Define acceptable usage policies for your infrastructure and receive alerts when communications occur outside this policy. This network risk monitoring capability creates insight into who is communicating with critical high-security devices, unmanaged IoT devices, and desktops.
Examples: