IoT Administration and Security Concepts

This guide consolidates information regarding the administration of IoT networks using Palo Alto Networks' IoT Security solution. Use the navigation above to explore topics like network configuration, device discovery, inventory management, risk assessment, policy recommendations, health monitoring, and test your knowledge with the quiz.

Prerequisites

Most features described require an active IoT Security subscription for an advanced product tier (Enterprise Plus, Industrial OT, or Medical).

Configure IoT Networks

IoT Security integrates network infrastructure details with physical or logical site information to build a comprehensive model of your organization's network topology. This combined view significantly improves device discovery, classification accuracy, and risk assessment effectiveness.

Networks and Network Segments

Networks represent logical groupings of IP subnets , mirroring your network's structure. IoT Security learns these networks through various methods:

Based on discovered subnets, IoT Security also defines appropriate Classless Inter-Domain Routing (CIDR) blocks.

Within these networks, you can define Network Segments . This is particularly useful when different sites reuse the same IP address ranges (overlapping IPs) . Segments allow for finer granularity in organizing devices and applying policies, grouping devices with similar functions or security needs.

Sites and Site Groups

Sites represent physical locations (like campuses or offices) or logical groupings (like business units) within your infrastructure. They overlay the network architecture.

A hierarchical site structure (e.g., Country > Region > Campus > Building) facilitates efficient multi-site management and allows for location-specific policies. Parent sites can encompass child sites, mirroring organizational layouts.

Integrated Topology View

By combining network and site information, IoT Security develops a deep understanding of your network topology. This enables:

This flexible model adapts to various network architectures, from single offices to complex global enterprises.

graph TD A[Network Infrastructure] --> B(IoT Security Learns Networks); B --> C{Methods}; C -- Firewall Traffic --> B; C -- IPAM Integration --> B; C -- SNMP Crawl --> B; C -- Manual Upload --> B; B --> D[Defined Networks/Subnets/CIDRs]; D --> E[Network Segments Optional]; F[Physical/Logical Structure] --> G[Admin Defines Sites]; G --> H[Site Hierarchy]; D --> I(IoT Security Integrates); H --> I; I --> J[Comprehensive Topology Model]; J --> K[Enhanced Discovery]; J --> L[Accurate Classification]; J --> M[Contextual Risk Assessment]; J --> N[Targeted Policy Enforcement];
Flowchart illustrating how IoT Security builds its network topology model.

Device-to-Site Mapping

IoT Security offers two primary methods to associate devices with specific sites:

  1. IP Address-based Site Assignment ( Preferred & Default for New Tenants ):

    • Devices are assigned to a site based on their IP address falling within a pre-defined subnet or CIDR block associated with that site.
    • Configuration involves defining IP blocks/subnets on the Networks > Networks and Sites > Networks page and then assigning these blocks to specific sites on the Networks > Networks and Sites > Sites page.
    • This method effectively handles scenarios where devices from different sites communicate , as the IP address space clearly defines the location.
    • When defining blocks for a site, using the largest encompassing block (e.g., 10.55.0.0/16) is often sufficient, as IoT Security automatically maps smaller subnets within that block (e.g., 10.55.10.0/24) to the same site.
    • Devices in subnets not explicitly mapped to a user-defined site are assigned to the "Default" site.
    Screenshot of Networks page for adding/uploading subnets.
    Adding or uploading subnets on the Networks page.
    Screenshot of Add Subnet dialog.
    Dialog for adding a single subnet.
    Screenshot of Edit Site dialog showing subnet assignment.
    Assigning subnets to a site during site creation/editing.
  2. Firewall-based Site Assignment (Legacy Method):

    • Devices are assigned to the site associated with the firewall that sends their traffic logs to IoT Security.
    • Configuration involves assigning each firewall to a site on the Administration > Firewalls page.
    • This method works well for simple, single-site deployments.
    • Gotcha! It can become ambiguous in multi-site environments where firewalls at different locations might log traffic for the *same* inter-site communication session , making it hard to pinpoint the actual device location.
    • Devices associated with firewalls not assigned to a specific site are placed in the "Default" site.
    Screenshot showing 'Change Site' option for a firewall.
    Changing the site assignment for a firewall.
    Screenshot of selecting a site for a firewall.
    Selecting the target site for firewall assignment.
graph TD subgraph IP-Based Assignment direction LR IP_A[Define Subnets/CIDRs] --> IP_B(Assign Subnets to Sites); IP_B --> IP_C[IoT Security Maps Device IP to Subnet/Site]; end subgraph Firewall-Based Assignment direction LR FW_A[Assign Firewalls to Sites] --> FW_B[IoT Security Maps Device based on Logging Firewall's Site]; end Start --> Method{Choose Assignment Method}; Method -- IP Address Based --> IP_A; Method -- Firewall Based --> FW_A; IP_C --> End[Device Assigned to Site]; FW_B --> End;
Flowchart comparing IP-based and Firewall-based site assignment methods.

Changing Assignment Method (Firewall to IP-based)

Important: Only users with owner privileges can perform this change. Existing tenants using the firewall-based method can switch to the IP address-based method. Gotcha! This is a one-time, irreversible change .

  1. Ensure IP CIDR blocks for all sites are defined under Networks > Networks and Sites > Networks and assigned to sites under Networks > Networks and Sites > Sites .
  2. Navigate to Networks > Networks and Sites > Sites .
  3. Click the gear icon ( Gear Icon ) in the Sites panel.
  4. Switch the assignment from Firewall-based assignment to IP CIDR-based assignment .
  5. Screenshot showing the switch from Firewall-based to IP CIDR-based assignment.
    Switching device-to-site assignment method.
  6. Save the change and confirm the irreversible action.

Remark: The transition can take up to two days , during which some site assignments might be temporarily incorrect. After switching, verify subnet mappings under Networks > Networks and Sites > Networks . The "Site Mapping" column indicates if a subnet was manually mapped ('Yes') or inherited mapping from a larger block ('No'). Filters related to firewall connection status ('All connected sites', 'All disconnected sites') are removed as firewalls are no longer directly linked to sites in this mode.

Confirmation prompt for switching assignment method.
Confirmation required for switching assignment method (Conceptual).

Sites and Site Groups

Sites represent physical locations or logical groupings within your organization's network. Organizing sites helps in managing devices and applying policies effectively across different parts of your infrastructure. Important: Only users with owner privileges can manage sites and site groups.

Managing Sites

Navigate to Networks > Networks and Sites > Sites to manage sites.

Screenshot of the Sites page overview.
Overview of the Sites management page.

The page includes:

The "Default" site initially holds unassigned IP blocks/subnets or devices.

Adding a Site:

  1. Click the '+' icon above the Sites table.
  2. Enter a Site Name .
  3. (Optional) Enter a Site Address and Description .
  4. If using IP-based assignment: Select the IP prefix (CIDR block or subnet) or Network Segment associated with this site.
  5. If using Firewall-based assignment: Optionally assign the site to a Site Group. (Firewalls are assigned separately).
  6. Save the site.
Screenshot of the Add Site dialog.
Dialog for adding a new site.

Editing/Deleting a Site:

Organizing Sites into Groups (Optional Hierarchy)

You can create a hierarchical structure ( up to 5 levels ) to group sites, reflecting organizational divisions like regions, states, or cities. This aids in filtering data and managing user access.

Assigning Sites to Groups:

Group Management Notes:

Using Site Groups for Filtering and Access Control

Networks

The Networks > Networks and Sites > Networks page provides a detailed, hierarchical view of your network's IP addressing scheme, including subnets and CIDR blocks.

How IoT Security Learns Network Information:

Network Page Overview:

The page features:

Networks Table Columns Explained:

Network Segments Configuration

Network segments are crucial for accurately identifying devices when IP addresses overlap across different parts of your network (e.g., multiple sites using the same guest network subnet 192.168.100.0/24). Important: This feature requires using IP Address-based site assignment.

Navigate to Networks > Networks and Sites > Network Segments Configuration to manage segments. Remark: Only users with owner or administrator privileges can perform these actions.

Understanding Network Segments:

graph LR FW1[Firewall 1 @ Site A] --> SegA(Network Segment A @ Site A); FW2[Firewall 2 @ Site B] --> SegB(Network Segment B @ Site B); SharedIP[Shared IP Block 192.168.100.0/24]; subgraph Device Identification DevA_IP[Device A - IP 192.168.100.10] --> Log1{Log from FW1}; DevB_IP[Device B - IP 192.168.100.10] --> Log2{Log from FW2}; Log1 --> Combine1(IP + Segment A); SharedIP --> Combine1; Combine1 --> UniqueDevA(Identified as Device A @ Site A); Log2 --> Combine2(IP + Segment B); SharedIP --> Combine2; Combine2 --> UniqueDevB(Identified as Device B @ Site B); end style SharedIP fill:#f9f,stroke:#333,stroke-width:2px
Diagram showing how Network Segments help differentiate devices with overlapping IPs.

Creating and Managing Network Segments:

  1. Go to Networks > Networks and Sites > Network Segments Configuration .
  2. Click Add .
  3. Enter a Name and optional Description .
  4. Assign one or more Firewalls to this segment. If a selected firewall is already in another segment, it will be moved.
  5. (Optional) Assign the segment to a specific Site . If left blank, it defaults to the "Default" site.
  6. Click Add to save.
Screenshot of Add Network Segment dialog.
Adding a new Network Segment.

Resetting or Deleting Network Segments:

Screenshot showing Reset and Delete options for Network Segments.
Resetting or Deleting Network Segments.

Discover IoT Devices and Take Inventory

IoT devices are typically purpose-built, exhibiting predictable network behaviors. IoT Security leverages this by analyzing traffic patterns to identify and profile these devices.

Device Discovery and Profiling Process:

  1. Palo Alto Networks Firewalls log network traffic (session logs, enhanced application logs).
  2. Logs are sent to the logging service.
  3. IoT Security accesses log data.
  4. Advanced machine learning algorithms analyze network behaviors.
  5. A baseline behavior profile is established for each device.
  6. The baseline is compared with known device behaviors.
  7. IoT Security determines the device's unique "personality" (type, category, vendor, model, OS, etc.).
  8. A detailed profile and acceptable communication patterns are built and continuously updated .
sequenceDiagram participant Device participant Firewall participant LoggingService as Logging Service participant IoTSecurity as IoT Security Portal Device->>+Firewall: Network Traffic Firewall->>+LoggingService: Session & App Logs LoggingService->>+IoTSecurity: Stream Log Data IoTSecurity->>IoTSecurity: Analyze Behavior (ML) IoTSecurity->>IoTSecurity: Create Baseline Profile IoTSecurity->>IoTSecurity: Compare w/ Known Devices IoTSecurity->>IoTSecurity: Identify Device Attributes IoTSecurity->>IoTSecurity: Update Device Inventory Note right of IoTSecurity: Continuous Learning IoTSecurity-->>-LoggingService: - LoggingService-->>-Firewall: - Firewall-->>-Device: -
Sequence diagram of the device discovery and profiling process.

The time required for initial profiling depends on:

Discovered and identified devices appear on the Assets > Devices page.

IoT Security Devices Page

The Assets > Devices page serves as the central inventory for all discovered and monitored devices and their associated profiles.

Screenshot of the main Devices page inventory view.
The main device inventory view on the Assets > Devices page.

Key features include:

IoT Security Device Details Page

Clicking a device name in the inventory table opens its dedicated Device Details page, providing in-depth information grouped into several sections.

Screenshot of the top section of the Device Details page.
Top section of the Device Details page showing identity and security summary.

