Best Practices

  • You must have quality accurate host data.

    Because of the passive nature of Network Discovery, your threat defense devices must be positioned as close as possible to your protected hosts. This allows the threat defense devices to watch network traffic to and from these hosts, giving you an accurate data about applications, services, and vulnerabilities present on your network.

  • Devices should have visibility to East-West as well as North-South traffic flows to build an accurate host profile.

  • You can create a scheduled task to update recommendations automatically.