You must create device objects for any devices that
do not have an IoT Security policy rule recommendation. For example,
you cannot secure traditional IT devices such as laptops and smartphones
using IoT Security policy rule recommendations, so you must create
device objects for these types of devices and use them in your Security
policy to secure these devices.