Utilization Dashboard
Table of Contents
Expand all | Collapse all
-
- Firewall and PAN-OS Support of IoT Security
- IoT Security Prerequisites
- Onboard IoT Security
- Onboard IoT Security on VM-Series with Software NGFW Credits
-
- DHCP Data Collection by Traffic Type
- Firewall Deployment Options for IoT Security
- Configure a Pre-PAN-OS 10.0 Firewall with a DHCP Server
- Configure a Pre-PAN-OS 10.0 Firewall for a Local DHCP Server
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Plan for Scaling when Your Firewall Serves DHCP
- Prepare Your Firewall for IoT Security
- Configure Policies for Log Forwarding
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
- IoT Security Integration with Prisma Access
- IoT Security Licenses
- Offboard IoT Security Subscriptions
-
- Introduction to IoT Security
- IoT Security Integration with Next-generation Firewalls
- IoT Security Portal
- Vertical-themed Portals
- Device-to-Site Mapping
- Sites and Site Groups
- Networks
- Network Segments Configuration
- Reports
- IoT Security Integration Status with Firewalls
- IoT Security Integration Status with Prisma Access
- Data Quality Diagnostics
- Authorize On-demand PCAP
- IoT Security Integrations with Third-party Products
- IoT Security and FedRAMP
Utilization Dashboard
The Utilization dashboard provides quick access to statistics
about medical IoT device operations.
When the IoT Security portal theme is
Medical IoT Security, you can see the Utilization dashboard. IoT Security gathers utilization statistics and metrics about the medical
IoT devices it is monitoring and displays them on this dashboard.
You can then leverage this data to minimize device downtime, reduce
total cost of ownership (TCO), and increase revenue through better
capital planning. In addition to minimizing downtime and maintenance,
you can also use the gathered data to identify unused assets (possibly
broken or misplaced) and ensure safe and secure device disposal
at the end of the IoT device life cycle.
Make sure the application content version on
your firewalls is 8367-6513 or later; that is, the major version,
which is identified by the first four digits, is 8367 or above (8368,
8369, 8370, and so on), starting from 8367-6513. These versions
include healthcare-specific applications that allow IoT Security
to discover medical equipment and provide utilization data. They
also allow firewall security policy rules to include healthcare-specific
applications.
To view the Utilization dashboard, select Dashboards and then choose
Utilization from the Manage Dashboards
drop-down list.
The dashboard is organized into two broad sections. At the top
is a set of filters for
sites, medical IoT device categories, and time ranges that control what
appears on the page. Below the filters are information panels that
display various types of information about how medical IoT devices
are being utilized.
In addition to viewing the dashboard in the IoT Security portal,
you can download its data as an Excel spreadsheet. Click the Download icon
to the right of the top filters, set the filters to include the
data you want to save, and then click Download.
IoT Security creates an Excel file with the details you specified
on multiple tabs and makes it available for download.