Device > Policy Recommendation > IoT
Table of Contents
10.1
Expand all | Collapse all
-
- Firewall Overview
- Features and Benefits
- Last Login Time and Failed Login Attempts
- Message of the Day
- Task Manager
- Language
- Alarms
- Commit Changes
- Save Candidate Configurations
- Revert Changes
- Lock Configurations
- Global Find
- Threat Details
- AutoFocus Intelligence Summary
- Configuration Table Export
- Change Boot Mode
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Packet Broker Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device Setup Ace
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation > IoT
- Device > Policy > Recommendation SaaS
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
- Panorama > Device Registration Auth Key
Device > Policy Recommendation > IoT
Configure and view the Policy Recommendation settings
on your firewall.
View information on the policy rule recommendations
from the IoT Security app. The policy rule recommendation uses metadata
that the firewall collects from traffic on your network to determine
what behavior to allow for the device. You can check the policy
rule recommendation version in DeviceDynamic UpdatesDevice-ID Content.
Button/Field | Description |
---|---|
Policy Import Details | View detailed information about the policy rule recommendation, such as device group Location, rule name, the user who imported the policy, whether the policy rule recommendation Is Updated, when the policy rule recommendation was imported, and when the policy rule recommendation was last updated. |
Device Profile | The device profile for the source device in the policy rule recommendation. |
Source Zones | The source zones for the policy rule recommendation. |
Address | The source address for the policy rule recommendation. |
Location | The device group on Panorama where this policy rule recommendation is available. |
Destination Device Profile | The destination device profile that the firewall allows for the policy rule recommendation. |
Device IP | The IP address of the device that the policy rule recommendation allows. |
FQDN | The fully qualified domain name (FQDN) that the policy rule recommendation identifies as allowed based on typical behavior for the device. |
Destination Zones | The destination zones that the policy rule recommendation allows. |
Security Profiles | The security profile that the policy rule recommendation allows. |
Services | The services (for example, ssl) that the policy rule recommendation allows. |
URL Category | The URL filtering categories that the policy rule recommendation allows. |
Applications | The applications that the policy rule recommendation allows. |
Tags | The tags that identify the policy rule for
the policy rule recommendation. Do not change the tags
of the policy rule; if you change the tags, the firewall cannot
rebuild the policy mappings. |
Internal Device | Identifies whether the device is from a zone that is internal to your network (Yes) or from an external internet-facing zone (No). |
Active Recommendation | Identifies whether this policy rule recommendation is active and currently used in security policy or whether you have removed it from your security policy. |
Action | Identifies the action for this policy rule recommendation (default is allow). |
New Update Available | Identifies that there is a new update for this policy rule recommendation that you must import from the IoT Security app. When you import the policy rule recommendation update, the firewall dynamically updates the security policy rule. If you have more than one device group, the value remains Yes until you import the policy rule recommendation update to all device groups. |
Import Policy | After using the IoT Security app to Activate your policy rule recommendations, Import Policy to import the policy rule recommendations to use in your security policy rules. |
Remove Policy Mapping | If you no longer need the policy rule recommendation
for a device, you can Remove Policy Mapping for
it. You must also delete the policy rule for the policy rule
recommendation. |
Rebuild All Mappings | If the mappings become out of sync (for example, if you restore a previous configuration) you can Rebuild All Mappings to restore the policy rule recommendation mappings. |