: IoT Security Documentation
Focus
Focus

IoT Security Documentation

Table of Contents

IoT Security Documentation

Palo Alto Networks provides various resources to help you lean about IoT Security.
Learn about the IoT Security technical documentation and training that’s available.

IoT Security Documentation Set

The following set of technical documents in the Palo Alto Networks Tech Docs portal constitute the primary documentation for IoT Security.
IoT Security Best PracticesThis reference recommends IoT Security best practices for the following main phases of deployment:
Plan Your IoT Security Deployment Using Best Practices
Deploy IoT Security Using Best Practices
Monitor Your IoT Security Deployment Using Best Practices
IoT Security Administrator’s Guide
The administrator’s guide describes IoT Security features and explains how to configure and use them. Some chapters are about administering the IoT Security application:
IoT Security Solution
Get Started with IoT Security
IoT Security Overview
Manage IoT Security Users
Other chapters explain how to work with device- and security-related data:
Discover IoT Devices and Take Inventory
Discover IoT Device Applications
Detect IoT Device Vulnerabilities
Respond to IoT Security Alerts
Recommend Security Policies
Medical IoT
IoT Security Integration Guide
This guide explains how to integrate IoT Security through Cortex XSOAR with third-party products. The guide provides configuration instructions for both sides of each integration. IoT Security supports integration with the following types of systems:
Asset Management
Endpoint Protection
Network Management
Wireless Network Controllers
Security Information and Event Management
Network Access Control
Vulnerability Scanning
IoT Security API ReferenceThis reference provides explanations and examples of the IoT Security API and is divided into two parts: commonly used parameters and individual API requests and responses.

Useful Learning Resources

Palo Alto Networks also offers these resources to learn about IoT Security.
Device-ID in the PAN-OS Administrator’s GuidePAN-OS documentation describes how Device-ID works, how to prepare for its deployment, and how to configure and manage it. It also includes useful CLI commands for troubleshooting.
IoT Security Deployment Design GuideThis document captures typical deployment scenarios and recommendations for IoT Security.
Securing IoT Environments: Reference Architecture GuideThis guide is intended for solution architects and engineers and provides architectural guidance for deploying the IoT Security solution.
IoT Security privacy statementThe privacy statement contains information about how the IoT Security solution captures, processes, and stores information.
IoT Security webpageThis page on the Palo Alto Networks website provides an overview of the IoT Security product and various materials such as briefs, datasheets, reports, and case studies.
Knowledge base articlesSeveral articles answer common questions about IoT Security and how it works.
Monthly release notesRelease notes summarize new features and enhancements, changes in appearance and behavior, and known and addressed issues each month. They’re available in the IoT Security portal by clicking the Help icon (?) in the lower right corner and selecting Product Release.
IoT Security digital online trainingThe training course enables you to describe the fundamentals of IoT Security, configure it, and prepare your firewall and logging service to work as part of the IoT Security solution.