Key Sections:

Create Multi-interface Devices

Some devices, like L3 switches, firewalls, or printers with both wired and wireless connections, have multiple network interfaces, each with its own MAC and IP address. Initially, IoT Security might detect each interface as a separate device.

When IoT Security detects potential duplicates based on shared attributes (like hostname or serial number), it recommends merging these "devices" into a single multi-interface device representation. This process involves:

  1. Identifying one interface as the primary .
  2. Assigning the others as secondary interfaces.

The merged multi-interface device inherits device-level attributes (like Profile, OS, Vendor, Model, Risk Score) from the chosen primary interface, while each interface retains its unique network-level attributes (IP, MAC, Subnet, VLAN).

graph TD subgraph Initial State Dev1(Interface 1 - MAC1, IP1); Dev2(Interface 2 - MAC2, IP2); Dev3(Interface 3 - MAC3, IP3); end SharedAttr[Shared Hostname/Serial] --> Recommend(IoT Recommends Merge); Recommend --> UserAction{User Initiates Merge}; UserAction --> SelectDevs(Select Dev1, Dev2, Dev3); SelectDevs --> ChoosePrimary(Choose Dev1 as Primary); ChoosePrimary --> Review(Review Combined Attributes); Review --> Confirm(Confirm Merge); Confirm --> FinalState(Merged Device); subgraph Final State direction LR MergedDevice["Multi-interface Device (Attrs from Dev1)"] --> Iface1(Interface 1 - MAC1, IP1); MergedDevice --> Iface2(Interface 2 - MAC2, IP2); MergedDevice --> Iface3(Interface 3 - MAC3, IP3); end style MergedDevice fill:#ccf,stroke:#333,stroke-width:2px
Flowchart for merging interfaces into a multi-interface device.

Merging Process:

  1. View Recommendations: On the Assets > Devices page, click "View All Recommendations" if a notification appears.
  2. Notification bar for merge recommendations.
    Merge recommendation notification.
    Panel showing merge recommendations.
    List of merge recommendations.
  3. Initiate Merge: Click "Create" on a recommendation or manually select devices from the inventory and initiate a merge (if available).
  4. Select Devices: Confirm or adjust the devices/interfaces to be merged.
  5. Step 1: Selecting devices to merge.
    Step 1: Selecting devices/interfaces for merge.
    Step 1: Adding more devices to merge.
    Adding additional interfaces to the merge.
  6. Select Primary Interface: Choose the interface whose device-level attributes will represent the merged device. Consider the interface with the most traffic or the one on a management VLAN.
  7. Step 2: Selecting the primary interface.
    Step 2: Selecting the primary interface.
  8. Review Attributes: Check the resulting merged attributes (device-level from primary, network-level retained per interface).
  9. Step 3: Reviewing merged attributes.
    Step 3: Reviewing the merged attributes.
  10. Create: Finalize the merge.
  11. View Merged Device: Use the "Multi-interface Devices" filter on the Devices page. The device will have a multi-interface icon ( Multi-interface Icon ).
  12. Inventory showing a multi-interface device.
    Device inventory filtered to show multi-interface devices.
  13. Manage Interfaces: Click the icon to view interfaces and access Edit/Unmerge options.
  14. Panel showing interfaces of a multi-interface device with Edit/Unmerge options.
    Managing interfaces of a multi-interface device.

Editing/Unmerging:

Devices with Static IP Addresses

While DHCP is common, many environments (especially industrial/OT) rely heavily on static IP addressing for devices like controllers, servers, and printers. IoT Security can handle purely static, purely dynamic (DHCP), and mixed environments.

Static IP Discovery Methods:

Important: Manually configuring a static IP is not enough to add it to the inventory. IoT Security must also detect network traffic associated with that IP address.

Configuring Static IPs in IoT Security:

You can inform IoT Security about static IPs using these methods:

1. Upload a List of Static IP Devices (CSV)

2. Add a Single Static IP Device Configuration

3. Upload a List of Subnets Containing Only Static IPs (CSV)

4. Add a Single Subnet Containing Only Static IPs

Devices with Overlapping IP Addresses (via Network Segments)

As previously mentioned under Network Segments Configuration, overlapping IP addresses occur when the same IP range is used in different network locations or segments (e.g., guest networks at multiple sites). IoT Security uses Network Segments in conjunction with IP Address-based Site Assignment to correctly identify and differentiate devices in these scenarios.

The key principle is that the combination of (Shared IP Block + Network Segment identified by Firewall) uniquely identifies a device .

Configuration Steps:

  1. Ensure IP Address-based Site Assignment is active.
  2. Create Network Segments: For each distinct area/site using the overlapping IP range, create a Network Segment and assign the relevant firewall(s) monitoring that area to it. Assign the segment to its corresponding site. (See Network Segments Configuration section).
  3. Define the Shared IP Block:
    • Navigate to Networks > Networks and Sites > Networks .
    • Locate the subnet or IP block that is being reused. If it doesn't exist, add it first.
    • Click the '...' menu for that row and select Change to IP Shared Block .
    • Screenshot showing 'Change to IP Shared Block' option.
      Changing a standard block/subnet to a Shared IP Block.
    • Verify the 'Type' column now shows "Shared Block".
    • Screenshot showing the block type as Shared Block.
      Shared IP Block type confirmed in the table.
  4. Verify Segments within the Shared Block:
    • Click the Prefix of the newly defined Shared Block.
    • The table should now list entries of 'Type' = Segment.
    • Verify that there is a Segment entry corresponding to each Network Segment you created that uses this shared IP range. The 'Network Segment' and 'Site' columns in this view should match your configuration from the Network Segments Configuration page.
    • Screenshot showing segments within a Shared IP Block.
      Viewing Segments within a Shared IP Block.
  5. Verify Device Inventory:
    • Go to Assets > Devices .
    • Add the "Network Segments" and "Firewall" columns to the view.
    • Confirm that devices within the overlapping IP range are correctly assigned to their respective Network Segments and associated with the correct reporting Firewall. Devices with the same IP should appear as distinct entries if they belong to different Network Segments.

