-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What is a tag, and how does it work?
Tags group assets, e.g., database servers or sensitive systems. An asset can have any number of tags. Examples of what tags can be used for are:
- Type of Software
- Physical location
- Several hosts belonging to the same system
- Network definition
- Access
Static tags
A static tag is a tag you manually apply to one or more assets. This type of tag only applies to the specific asset.
Dynamic tags (Tags with rules)
IPv4 and/or IPv6
Select this option if you want the rule to match IP addresses within an IP range. The tag will be applied to any asset within the IP range. For example, network 123.123.123.0/24 will match all active assets from 123.123.123.1-123.123.123.255.
Open ports
Select this option if you want the rule to match open ports. The tag will be applied to any asset within the given open ports. For example, port 80 will match assets with port 80 open.
Operating system
Select this option if you want the rule to match the asset Operating System (OS). The tag will be applied to any asset within the given OS. For example, OS Windows will match assets with OS Windows.
Asset name contain(s)
Use this option if you want the tag applied to hosts with a matching string based on their name.
Asset type
Select this option if you want the tag applied to a specific type of asset, such as a Device, Network asset, Web application, or Recipient.
Is internet facing
Select this option if you want the tag applied to an internet-facing asset.
Read more about what internet-facing assets are here.
Is a server
Select this option if you want the tag applied to a Server.
Email
Select this option if you want the tag applied to an Email address.
Business impact and tags
You can set business impact for each tag. If an asset has multiple tags, the tag with the highest business impact will be applied. If a business impact is set on the asset, that business impact will be the actual one for that asset regardless of the business impact set on the tag.
Organize assets with tags
For additional details on how tags can effectively organize assets, please refer to this link: https://support.holmsecurity.com/knowledge/how-do-i-organize-my-assets