Unauthorized Asset

The unauthorized asset is accessible under PoliciesAsset PoliciesUnauthorized Asset.

The unauthorized asset page contains a list of asset policies that are not allowed to connect to the system.

Any assets that are listed in the unauthorized asset policy will make MetaDefender OT Security trigger alerting when they connect to the local network.

Unauthorize asset policies are added manually by the user.

Note: The blocklist policy can be detected even user didn’t turn on Anomaly Detection.

When the user acknowledge anticipated the alert, the item will display in Exception Anticipated. If the user deletes this item, MD OT Security will detect and trigger an alert related to this blocklist policy again.

1. View policy

The unauthorized asset page is paginated, each page contains 20 records, the total number of policy records is displayed at the bottom of the list

Policies are displayed in a list, each record contains the following information:

  • Asset: the asset field can have the following values:
    • Asset name and IP address.
    • Asset type/subtype, which indicates that any all assets of that type/subtype is blocked when connecting to the system.
    • Vendor: which branch of asset will be blocked when MetaDefender OT Security detected.

Note: Asset type will be displayed with a green background.

  • Criticality: Alert level (low/high/medium).

2. Create a new policy

You can create a new policy by tapping on the button “+” on the top right of the Policy screen, a policy creation pop-up will appear.

3. Edit policy

You can edit a policy by tapping on “Edit” button on the right of each policy record, a policy editing pop-up will appear.

In the pop-up editing, you can see the detailed policy. You can edit by clicking on the field to be edited and perform input operations like when creating a policy.

Note: Field IP, MAC, and Source of the rule are non-editable.

When finished editing, click “Save” to save the changes or “Cancel” to discard all.

4. Search policy

The searching feature for the policy list is located at the top of the policy page.

You can search on one or more fields of the policy, just input value onto one or more fields.

Click the “Clear” button to clear the values in the filters.

Note: You can input asset name or IP into the asset field, we support searching assets by both name and IP.

5. Remove policy

You can remove a policy from the list by clicking the "Delete" button on each policy record.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard