Select the recommended policy rules to include in the
policy set.
Device Security automatically generates a list of policy rule recommendations. These are based
on common applications that devices in the same device profile in multiple
Device Security tenant environments use and on unique applications
that only devices in your environment have used during the last month (note
the 1 Month label to the right of the breadcrumbs at
the top of the page). The rule recommendations are organized by application
with all rules selected by default. Clear any you don’t want to use based on
your organization’s policy and practice as well as the information
provided.
In
addition to the automated policy rules that Device Security generates
based on observed network behaviors of devices in the same profile,
you can manually add other rules to the set. In the policy set creation
workflow, click Add Rule and then set an
application and destination. By default, Any appears
in both the Application and Destination Type fields. To change the
application, delete Any and start typing
the application for which you want to create a rule until autocompletion
provides enough letters to select it. To set a destination, first
choose a destination type: Destination Profile (for internal destinations),
FQDN, IP, or Netmask. Then choose one or more destination profiles
from the list or enter one or more FQDNs, IPv4 or IPv6 addresses,
or netmasks. When done, Create the rule.
The App
Risk column contains the risk level for this application as defined
in
Applipedia. Risk levels are graded
from 1 to 5, with numbers approaching 5 carrying increasingly more
risk. Hover your cursor over the application name to display a pop-up
panel with information about the application retrieved from Applipedia.
For explanations about this information, see
Discover IoT Device Applications.
The Alert
Raised column provides the number of alert instances involving each
application that occurred on devices in the source profile. This
information is useful when deciding whether to include recommended
behaviors in a set of policy rules. For example, if you notice a
behavior is associated with a high number of alerts, you might delay
adding a rule that permits this behavior until you investigate how
serious the alerts are. If they are all low severity alerts, you
might decide they’re acceptable. On the other hand, if they are
high or critical severity alerts, you might decide to resolve them
first before proceeding.
By default, Device Security recommends
permitting IoT devices in the source profile to use applications
with all destinations detected in observed network traffic. This
is indicated by Any in the Destination column. If you don’t want
to allow certain destinations, click Any,
toggle off Allow any destination, clear these
destinations from the list, and then close the Select Destination
panel.