When a device deviates from its baseline, the firewall can quickly enforce a security policy. This will help lessen the risk posed by vulnerable or misconfigured devices without needing added sensors.Methods like protocol decoding, signature matching, and behavioral analysis do the job along