Hi SDG, This is based on the HTTP GET from the client device as described in this document. You should obtain a packet capture to confirm that this information is correct. Also, some clients may misidentify themselves when specifying the user agent string field in the HTTP GET request, and enforcement of device type policies is done on a best effort basis depending on the information provided by the client. If you need to enforce security-focused policies based on device type, we recommend that you use a solution such as Meraki Systems Manager or Cisco ISE. https://documentation.meraki.com/MR/Group_Policies_and_Block_Lists/Applying_Policies_by_Device_Type#Client_Identification
... View more