Easily track down unwanted devices

Easily track down unwanted devices

4780
Created On 05/26/20 23:57 PM - Last Modified 06/15/23 22:48 PM


Objective


IT teams are often tasked with eliminating and verifying the ongoing absence of risky devices, and IoT Security can help.

One example of a risky device is any  machine running Windows 7, which has reached the end of life and for which Microsoft is no longer producing security updates. These devices have a growing number of known vulnerabilities, and most IT teams want them updated if possible or replaced or removed if not. Follow these steps to create a report to track down these machines.


Procedure


  1. Navigate to the Devices page and set the time range to include the dates you first noticed these devices on your network.
Navigate to the Devices page and set the time range to include the dates you first noticed these devices on your network.
 
  1. Above the Inventory table, click the Filter icon, create a filter for the Windows 7 OS version, and apply it to the devices in the table.
Above the Inventory table, click the Filter icon, create a filter for the Windows 7 OS version, and apply it to the devices in the table.
 
  1. Click the Download icon to download the filtered inventory in .csv format.
Click the Download icon to download the filtered inventory in .csv format.
 
  1. Open the file in a .csv viewer such as Excel, Open Office, and Google Sheets.
Open the file in a .csv viewer such as Excel, Open Office, and Google Sheets.
 
  1. Use the information from the report to track down and then update, replace, or remove the unwanted devices.
When done, repeat steps 1-5. If you updated these devices, IoT Security automatically reflects the change in your device inventory. If you removed or replaced them, verify that none of them reconnected by checking the "Last Activity" field in the Inventory table on the Devices page.


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008UC2CAM&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language