IP Endpoints

IP Endpoints represent network entities for which IoT Security knows the IP address but lacks a stable, unique identifier like a MAC address, or whose behavior is too inconsistent to classify as a static IP device. This often occurs for devices behind routers, NAT devices, or in different L3 domains from the reporting firewall.

IoT Security also learns about IP endpoints through third-party integrations (network/asset management systems, SNMP queries).

Lifecycle of an IP Endpoint:

  1. IP address activity detected, but no MAC address learned OR behavior is unstable.
  2. Classified as an "IP Endpoint". Not yet in the main device inventory.
  3. If traffic patterns stabilize and major attributes (profile, category, vendor, model, OS, hostname, serial, site ID) remain unchanged for 7 consecutive days , IoT Security promotes the IP Endpoint to a full device entry on the Assets > Devices page.
  4. If, after promotion, any of these major attributes change later, the device is moved back to the "Identified IP Endpoints" list on the Assets > Devices > IP Endpoints page.
  5. If behavior stabilizes again for 7 days, it can be promoted back to the main Devices page.
Diagram showing the lifecycle of an IP Endpoint.
Lifecycle of an IP Endpoint transitioning between states.

Viewing IP Endpoints:

Navigate to Assets > Devices > IP Endpoints .

Screenshot of the IP Endpoints page overview.
IP Endpoints overview page.

Remark: A high number of IP Endpoints can indicate gaps in network visibility (e.g., lack of ARP/DHCP logs from certain segments). Refer to the Data Quality Diagnostics page for recommendations.

Parse Industrial OT Device Files

Important: Requires IoT Security Industrial OT subscription.

In Operational Technology (OT) environments, Programmable Logic Controller (PLC) configuration, program, and inventory files (collectively "device files") contain rich asset information, including names, models, vendors, firmware, hardware components, and relationships between devices. This data is especially valuable for assets in isolated network segments where passive traffic monitoring might be limited.

Uploading these device files to IoT Security (at Assets > Device Files ) supplements the inventory gathered through traffic monitoring and other integrations.

Screenshot of the Device Files page overview.
Device Files page overview.

Supported File Types:

Uploading Device Files:

  1. Navigate to Assets > Device Files .
  2. Click the Upload icon.
  3. Select the Site to associate the file with (important for resolving potential IP overlaps and assigning sites to new devices).
  4. Upload the device file (one at a time, max 100 MB).
  5. Review Parsed Output: IoT Security displays discovered devices, indicating if they are new or matched to existing inventory entries.
  6. Provide Missing Info: If prompted ("Additional Info Required"), provide the missing IP and optionally MAC address to help IoT Security match or create the device entry accurately. Devices without a MAC will be created as static IPs/IP Endpoints.
  7. Screenshot showing parsed output and 'Additional Info Required' prompt.
    Reviewing parsed output and providing missing information.
  8. Click Submit to add the discovered/enriched information to the IoT Security inventory.
Screenshot of the file parsing side panel.
File parsing side panel after upload.

Managing Uploaded Files:

Discover Mobile Device Attributes

IoT Security can ingest mobile (cellular) network attributes via GTP logs forwarded from Palo Alto Networks firewalls . This allows tracking of mobile devices by IMEI and viewing attributes like IMSI/SUPI, MSISDN, APN/DNN, Radio Access Technology (RAT), location codes (MCC, MNC, LAC), etc.

Important: Mobile devices are classified as "Traditional IT". IoT Security provides inventory visibility but does not generate policy recommendations or behavior-based alerts for them.

Firewall Configuration (PAN-OS):

Remark: Requires specific PAN-OS configuration.
  1. Enable GTP Security: Go to Device > Setup > Management > General Settings (Edit) > GTP Security (Enable). Commit and Reboot.
  2. Create Log Forwarding Profile: Objects > Log Forwarding > Add. Name it, enable "Enhanced application logging to Strata Logging Service".
  3. Create Mobile Network Protection Profile: Configure based on device generation (5G w/ RADIUS, 5G w/ PFCP, 3G/4G w/ GTP-C) as per PAN-OS documentation recommendations for correlating User-ID/Equipment-ID.
  4. Create Security Policy Rules: Create rules matching relevant mobile traffic (e.g., GTP-U, RADIUS, PFCP). Assign the Mobile Network Protection profile and the Log Forwarding profile created earlier. Ensure "Log at Session End" is enabled.
  5. Commit the configuration.

Viewing Mobile Attributes in IoT Security:

Network Visualizations

Important: Requires IoT Security Industrial OT subscription.

Network visualization maps provide graphical representations of communication patterns between groups of devices, helping to identify trends, anomalies, and relationships, particularly in OT environments.

Grouping Methods:

Maps organize devices based on attributes. You can create single-layer or two-layer maps:

Remark: To group by Purdue Level, you must first assign levels to devices , typically using custom attribute rules based on filters (e.g., assigning profiles common in Level 2 to the "Level 2" attribute).

Creating a Visualization Map:

  1. Navigate to Networks > Network Visualizations .
  2. Click + Create Map .
  3. Select the Site(s) for the map scope and click Add to Scope , then Next .
  4. Click Device Grouping and choose the Layer 1 (and optional Layer 2) grouping attribute(s).
  5. Refine the scope further using filters (time range, device attributes, alerts, vulnerabilities) to limit the map to relevant devices and stay under the 500-node display limit . Click Update to apply scope changes.
  6. Review the generated visualization. Adjust scope/grouping as needed.
  7. Click Build Map .
  8. Enter a Name and optional Description . Review the final Scope and Device Grouping.
  9. Click Confirm .

Viewing Data in a Visualization Map:

Interact with saved maps under Networks > Network Visualizations by clicking View Map .

