Device Security
Changes to Default Behavior in 2025
Table of Contents
Expand All
|
Collapse All
Device Security Docs
Changes to Default Behavior in 2025
Review changes to default behavior in Device Security.
Where Can I Use This? | What Do I Need? |
---|---|
|
One of the following subscriptions:
|
Review the following changes to default behavior in Device Security.
Changes to Default Behavior Introduced in July 2025
The following table details the changes in default behavior for
Device Security in Strata Cloud Manager, introduced in July 2025.
Component | Change |
---|---|
Query Builder |
You can now copy queries from the Query Builder widget. You can
use the Copy Query button, or copy the
query text from the text field.
|
Subnets | Deleted networks are re-added to the Network inventory if you modify or add the network through CSV uploads, API calls, third-party integrations, or the web interface. |
Clickable Links |
Clickable links that previously had temporary chips no longer
display the temporary chips. The link directly updates the
global filter.
|
Device Security Navigation |
We have enhanced the Device Security navigation in
Strata Cloud Manager to make it simpler and more efficient.
See the table below for a summary of the changes.
|
The table below summarizes the changes to the Device Security navigation in
Strata Cloud Manager. This table only covers pages that were moved or renamed in
Device Security in Strata Cloud Manager. It does not include pages that were
added to Device Security in Strata Cloud Manager, nor does it include pages
that have the same navigation paths in both Device Security in Strata Cloud Manager
and the legacy Device Security portal.
Legacy Navigation | New Navigation |
---|---|
DashboardsInventory Dashboard | Deprecated |
DashboardsExecutive Summary Dashboard | Deprecated |
AssetsDevices | AssetsInventory |
AssetsDevicesIP Endpoints | AssetsIP Endpoints |
AssetsDevicesUser-Defined Static IP Devices | AssetsUser-Defined Static IP Devices |
NetworksNetworks and SitesNetworks | NetworksAll Networks |
NetworksNetworks and SitesNetwork Segments Configuration | NetworksNetwork Segments |
NetworksNetworks and SitesSites | NetworksSites |
AlertsAlert Overview | DashboardsAlert Overview |
AlertsSecurity AlertsAll Alerts | AlertsSecurity Alerts |
AlertsSecurity AlertsSuppression Rules | AlertsAlert Suppression Rules |
Vulnerabilities |
Renamed to Risks
|
VulnerabilitiesVulnerability Overview | DashboardsVulnerability Overview |
VulnerabilitiesVulnerability OverviewAll Vulnerabilities | RisksVulnerabilities |
VulnerabilitiesVulnerability OverviewVulnerability Settings | RisksVulnerability Configuration |
PoliciesSettings | PoliciesDevice-ID Policy Configuration |
IntegrationsThird-party Integrations | IntegrationsIntegration Management |
IntegrationsCortex XDR Integration | IntegrationsCortex XDR |
Logs & ReportsDevice Traffic Logs | AssetsDevice Traffic Logs |
Logs & ReportsAudit Log | AdministrationAudit Logs |
Logs & ReportsReportsVulnerability Scan Reports | RisksVulnerability Scan Reports |
SettingsCustom Attributes | AssetsCustom Attributes |
SettingsTag Management | AssetsTag Management |
SettingsScanners | RisksScanners |
SettingsRisk Score Configuration | RisksRisk Score Configuration |
AdministrationAboutLicense | AdministrationLicense |
AdministrationAboutPrivacy Sheet | AdministrationPrivacy Sheet |
AdministrationAboutTenant Details | AdministrationTenant Details |
AdministrationData Quality | AssetsData Quality Monitor |
AdministrationNotification ManagementCustom Alert Rules (Notification Policies) | AlertsCustom Alert Notification Policies |
AdministrationNotification ManagementSecurity Alerts | AlertsSecurity Alert Notifications |
AdministrationFirewalls | NetworksFirewalls |
AdministrationFirewallsOn-Demand PCAP | AdministrationPrivacy SheetPCAP Collection |
Changes to Default Behavior Introduced in June 2025
The following table details the changes in default behavior for the
Device Security portal, introduced in June 2025.
Component | Change |
---|---|
Security Alerts |
When configuring Security Alerts, Device Security no longer
supports SMS notifications.
|
Vulnerabilities |
The Vulnerability Inventory now shows
Confirmed as “Yes” if there are any
confirmed vulnerability instances, even if there are also
unconfirmed instances.
|
Changes to Default Behavior Introduced in March 2025
The following table details the changes in default behavior for the
Device Security portal, introduced in March 2025.
Component | Change |
---|---|
Reports |
Device Security roles with permission to create
scheduled reports
can now send generated reports to non-Device Security users.
|
Custom Attributes |
When defining a custom attribute,
you can now use special characters in the attribute value.
|
Changes to Default Behavior Introduced in February 2025
The following table details the changes in default behavior for the
Device Security portal, introduced in February 2025.
Component | Change |
---|---|
DHCP Syslog for Firewalls |
When viewing firewall information under AdministrationFirewallsFirewalls, the Firewall Log Type Status and Firewalls
tables include information for DHCP syslog.
|
Sites Download |
When you Download the sites from
NetworksNetworks and SitesSites
table, you can now select and download all rows in the table,
not just the rows on the current table page.
|