Improve Device Management UI

BTW @sense11, this thread parallels @kevin1’s well-formulated responses to my recent question regarding detection & training:

Here is something I find myself pondering:

  • What’s to prevent a badly formed device list corrupting the algorithm?
  • What happens if somebody with malicious intent starts to “hack” the lists?