IoT Device Vulnerability Detection

IoT Security identifies vulnerabilities associated with discovered IoT devices. A vulnerability is an intrinsic flaw in software or hardware, while risk considers the vulnerability plus environmental factors , configuration, behavior, and policy.

Key Concepts:

Vulnerability Management Pages:

Vulnerability Overview Dashboard

Navigate to Vulnerabilities > Vulnerability Overview .

Screenshot of the Vulnerability Overview dashboard.
Vulnerability Overview Dashboard.

This dashboard provides:

Vulnerabilities Page

Navigate to Vulnerabilities > Vulnerability Overview > All Vulnerabilities .

This page provides a detailed table listing all detected vulnerabilities.

Header section of the All Vulnerabilities page.
Header of the All Vulnerabilities page.
Pagination controls for the All Vulnerabilities table.
Pagination controls.

Features:

Vulnerability Details Page

Accessed by clicking a vulnerability name (CVE) or instance count from the Vulnerabilities page.

Key Sections:

IoT Risk Assessment

IoT Security calculates risk scores at four levels: individual Device, Device Profile, Site, and overall Organization . Scores range from 0-100, indicating increasing risk severity.

Risk Factors Considered:

Remark: Risk scores are recalculated daily.

Viewing Risk Scores:

Risk Score Severity Levels:

Risk Score Severity Notes
< 40 Low Normal risk level.
40-69 Medium Some anomalies, medium alerts, or CVSS 4.0-6.9 vulnerabilities likely present.
70-89 High Multiple significant anomalies, high alerts, or CVSS 7.0-8.9 vulnerabilities likely present.
90-100 Critical Multiple extreme anomalies, critical alerts (e.g., malware), or CVSS 9.0+ vulnerabilities likely present.

Adjusting Device Risk Scores:

You can manually adjust the *contribution* of a specific vulnerability (not alerts triggered by firewalls) to a device's overall risk score.

  1. Go to the device's Device Details page.
  2. In the Vulnerabilities section, find the vulnerability to adjust.
  3. Expand its Actions menu ('...') and click Adjust .
  4. Adjust risk contribution option in vulnerability actions.
    Adjusting a vulnerability's contribution to risk.
  5. Select Low, Medium, or High contribution based on its perceived impact in your environment.
  6. Setting risk contribution to Low.
    Setting contribution to Low.
    Setting risk contribution to Medium.
    Setting contribution to Medium.
    Setting risk contribution to High.
    Setting contribution to High.
  7. Save the adjustment. Remark: The impact on the overall score depends on other existing risk factors.

Alerts for Risk Score Changes:

IoT Security generates alerts when a risk score *increases* across severity thresholds:

Risk scores can also change due to daily refreshes finding new/resolved vulnerabilities or changed CVSS scores, or user actions resolving risks.

Resolving Risks:

Resolving vulnerabilities or security alerts (by mitigating or accepting the risk) can lower device, profile, site, and organization risk scores. See Vulnerability Details and Act on Security Alerts sections for workflows.

Customize Risk Scores

IoT Security allows tailoring the risk assessment framework to better match your organization's specific security posture and risk tolerance. This involves adjusting the weights and values of various factors contributing to device risk scores.

Navigate to Settings > Risk Score Configuration to manage these customizations.

Customizable Factors:

Customizing Vulnerability Rules:

  1. Go to Settings > Risk Score Configuration > Vulnerabilities table.
  2. Click Add Vulnerability Rule .
  3. Define a Rule Name and optional Description .
  4. Set the Vulnerability Criteria (e.g., CVSS > 9.0 AND Exploit Status = Weaponized). Multiple criteria use AND logic.
  5. Assign the desired Risk Score (0-100) to apply if a vulnerability matches ALL criteria.
  6. Click Apply .
  7. Remark: If a vulnerability matches multiple rules, the highest assigned risk score is used. Edit existing rules using the pencil icon.

Customizing Security Alert Scores ( Owner Role Required ):

  1. Go to Settings > Risk Score Configuration > Security Alerts section.
  2. Click the pencil icon next to the severity level (Critical, High, Medium, Low) you want to adjust.
  3. Enter the new Risk Score (0-100). Gotcha! Score cannot be higher than the level above it or lower than the level below it.
  4. Click Confirm . Click Reset to Default to revert all severities.

Customizing Other Risk Factor Scores:

  1. Go to Settings > Risk Score Configuration > Other Risk Factors section.
  2. Click the pencil icon next to the risk factor you want to adjust.
  3. Enter the new Risk Score (0-100).
  4. Click Confirm . Click Reset to Default to revert all factors.

Customizing Asset Criticality Impact Factors ( Owner Role Required ):

  1. Go to Settings > Risk Score Configuration > Impact Factor section.
  2. Click the pencil icon next to the Asset Criticality level (Critical, High, Medium, Low) you want to adjust.
  3. Enter the new Impact Factor (%) (0-100). Gotcha! Factor cannot be higher than the level above it or lower than the level below it.
  4. Click Confirm . Click Reset to Default to revert all levels.

Create Compensating Controls

Compensating controls represent security measures you've implemented (like endpoint protection, network segmentation, specific configurations) that mitigate the risk posed by certain vulnerabilities or inherent device risk factors . Defining these in IoT Security allows for a reduction in the calculated risk score for affected devices, providing a more accurate picture of residual risk.

Managing Compensating Controls:

Controls can be managed globally via Settings > Risk Score Configuration (Compensating Controls section) or viewed/applied individually on a device's Device Details page (via the "See Details" link on the risk score).

The Risk Score Configuration page has two tabs for controls:

Creating a New Compensating Control Type (Global Setting):

Define a new category if existing system types aren't sufficient.

  1. Navigate to Settings > Risk Score Configuration > Compensating Control Type tab.
  2. Click Add Compensating Control Type .
  3. Enter a Type name.
  4. Define the Matching Rule using device attributes determining qualification.
  5. Click Apply .

