Tags

What is a tag and how does it work?

Tags are used to group assets, e.g., database servers or sensitive systems. An asset can have any number of tags. Examples of what tags can be used for are: 

  • Type of software
  • Physical location
  • Several hosts belonging to the same system
  • Network definition
  • Access

Static tags

A static tag is a tag you manually apply to one or more assets. This type of tag only applies to the specific asset.

Dynamic Tags

IP addresses in network range(s)

Select this option if you want the rule to match IP addresses within an IP range. Any asset within the IP range will have the tag applied. E.g., network 123.123.123.0/24 will match all active assets from 123.123.123.1-123.123.123.255.

Open ports

Select this option if you want the rule to match open ports. Any asset within the given open ports will have the tag applied. e.g., port 80 will match assets with port 80 open.

Operating system

Select this option if you want the rule to match the asset Operating System (OS). Any asset within the given OS will have the tag applied. E.g., OS Windows will match assets with the OS Windows.

Asset name contain(s)

Use this option if you want the tag applied to hosts with a matching string based on their name. 

Business impact and tags

You can set business impact for each tag. If an asset has multiple tags, the tag with the highest business impact will be applied. If a business impact is set on the asset, that business impact will be the actual one for that asset regardless of the business impact set on the tag.

Organize assets with tags

For additional details on how tags can effectively organize assets, please refer to this link: https://support.holmsecurity.com/knowledge/how-do-i-organize-my-assets