Control and target devices dynamically with tags
Tags are used to classify agents for the purpose of filtering as well as applying policies. Tags can only be applied to agents. Tags do not influence permissions. For help with permissions see Groups and Users and Permissions.
Video Walkthrough
Creating and managing tags
Tags can be created when assigning a tag or via the tag editor. On a device overview page, click the tags icon ๐ท at the top left and choose New Tag.
Assigning a new tag
Provide clear, descriptive names to your tags, because over time many tags might be created. It's also useful to assign a color or add emojis to the name, as these markers will provide visual distinction.
Name tags, select a tag color, and even add emojis
All tags can be managed from the Tags page which is found by clicking your profile picture and choosing Tags.
View the devices tags are attached to and the policies targeting them
There are two default system tags Server and Workstation. These tags will auto-assign workstation operating systems to Workstation and server operating systems to Servers. These tag names and colors can be modified.
Assigning tags to devices
Tags can be assigned in two places -- the device list page, or on the device summary page. On the device summary page, click the tag icon in the top right and add a check next to any tags that you would like to assign. Once tags are assigned they will show up at the top of the device page next to the name.
Tags assigned to an individual device
Tags can be assigned in bulk from the device list. Click the checkboxes next to each device that should receive the tag and then click the Tags dropdown and check the tags to be assigned.
Filter devices by specific tags
Once tags are assigned they are used for two primary purposes.
Tags can be used to build filters on the device list page. See searching and filtering for details.
Tags are used to assign policies to devices. See device monitoring and patch management for more details.
Best practices and recommendations
Create tags for application roles like Domain Controllers or File Servers. Tags can even be more specific and reference applications like NGINX or SQL Server. These role-based tags will prove useful when organizing Monitor Policies.
Consider creating Monitor Policies before Tags to help determine which tags are needed. If you first enumerate all the device attributes that should be monitored and create Monitor Policies to address those needs, then it's easier to determine the types of tags needed. See best practices in Device Monitoring for more details.