As IoT devices gain new capabilities, IoT Security updates its policy rule recommendations to
advise what additional traffic or protocols firewalls should allow.
Periodically check policy rule recommendations for profiles with
recommendations you've previously imported (
Device
or ). If there are additional ones without an entry in the
Imported To column, they haven't been imported to the rulebase yet. Assess
your security needs and consider importing these recommendations to the
Security policy rulebase as described in
Configure Device-ID.