Skip to main content

Device Identification Overview

Published on:
.
1 min read

Zenarmor has a Device Identification feature that automatically discovers and identifies all connected devices on the network, providing an overview of their details, such as hardware vendor, operating system, name, hostname, IP addresses, and MAC addresses, with the ability to group these devices into their respective categories.

tip

It is important to keep in mind that version 1.16 represents the initial iteration of the Zenarmor device identification feature. Although it demonstrates remarkable capability in identifying the majority of devices connected to your network, certain instances may arise where minor inconsistencies or inaccurate data are detected, necessitating manual user intervention for correction and input. This is because, when examining network traffic in the absence of full TLS inspection, only incomplete device information is obtained.

The good news is that a complete TLS inspection will be available beginning with Zenarmor 1.17, which is scheduled for release in the first quarter of 2024. This enhancement will not only improve device identification but also the network inspection capabilities of Zenarmor in its entirety.

Figure 1. Devices Page on Zenarmor

note

The Device Identification feature is only available for the Zenarmor Paid Editions. To gain the benefit of the Device Identification feature and for more information, see the plans & pricing.

Benefits of Zenarmor Device Identification

The device identification feature provides valuable insights into the IT ecosystem, enhancing your network visibility and overall network security. The following are the principal benefits of utilizing the Zenarmor device identification function:

  • Maintaining an up-to-date device inventory: Zenarmor keeps an up-to-date list of all connected devices, so you don't have to keep track of them manually, ensuring no devices are missed.
  • Enhanced network visibility: Zenarmor provides detailed information about each device connected to the network, which is useful to IT teams when investigating their infrastructure, providing an easy means to spot "rogue" or risky devices attached to the network.
  • Real-time device tracking: Zenarmor continuously scans the network for new devices. This real-time tracking ensures that IT teams always know what new devices have been added to their network, once again providing a powerful means to protect the network against rogue or unauthorized devices.

How Zenarmor Device Identification Works

The Device Identification feature leverages various techniques, including IP address tracking, MAC address identification, and device fingerprinting, to create a detailed inventory of all devices. Zenarmor identifies and categorizes the devices based on the following criteria:

  • HTTP protocol
  • SSDP protocol
  • DHCP protocol
  • MAC manufacturer
  • MDNS protocol
  • SSH version

Users can perform the following tasks on Devices:

  • Viewing Detected Devices
    • Status-Based Device Listing
    • Category-Based Device Listing
    • Viewing All Devices
    • Searching a Device
    • Selecting Layout
    • Refreshing Device List
    • Downloading Devices List
    • Reordering Devices List
  • Viewing Device Details
  • Acknowledging New Devices
  • Managing Devices
    • Mark as Starred
    • Mark as Hidden
    • Mark as Trust or Untrust
    • Change Name
    • Change Category
    • Stop Automatic Identification
    • Merge with a Parent Device
    • Remove a Child Device From a Parent Device
    • Delete Device

Here is the hands on video for Zenarmor Device Identification and Access Control: