your network as determined by the device type and time filters.
  • Of the total number of active devices, see how many are specifically IoT devices.
  • Develop a sense of the security landscape in which devices operate by seeing the number of active alerts and vulnerabilities detected to date.
Devices
  • Learn how many devices there are among various device types and drill down to learn how many devices are among various device categories and then among various device profiles. Find out how many critical risk devices are at each increasingly granular level of device classification and what kind of devices they are.
Top 10 Operating Systems
  • Of all the devices whose OS IoT Security detected, see the top 10 most common operating systems, how many devices use each one, and what that percent is.
Subnet Distribution by Device Type
  • See how different device types are distributed in subnets throughout the network. If you see a large mix of device types in the same subnet, consider segmenting them into their own, separate subnets.