Cybereason Deep Detect & Respond - Add Tag to Assets
- 02 Jan 2025
- 1 Minute to read
- Print
- DarkLight
- PDF
Cybereason Deep Detect & Respond - Add Tag to Assets
- Updated on 02 Jan 2025
- 1 Minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Cybereason Deep Detect & Respond - Add Tag to Assets adds a specified tag in Cybereason to each device that is retrieved from the saved query supplied as a trigger (or devices that were selected in the asset table).
See Creating Enforcement Sets to learn more about adding Enforcement Actions to Enforcement Sets.
Note:
- Not all asset types are supported for all Enforcement Actions.
- See Actions supported for Activity Logs, Adapters Fetch History, and Asset Investigation modules.
- See Actions supported for Vulnerabilities.
- See Actions supported for Software.
Required Fields
These fields must be configured to run the Enforcement Set.
- Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
- Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.
- Use stored credentials from the Cybereason Deep Detect & Respond adapter - Select this option to use credentials from the adapter connection. By default, the first connection is selected.
- When you select this option, the Select Adapter Connection drop-down becomes available. Select the adapter connection to use for this Enforcement Action.
Note:
To use the action below, you must successfully configure a Cybereason Deep Detect & Respond adapter connection.
- Tag name and Tag value - Specify a tag name and value to be added on all relevant entities.
Note:
If the added tag already exists on the device, it will be overridden.
Compute Node - The Axonius node to use when connecting to the specified host. For more details, see Connecting Additional Axonius Nodes.
For more details about other Enforcement Actions available, see Action Library.
Was this article helpful?