NOTE: Some clients may misidentify themselves when specifying the User-Agent string field of an HTTP GET request. Device type policy enforcement is done on a best-effort basis, dependent upon the information that the client provides. When needing to enforce security-focused policies based on device type, we recommend leveraging solutions such as Meraki Systems Manager, or Cisco ISE.
Applying Policies by Device Type
And if you were to use the SEARCH box at the top of the page and look for other similar posts applying policies by device type, you'll likely find it's had similar results as you have discovered.
If you found this post helpful, please give it Kudos. If my answer solves your problem please click Accept as Solution so others can benefit from it.