IoT Devices > Summary
See a summary of the devices that IoT Security discovers and identifies on the
network.
Where Can I Use
This? | What Do I
Need? |
IoT Security uses AI and machine learning to automatically discover and identify
network-connected devices and then construct a data-rich, dynamically updating
inventory. When a firewall subscribes to
IoT
Security services, it sends the IoT Security instance that’s in the same
tenant service group (TSG) traffic logs for analysis. The firewall also continually
retrieves IP address-to-device mappings, which include device profiles and other
Device-ID attributes of the devices monitored and protected by IoT Security. The
firewall is then able to apply imported rules to devices matching these mappings.
This dashboard contains panels displaying useful high-level information about the top 10
device categories, device profiles, and operating systems that IoT Security has detected
on the network.
When you visit this page, PAN-OS generates content from data it's received from IoT
Security during its most recent update. It then caches the generated output for the next
30 minutes, so if you navigate away and return within 30 minutes, you'll still see the
same information as you did before. However, if you return after 30 minutes, you'll see
freshly generated content for that time.