Cybereason Deep Detect & Respond - Add Tag to Assets adds a specified tag in Cybereason to each device that is retrieved from the saved query supplied as a trigger (or devices that were selected in the asset table).
See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.
Note:
- Not all asset types are supported for all Enforcement Actions.
- See Actions supported for Activity Logs, Adapters Fetch History, and Asset Investigation modules.
- See Actions supported for Vulnerabilities.
- See Actions supported for Software.
Required Fields
These fields must be configured to run the Enforcement Set.
- Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
- Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.
- Use stored credentials from the Cybereason Deep Detect & Respond adapter - Select this option to use credentials from the adapter connection. By default, the first connection is selected.
- When you select this option, the Select Adapter Connection drop-down becomes available. Select the adapter connection to use for this Enforcement Action.
Note:
To use the action below, you must successfully configure a Cybereason Deep Detect & Respond adapter connection.
- Tag name and Tag value - Specify a tag name and value to be added on all relevant entities.
Note:
If the added tag already exists on the device, it will be overridden.
Compute Node - The Axonius node to use when connecting to the specified host. For more details, see Connecting Additional Axonius Nodes.
For more details about other Enforcement Actions available, see Action Library.