Applying a Compensating Control (Global Setting):

This links a Control Type to specific assets and risks, defining the actual risk reduction.

  1. Navigate to Settings > Risk Score Configuration > Compensating Control Matching tab.
  2. Click Apply Compensating Control .
  3. Select the control Type .
  4. Enter a Name and optional Description .
  5. Define the Asset Scope using filters.
  6. Define the Risk this control mitigates (Vulnerability criteria or Other Risk Factor).
  7. (Optional) Click View Matching Devices to verify scope.
  8. Enter the Compensating Control Factor (%) (0-100).
  9. Click Apply . Remark: Takes up to 24 hours to fully reflect in scores.

Applying/Adjusting Controls from Device Details Page:

  1. Navigate to the device's Device Details page.
  2. Click See Details next to the Risk Score.
  3. In the Exposure Score table, find a Risk row with a pencil icon in the "Compensating Control Name" field.
  4. Click the pencil icon.
  5. To Add New: Click + Add New . Define the control (Type, Name, Asset Scope [must include current device], Risk, Factor %). Click Apply .
  6. To Adjust Existing: Select an existing control. Modify the Compensating Control Factor (%) . Click Apply Changes .

Security Alert Overview

IoT Security generates alerts based on:

Important: Alerts are generated only for devices classified as IoT , not Traditional IT.

Remark: Alerts are retained for up to one year.

Navigate to Alerts > Security Alerts for alert management.

Alert Management Pages:

Alert Overview Dashboard Details:

Located at Alerts > Security Alerts > Alert Overview .

Screenshot of the Alert Overview dashboard.
Alert Overview Dashboard.

All Alerts Page Details:

Located at Alerts > Security Alerts > All Alerts .

Screenshot of the All Alerts page table view.
All Alerts page showing a table of alert instances.

Security Alert Details Page:

Accessed by clicking an alert name.

Top section of the Alert Details page showing client/server interaction.
Alert Details: Client/Server Interaction.

Create Alert Rules

While IoT Security provides extensive automatic alerting based on ML and known threats, you can create custom rules (at Alerts > Custom Alert Rules ) to trigger alerts or actions based on specific network events or traffic patterns relevant to your environment.

Remark: Rules are triggered only once per day per device for a matching condition to avoid excessive noise.

Screenshot of the Custom Alert Rules page with example templates.
Custom Alert Rules page showing example templates.

Rule Components:

  1. Basic Information:
    • Rule Name: Unique identifier.
    • Description: (Optional) Purpose of the rule.
    • Apply rule during: Time schedule (default: always).
    • Status: Active or Disabled.
    Basic Information section of rule editor.
    Defining basic rule information.
  2. Rule Details (Criteria): Defines the "WHEN" condition.
    • Logic: All(AND) / ANY(OR) for multiple conditions.
    • Condition Type:
      • Traffic Pattern: Based on communication between devices. Define Source Target Devices (using attributes like IP, name, profile, category, tag, location, etc.) and optionally Destination Target Devices ('Any' if blank). Can add Extra Criteria for Traffic Volume (e.g., > 10MB in 1 hour) or App Usage (specific app, command, parameter, value).
      • Change Event: Based on device state changes. Define Target Devices and select the Event (IP Change, New Device Discovery, New Vulnerability Discovery, Offline Device, Purdue Level Change, Risk Level Change, Subnet Change).
    • Add Condition Set: Create nested subgroups of conditions with their own AND/OR logic.
    • Example rule criteria using nested condition sets.
      Example of complex rule criteria.
  3. Rule Action: Defines the "DO" action(s) taken when criteria are met.
    • Generate alert: Creates a security alert (specify severity). Can optionally also:
      • Send to third-party systems: Trigger external integrations (e.g., NAC quarantine, ticketing).
      • Assign to Users: Notify specific users to investigate.
    • Notify users: Send email/SMS notifications (users configure preferences).
    • Restrict network access: Signal firewall to apply a "Restricted" category via Device-ID, triggering a pre-configured 'Deny' policy rule (see Restrict Network Access section).
    Rule Action configuration section.
    Configuring actions for a custom rule.
  4. Rule Preview: Shows a summary of the rule logic.
  5. Rule Preview section.
    Previewing the configured rule logic.

IoT Security provides pre-configured example templates (disabled by default) for common scenarios across different verticals (Enterprise, Industrial, Medical) which can be enabled, edited, or used as models.

Act on Security Alerts

Responding to security alerts involves confirming the event, assessing importance, identifying the impacted asset, deciding on the response, and engaging the appropriate team (IT security, clinical engineering, vendor, etc.).

Response Actions:

Workflow Management within IoT Security:

Routine Alert Management:

Policy Rule Recommendations

Important: Workflow described applies to firewalls running PAN-OS versions prior to 11.1. A different process exists for PAN-OS 11.1+ involving direct Device-ID configuration.

IoT Security uses machine learning to analyze the normal network behavior of high-confidence IoT devices within a specific profile (across your environment and globally) and recommends firewall Security policy rules to allow only that trusted behavior.

Process Overview:

  1. Observe Behavior: IoT Security learns common and unique applications/destinations for a device profile.
  2. Generate Recommendations: Based on observed behavior, IoT Security suggests allow rules.
  3. Customize & Create Set: You review, modify (allow/deny specific apps/destinations, add tags/zones/services), condense, and save the recommendations as a Policy Set within IoT Security.
  4. Activate Set: Make the policy set available for firewalls/Panorama to import.
  5. Import to Firewall/Panorama: Administrator imports the active policy set. This automatically creates necessary device objects and policy rules.
  6. Enforce Policy: Firewall uses Device-ID (IP-to-device mappings provided by IoT Security) to apply the imported rules to the correct devices.
graph TD A[Observe Behavior - High-Confidence Devices] --> B(Generate Recommendations); B --> C{Review & Customize}; C -- Add/Remove Rules --> C; C -- Condense Rules --> C; C -- Add Tags/Zones/Services --> C; C --> D[Create Policy Set]; D --> E[Activate Policy Set]; E --> F[Firewall/Panorama Imports Set]; F --> G[Objects & Rules Created]; G --> H[Firewall Enforces using Device-ID];
Policy Recommendation Workflow (PAN-OS < 11.1).

