For IoT Security toaccurately classify and monitorIoT devices, the following logs must be forwarded to Strata Logging Service:
Enhanced application logs– provide detailed application usage and behaviors, essential for profiling device types and roles.
“Enhanced Application logs provide additional context on IoT device behavior and usage patterns, and must be forwarded to Strata Logging Service for IoT Security to build accurate Device-ID profiles.”
(Source: IoT Security Logging Requirements)
Threat logs– essential for detecting suspicious or malicious activities by IoT devices.
“Threat logs are critical for identifying potential exploits or suspicious activities involving IoT devices and are required for accurate threat visibility within IoT Security.”
(Source: IoT Security Logs)
These logs collectively ensure accurate device classification and real-time threat visibility.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit