Monitor Device Security Health
Monitor the health of your Device Security app to ensure that you have full
visibility into your networks.
Where Can I Use This? | What Do I Need? |
|
One of the following subscriptions:
Device Security subscription for an advanced
Device Security product (Enterprise,
OT, or Medical)
Device Security X subscription
|
To ensure that you get the most out of Device Security, use the provided tools to
monitor the health of your Device Security solution.
Reports let you to generate, schedule, and view detailed reports on device inventory,
risks, alerts, and utilization. You can customize report types, schedules, and filters
to focus on the most relevant information for your needs. Use reports to get a
high-level view of your network, track trends, and see the breadth and depth of
monitoring that Device Security does.
To ensure Device Security is working effectively, use the Data Quality Diagnostics
page to check the quality of network data being received. This helps identify issues
like IP endpoints without unique identifiers or low-confidence device classifications.
By monitoring these metrics, you can take steps to improve data quality and device
identification accuracy.
The Device Security integration status pages for firewalls and Prisma Access
provide visibility into connectivity, log forwarding, and policy recommendation
requests. This helps you verify that Device Security receives the necessary data to
perform its analysis and provide protection.
When deeper investigation is needed, the on-demand PCAP feature enables authorized
packet captures on firewalls. When you authorize on-demand PCAP, the Device Security
Research Team can access network traffic metadata for offline analysis of unknown
devices or applications, enhancing threat detection capabilities.
By leveraging the full suite of monitoring and diagnostics tools, you ensure
Device Security has high-quality data to work with, integration issues are quickly
identified, and you have the insights needed to remediate issues and maintain a strong
security posture for your IoT devices. This holistic approach lets you maximize
the value of Device Security in protecting your critical IoT assets.