.webp&w=3840&q=75)
How ClickUp Enables Outcome-Based Project Management (Not Just Task Tracking)
🕓 February 15, 2026
.jpg&w=3840&q=75)
Cato just dropped a fresh update for the Device Inventory feature, and it's a game-changer for how you see your network. We’re talking about new drill-down views and per-device connectivity insights that make monitoring a breeze. These tweaks help you watch usage and fix bugs with total precision. By showing more about device types, apps, and domains, this update turns your inventory into a powerhouse for daily work and long-term safety rules.
Think of Device Inventory as a core part of Cato’s IoT/OT Security service. It works behind the scenes, looking at traffic to find and label IT, IoT, and OT gadgets without needing any clunky software agents. You see all this in the Cato Management Application (CMA).
To be honest, the best part of this update is the deep dive you get into how each device connects. It builds on the basics—like sorting by site or maker—and adds a "Quick View" for apps and domains. Have you ever wondered exactly what your office printers are talking to? Now you can see it and lock it down in one spot.
You can access Device Inventory under Home > Devices > Inventory in the CMA.
This seamless integration between dashboard summaries and detailed inventory views provides a faster way to pivot from anomaly detection to root-cause investigation.
Faster Troubleshooting When someone says the Wi-Fi is slow, you don't have to guess. Just open their device entry. You’ll see every app and domain they’re using right away. In my experience, this saves hours of clicking around different screens.
Better Security Habits Does your smart fridge really need to talk to a random server in another country? These drill-downs show you weird connections before they turn into a crisis. We've all seen how one bad IoT gadget can mess things up, right?
Smarter Rules Your firewall can already use Device Inventory tags like "IP Camera." But now, those rules are even sharper because you see actual behavior. It helps you build a "zero-trust" setup that actually works.
Also Read: How the Cato Client Becomes the Identity Anchor for Zero Trust Access
Cato plays nice with Microsoft Intune, Zoom, and CrowdStrike. These links add extra "juice" to your Device Inventory by pulling in data like OS versions. Just a heads-up: these links help you know what the device is, but they don't check its health. That part is still handled by your Posture Profiles and the Cato Client.
You can mix and match two things in your firewall rules:
Picture this: you can make a rule that only allows a Dell laptop if its disk encryption is turned on. Or, you could just block every IP camera from touching the public internet. It’s all about giving the least amount of access needed.
Also Read: Device-Aware WAN Firewall Policies in Cato SASE
Cato integrates with systems such as Microsoft Intune, Zoom, and CrowdStrike. These connectors enrich Device Inventory with external metadata—like OS version or managed/unmanaged status—improving asset identification.
It’s important to note: integrations enhance inventory intelligence but do not provide posture checks. Posture validation is handled separately through Device Posture Profiles and the Cato Client.
You can combine both in firewall rules. For example:
This dual approach enforces least-privilege access and strengthens zero-trust alignment.
Ready to experience the power of Cato SASE Device Inventory firsthand?
Schedule a free consultation with our experts today

The update introduced detailed drill-down views that show per-device applications, domains, and connectivity insights. This is designed to help administrators monitor usage, troubleshoot issues, and improve security posture.
Navigate to Home > Devices > Inventory. Select a device entry to access its Quick View and drill-down details. The update expands this view to include application and domain interactions plus connectivity insights.
Yes. Device Inventory is part of the IoT/OT Security service and requires a separate license. Only with this license can you view the full inventory and use Device Attributes in firewall rules.
Yes. Device Attributes (identity) and Device Posture Profiles (security state) can be combined in firewall rules with an AND relationship. This ensures only devices that match both criteria are allowed.
No. Integrations like Microsoft Intune and Zoom enrich device intelligence in Inventory but do not provide posture checks. Device Posture validation is handled by the Cato Client.
Devices without WAN/outbound traffic for three days are removed from Inventory. IP reuse or multiple IPs within 24 hours can cause duplicates or merges. DHCP and TLS settings also affect detection accuracy.
Enable TLS Inspection, configure Cato as the DHCP server (instead of only relaying), and review three-day traffic windows to ensure devices remain visible and accurately classified.

Anas is an Expert in Network and Security Infrastructure, With over seven years of industry experience, holding certifications Including CCIE- Enterprise, PCNSE, Cato SASE Expert, and Atera Certified Master. Anas provides his valuable insights and expertise to readers.
Share it with friends!
share your thoughts