Creating a Policy Set:

  1. Navigate to Assets > Profiles , click a profile name, then go to the Behaviors tab.
  2. Ensure Outbound Behaviors is selected.
  3. Review the behaviors listed. Apply filters (time, app usage, etc.) as needed for review, but note these *do not* limit the rules generated initially (filtering happens during creation).
  4. Click Create Policy .
  5. Behaviors page showing Create Policy button.
    Starting policy creation from the Behaviors page.
  6. Follow the wizard:
    • Intro: Click Next.
    • Policy creation wizard - Step 1: Introduction.
      Policy Creation Wizard - Introduction.
    • Select Policies: Review auto-generated rules based on observed behaviors (common & unique apps from last month). Deselect any rules you don't want. Manually Add Rule if needed. Click destination 'Any' to restrict specific destinations.
    • Policy creation wizard - Step 2: Select Policies/Rules.
      Policy Creation Wizard - Selecting Rules.
      Policy creation wizard - Manually adding a rule.
      Manually Adding a Rule.
      Policy creation wizard - Editing destinations for a rule.
      Editing Rule Destinations.
    • Configure Policy Set: Name the set, optionally condense rules (group apps sharing destinations/settings) , apply Tags, Security Profiles, Source/Destination Zones, Services to selected rules.
    • Policy creation wizard - Step 3: Configure Policy Set Details.
      Policy Creation Wizard - Configuring Set Details.
      Option to condense policy rules.
      Condensing Policy Rules Option.
      Editing services/ports for a rule.
      Editing Rule Services/Ports.
    • Review Policy Set: Carefully check the final rules.
    • Policy creation wizard - Step 4: Review Policy Set.
      Policy Creation Wizard - Final Review.
    • Create: Saves the policy set.
  7. Activate Policy Set: After creation, click Activate Policy Set to make it available for import by firewalls/Panorama. Important: Only one set per profile can be active. Edit/Download/Delete via '...' menu.
  8. Policy set created, prompt to activate.
    Activating the created policy set.
    More actions menu for a policy set.
    Policy Set Actions Menu.

Viewing Policy Sets:

Created policy sets (active or inactive) are listed on the Assets > Profiles > *profile_name* > Policy tab.

Policy tab showing created policy sets.
Policy tab listing created sets.
Policy set list showing an inactive set.
Inactive Policy Set.
Policy set list showing an active set.
Active Policy Set.

If new or unexpected behaviors are detected after a policy set is activated, they will be highlighted on this page, prompting review and potential update of the active policy set.

Policy tab highlighting new/unexpected behaviors detected after activation.
Highlighting new/unexpected behaviors.

Importing into Panorama/Firewall (PAN-OS < 11.1):

  1. Log in to Panorama (or firewall UI).
  2. Navigate to Panorama > Policy Recommendation > IoT (or equivalent path on firewall). Panorama/firewall fetches active recommendations from IoT Security. Refresh if needed after activation in IoT Security.
  3. Click Import .
  4. Choose target rulebase (pre/post) and the rule *after* which to insert the imported rules (top if none selected). Important: Position recommended rules *above* any potentially conflicting existing rules.
  5. Click OK . Objects (device, service, address) and rules are created automatically.
  6. Assign Log Forwarding profiles manually or ensure a profile named "default" exists for automatic application.
  7. Commit the configuration.

Restrict Network Access

Beyond behavior-based rules, IoT Security allows explicitly restricting network access for specific high-risk devices (e.g., running EoL OS, suspected compromise) *before* behavior changes or exploits occur. This uses Device-ID categories .

Mechanism:

  1. Create Firewall Rule: On the firewall/Panorama, create a Security policy rule placed high in the rulebase :
    • Source Device: Category = "Restricted" (Create this device object if needed).
    • Source Zone/Address: Any.
    • Destination Zone/Address/Device: Any.
    • Action: Deny .
    • Logging: Enable logging and assign a log forwarding profile to see blocked attempts.
    PAN-OS: Creating the 'Restrict IoT' rule - General tab.
    PAN-OS: Restrict Rule - General Tab.
    PAN-OS: Creating the 'Restricted' device object.
    PAN-OS: Creating the 'Restricted' Category Device Object.
    PAN-OS: Setting Source Device to 'Restricted'.
    PAN-OS: Restrict Rule - Source Tab.
    PAN-OS: Setting Destination to 'Any'.
    PAN-OS: Restrict Rule - Destination Tab.
    PAN-OS: Setting Action to 'Deny' and enabling logging.
    PAN-OS: Restrict Rule - Actions Tab.
    PAN-OS: Positioning the 'Restrict' rule high in the rulebase.
    PAN-OS: Positioning the Restrict Rule.
  2. Enable Feature in IoT Security ( Owner Role ): Go to Policy Sets > Settings > Toggle ON "Restrict device traffic via firewall policy". Follow prompts confirming the firewall rule exists.
  3. IoT Security: Enabling the traffic restriction feature.
    IoT Security: Enabling Traffic Restriction Feature.
    IoT Security: Enable prompt step 1.
    Enable Prompt - Step 1.
    IoT Security: Enable prompt step 2 (confirming policy).
    Enable Prompt - Step 2.
    IoT Security: Enable prompt step 3.
    Enable Prompt - Step 3.
  4. Restrict Device(s) ( Admin/Owner Role ):
    • From Vulnerability Details: Select instance(s) > More > Restrict Traffic.
    • Restricting traffic from Vulnerability Details page.
      Restricting via Vulnerability Details.
      Confirm Restrict Traffic dialog.
      Confirming Traffic Restriction.
    • From Alert Details: Action > Restrict Traffic.
    • Restrict Traffic option on Alert Details page.
      Restricting via Alert Details.
    • From Device Details: Action Menu (...) > Restrict Traffic.
    • Restrict Traffic option on Device Details page.
      Restricting via Device Details.

