Skip to main content

Tagging

Tagging in Risk Monitor allows you to quickly view the risk and vulnerability status for a collection of items of special interest to you.

Description

You might for example want to keep an eye on a group of web servers, a group of critical applications, or a group of laptops that are used for testing. You can then create a tag and assign it to all items in the group. When you select the tag in the Tag Name section on the Filters pane, all dashboards will filter to show results for the tagged items only.

The following items can be tagged:

  • Applications

  • Vulnerabilities (CVE ID)

  • Users

  • Devices

Tags can be managed both from the Filters pane and the Configurations section, see Manage tagging.