McAfee EPOCDE-AA-BA Product Guide - Page 125
Operating systems and software, Tags and how they work, Traits of tags, Who can use tags
View all McAfee EPOCDE-AA-BA manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 125 highlights
Organizing the System Tree Tags and how they work 12 criteria, then use these tags as group sorting criteria to ensure systems are automatically placed within the appropriate groups. If possible, consider using tag-based sorting criteria to automatically populate groups with the appropriate systems. Operating systems and software Consider grouping systems with similar operating systems to manage operating system-specific products and policies more easily. If you have legacy systems, you can create a group for them and deploy and manage security products on these systems separately. Additionally, by giving these systems a corresponding tag, you can automatically sort them into a group. Tags and how they work Tags are like labels that you can apply to one or more systems, automatically (based on criteria) or manually. Once tags are applied, you can use them to organize systems in the System Tree or run queries that result in an actionable list of systems. Therefore, with tags as organizational criteria, you can apply policies, assign tasks, and take a number of actions on systems with the same tags. Traits of tags With tags, you can: • Apply one or more tags to one or more systems. • Apply tags manually. • Apply tags automatically, based on user-defined criteria, when the agent communicates with the server. • Exclude systems from tag application. • Run queries to group systems with certain tags, then take direct action on the resulting list of systems. • Base System Tree sorting criteria on tags to group systems into desired System Tree groups automatically. Who can use tags Users with appropriate permissions can: • Create and edit tags and tag criteria. • Apply and remove existing tags to systems in the groups where they have access. • Exclude systems from receiving specific tags. • Use queries to view and take actions on systems with certain tags. • Use scheduled queries with chained tag actions to maintain tags on specific systems within the parts of the System Tree where they have access. • Configure sorting criteria based on tags to ensure that systems stay in the appropriate groups of the System Tree. McAfee® ePolicy Orchestrator® 4.6.0 Software Product Guide 125