→ The features and capabilities available to you in Strata Cloud Manager depend on which license(s) you are
using.
To get started, select DashboardsMore DashboardsIoT Security.
What does this dashboard show you?
The IoT Security dashboard provides information about the devices on the
network, their device profiles and operating systems, and how they are distributed
by device type across subnets. For advanced IoT Security products (Enterprise IoT Security
Plus, Industrial IoT Security, or Medical IoT Security), the
IoT Security dashboard additionally displays the total
number of active alerts to date and vulnerabilities to date.
Text formatted in blue is interactive. Here’s what happens when you click it:
Summary (at the top) – Total Devices and
IoT Devices link to the MonitorAssets page with filters applied to display the inventory for all
devices or all IoT devices. The text in blue for Active Alerts to Date and
Active Vulnerabilities to Date opens corresponding pages in your IoT Security portal. (When there are no alerts or vulnerabilities, the
number is 0 and there is no link.)
Devices – Click a section in the chart or entry in the Device Type
column to zoom in to see the device categories within a chosen type, and
from there to see the device profiles within a chosen category. Clicking
back within the chart or clicking a breadcrumb
above the table zooms back out to a broader level of device
classification.
The numbers in the Devices and Devices at Risk columns link to the MonitorAssets page. Strata Cloud Manager automatically
applies a filter to show devices matching the chosen column and row, which
can be Device Type, Category Name, or Profile Name depending on the current
level on display.
You sometimes see the numbers of new devices that IoT Security detects on the network. These numbers appear
to the left of numbers in the Devices column. IoT Security considers devices to be “New” if it first detects them on
the network within the time filter set at the top of the dashboard.
Top 10 Operating Systems – The numbers in the Devices column link to the MonitorAssets page with a filter applied to show only devices with the
chosen OS.
Subnet Distribution by Device Type – Hover your cursor over the bar for a
subnet to see the number of devices grouped by device type are in the
subnet. This information helps you decide if too many unrelated device types
are mixed together in the same subnet. For example, if you see facility,
industrial, and consumer IoT devices in one subnet, you might want to
segment the devices of each type into their own separate subnets. Clicking
Networks & Sites launches a new browser
window and opens NetworksNetworks and SitesNetworks in the IoT Security portal.
How can you use the data from this dashboard?
Use the data in this dashboard to learn about the devices on your
network:
Filters (at the top of the page)
Filter the data displayed in the dashboard by device type and period of time
(past year, month, week, day, or hour) to see data about devices of
interest.
Summary (across the top of the dashboard)
See the total number of devices that have been active on your
network as determined by the device type and time filters.
Of the total number of active devices, see how many are
specifically IoT devices.
Develop a sense of the security landscape in which devices operate
by seeing the number of active alerts and vulnerabilities detected to
date.
Devices
Learn how many devices there are among various device types and drill down to
learn how many devices are among various device categories and then among
various device profiles. Find out how many critical risk devices are at each
increasingly granular level of device classification and what kind of
devices they are.
Top 10 Operating Systems
Of all the devices whose OS IoT Security detected, see the top 10 most
common operating systems, how many devices use each one, and what that
percent is.
Subnet Distribution by Device Type
See how different device types are distributed in subnets throughout the
network. If you see a large mix of device types in the same subnet, consider
segmenting them into their own, separate subnets.