Integrate Device Security with HPE Juniper Networking Mist AI
Integrate HPE Juniper Networking Mist AI with Device Security to enhance network
visibility by importing device inventory and wireless client information.
| Where Can I Use This? | What Do I Need? |
|
|
One of the following subscriptions:
Device Security subscription for an advanced
Device Security product (Enterprise Plus,
Industrial OT, or Medical)
Device Security X subscription
One of the following Cortex XSOAR setups:
A free, cohosted, limited-featured
Cortex XSOAR instance
AND
A Cortex XSOAR Engine (on-premises integration)
A full-featured Cortex XSOAR server
|
Integrate HPE Juniper Networking Mist AI with Device Security to enhance your network
visibility by importing network device inventory and wireless client information from
Mist AI's AI-driven platform into Device Security. This integration
addresses the challenge of maintaining comprehensive network asset visibility across hybrid
environments where you operate both HPE Juniper Networking Mist AI infrastructure and
Palo Alto Networks security solutions.
You can create recurring jobs to discover and catalog network devices including access
points, switches, routers, and wireless clients from your Mist AI
deployment. The integration retrieves identifying device attributes such as MAC addresses,
serial numbers, models, and firmware versions for wired, wireless, and NAC clients. For
wireless clients, Device Security also learns information such as authentication methods,
SSID associations, and access point connections. This comprehensive device inventory enables
you to maintain accurate asset records, monitor device compliance, and implement consistent
security policies across your entire network infrastructure.
By consolidating network visibility into Device Security, you eliminate the need to
correlate data across multiple management systems, making time to resolution faster when
there's a security issue. You can identify unauthorized devices, track device movements
across your wireless network infrastructure, monitor authentication events, and maintain
compliance with security policies. The integration particularly benefits organizations
managing large wireless deployments where manual device tracking proves impractical.
To deploy this integration, you need API access to your Mist AI
portal, with appropriate permissions to query inventory and client data. When configuring
the integration, you can also choose which Mist AI sites to pull
information from, or learn about devices across your entire organization for comprehensive
visibility.