    IoT Security immediately updates the IP-to-device mapping for the selected device(s), changing their Category attribute to "Restricted". The firewall receives this update and applies the Deny rule.

    Diagram showing normal traffic flow before restriction.
    Normal Traffic Flow (Before Restriction).
    Diagram showing traffic blocked after restriction enabled.
    Traffic Flow Blocked (After Restriction).
  5. View Restricted Devices: Go to Policy Sets > Overview panel > Click the number link for "Restricted Devices". This opens the Devices page filtered for 'Restricted Traffic = Yes'. The Device Details page also shows a "Restricted Device" label.
  6. Overview panel showing count of restricted devices.
    Link to view restricted devices.
    Devices page filtered to show restricted devices.
    Inventory filtered for restricted devices.
    Restricted Traffic column showing 'Yes'.
    Restricted Traffic column indicator.
    'Restricted Device' label on Device Details page.
    'Restricted Device' label and details on hover.
  7. Derestrict Device(s): After remediation, use the same interface points (Vulnerability Details, Alert Details, Device Details) and select "Derestrict Traffic". IoT Security reverts the category mapping, allowing normal policy rules to apply again.
  8. Disable Feature (Owner Role): Toggle OFF "Restrict device traffic via firewall policy" on Policy Sets > Settings. Gotcha! This derestricts *all* currently restricted devices.

Notes: Requires PAN-OS 10.0+ and Device Dictionary 16-253+. Applies only to high-confidence devices (score >= 90). Restriction occurs at the firewall; devices might still access resources within their local L2 segment.

Medical IoT Features

Important: Requires IoT Security Medical subscription and Medical IoT Security portal theme.

IoT Security offers specialized features for healthcare environments focused on medical device utilization, safety, and compliance.

Key Features:

These features provide a holistic view for managing medical device security, optimizing asset allocation, ensuring compliance, and responding promptly to safety issues like recalls.

Biomed Dashboard

Accessed via Dashboard > Manage Dashboards > Biomed (when Medical theme is active).

Screenshot of the Biomed Dashboard.
Biomed Dashboard Overview.

Provides:

Utilization Dashboard

Accessed via Dashboards > Manage Dashboards > Utilization (when Medical theme is active). Important: Requires App-ID content version 8367-6513+ on firewalls.

Screenshot of the Utilization Dashboard.
Utilization Dashboard Overview.

Provides detailed usage metrics for specific medical device categories (Imaging, Infusion Systems).

Filters:

Remark: Data requires ~24 hours to initially populate.

Download: Data can be exported to Excel via the Download icon ( Download Icon ).

Utilization dashboard download dialog.
Downloading Utilization Data.
Example structure of downloaded utilization Excel file.
Example Downloaded Excel Structure.

Information Panels (Vary by Category):

MDS2 Management

Important: Requires IoT Security Medical subscription and Medical IoT Security portal theme. Page only appears when theme is active.

Manage Manufacturer Disclosure Statement for Medical Device Safety (MDS2) documents at Vulnerabilities > MDS2 . Uploading these PDFs helps IoT Security refine risk assessment by incorporating vendor-disclosed security features (or lack thereof).

Screenshot of the main MDS2 management page.
MDS2 Files Matched Page.

Key Features:

Recalls

Important: Requires IoT Security Medical subscription and Medical IoT Security portal theme. Page appears only if recalled devices are detected .

Navigate to Vulnerabilities > Recalls .

Screenshot of the Recalls page listing FDA recalls.
Recalls Page.

This page lists active FDA recalls affecting medical devices discovered in your inventory.

Monitor IoT Security Health

Regularly monitoring the health of your IoT Security deployment ensures optimal performance and data quality.

Key Monitoring Areas:

Reports

Navigate to Logs & Reports > Reports .

Report Types:

Generating Reports:

Viewing Reports:

Editing/Managing Reports:

IoT Security Integration Status with Firewalls

Navigate to Administration > Firewalls > Firewalls .

Screenshot of the Firewalls status page.
Firewalls Integration Status Page.

This page provides health checks for NGFW integration:

IoT Security Integration Status with Prisma Access

When using the IoT Security add-on for Prisma Access:

Data Quality Diagnostics

Navigate to Administration > Data Quality .

This page helps assess the quality of data IoT Security receives, focusing on reducing:

The page shows counts and percentages for these categories relative to all devices (based on last 30 days). Review the recommendations provided to improve network coverage (e.g., ensuring logs from relevant segments, enabling ARP/DHCP logging) if the numbers exceed your acceptable threshold based on deployment goals.

Remark: Check Data Quality Diagnostics weekly for the first few months after deployment and periodically thereafter.

Authorize On-demand PCAP

This feature allows authorized Palo Alto Networks IoT Security Research Team members to remotely trigger packet captures (PCAPs) on specific, authorized firewalls for deep analysis of unknown devices or applications when other methods are insufficient.

Requirements & Notes:

Authorizing/Unauthorizing PCAP:

  1. Ensure openconfig plugin is installed on target firewalls.
  2. In IoT Security portal, go to Administration > Firewalls > On-demand PCAP .
  3. Click '+' (Add).
  4. Select the firewall(s) by serial number.
  5. Choose authorization duration (1 month, 3 months, Unlimited).
  6. Click Confirm .
  7. To unauthorize, select firewall(s) in the list and click Unauthorize , or use the 'Reauthorize' icon in the Actions column (which effectively acts as unauthorize if clicked for an authorized firewall).

Interactive Quiz

Test Your Knowledge!

Answer the following questions based on the document content. Click "Check Answers" after completing a section or "Show Final Results" at the end.