Tag Examples
What are Tags Used for?
- Organization - Tags are used in Spirion Sensitive Data Platform to organize your Targets and/or Agents (Agents can also act as Targets).
- Tags typically group Agents/Targets by operating system, Spirion Agent version, Department, Target Type such as OneDrive, Exchange, etc.
- Functions - Tags provide guides for very important functions such as troubleshooting and maintenance.
- In a typical organization, various Agents are configured to scan on a daily, weekly, or monthly basis.
- A conditional Tag that shows you all Agents that have not performed a scan in over a week or month can quickly show you all Agents which have failed to scan their intended data sources.
- The source (Target) that is not being scanned has had days or weeks to accumulate potentially large amounts of highly sensitive data: data which cannot receive remedation actions as it is invisible to the Spirion console.
- This data is considered deeply at-risk.
Tag Types
Recall, you can capture Agents/Targets into your Tag in different ways, as follows:
- IP Range - Add Agents and Targets by IP range.
- Seldom used
- Manual - Add Agents and Targets, manually, yourself.
- Commonly used
- Conditional - Add Agents and Targets by condition. In this type, an Agent/Target must satisfy the conditions of the Tag, set by you, to be a member of the Tag group.
- Commonly used
- Note: Conditional tags cannot be nested
- Note: Conditional Tags do not update instantly. When you save the Tag the conditions are evaluated and the applicable endpoints are assigned. A background job runs every hour to re-evaluate and make adjustments as necessary. For example, you create a conditional Tag filtered for v13 Agents. When the Tag is saved, it shows 2 endpoints. Shortly after the Tag is saved, a new v13 Agent registers with the console. It may take up to an hour before the new Agent appears in the Tag.
Common Tags and Their Purpose
Typically, Tags organize your Agents by categories, actions, specific Targets, specific Tag names, etc.
Endpoint Platform Conditional Tags - Operating System
archTIS recommends you use "Endpoint Platform" conditional Tags. These are commonly used in organizations and have proven to be very effective.
Endpoint platforms include:
- Windows
- Mac
- Linux
Benefits of using Enpoint Platform Conditional Tags
- Grouping Agents by endpoint platform (Operating System) enables users to focus on Agents which share the same upgrade, security, and monitoring requirements
- For example, macOS Agents may be scheduled for IT updates and will appear offline for a day, but no longer
Endpoint Name Conditional Tags - Org Department
archTIS recommends you use "Endpoint Name" conditional Tags. These are commonly used in organizations and have proven to be very effective.
- Typically used when the start of the machine name or hostname begins with the department letters/term
- Examples: "HR" - Human Resources, "Fin" - Finance, etc.
Benefits of using Enpoint Name Conditional Tags
- You can use the machine or hostname to extract department codes (or other identifying metadata) to Tag by department.
- You can capture multiple Agents/Targets using a Conditional type Tag when the department terms such as "-HR-", "-Fin-", "-Legal-", etc, are contained within the host name or machine name
- Examples: HR-MARKMACHINE1, MARKMACHINE1-HR, MARK-HR-MACHINE1
- Grouping Agents by Department enables users to focus on a specific subset of Agents and their results, which may be high-risk sensitive data matches
Search Date/Time Conditional Tags
archTIS strongly recommends you use "Search Date/Time" conditional Tags. These are commonly used in organizations to track the date and time of Agent scans and have proven very effective.
This conditional tag let's you pose the question: "Show me Agents that last completed a scan over a day/week/month ago"
Search Date/Time conditional Tags include:
- Older than Last X Weeks
- Older than Last X Months
- Last Week
- Last X Hours
- Last X Months
Benefits of using Search Date/Time Conditional Tags
- Grouping Agents by scan date/time enables users to focus on Agents that have completed or failed scanning on a fixed iteration - 1 week, 1 month, older than 1 week, older than 1 month, etc.
- This enables users to spot failing Agents and troubleshoot any problems quickly
- Time intervals are selected from the drop-down menu in the "Add Tag" pop-up window when you create your Tag.
Agent (Endpoint) Version Conditional Tags
archTIS recommends you use Endpoint version conditional Tags. These are commonly used in organizations and have proven very effective for managing Agents by version and planning/performing upgrades.
Endpoint Version conditional Tags include:
- Endpoint Version - The version of the Agent, which can be general - version 12, 13, etc., or specific - version 13.4, 12.6.4, 12.6.5.1
- Operator - Use the operator "Contains" to include Agents by version, or the operator "Does Not Contain" to exclude Agents by version
Example
- To group Agents by version, such as v13.5 (Windows) or v12.6.5 (Mac/Linux/Legacy) create a Tag which uses the following logic
- Logic:
- Tag Type: Conditional
- Action Type: Endpoint Version
- Operator: Contains
- Value: 13.5
To see a visual, see the screenshot below
Benefits of using Endpoint Version Conditional Tags
- Grouping Agents by version enables the user to see which machines (laptops, workstations, servers) are or are not running the latest Spirion Agent
- Pre-v13.6 Agents cannot perform specific functions such as Global Ignore or use the updated queueing system PostgreSQL (and pgBouncer).
- Pre-v13.4 Agents cannot perform specific functions, such as Differential Scanning.
- Pre-v13.5 Agents cannot peform Differential Scanning on Gmail Targets.
- Pre-v13.5 Agents cannot peform Differential Scanning on Gmail Targets.
Endpoint Name Conditional Tags - Targets
archTIS recommends you use Endpoint Name conditional Tags to focus on Targets. This Tag is commonly used in organizations and have proven very effective at organizing Targets and Targets by type.
- Target types include: Cloud sources, File Servers, Databases, etc.
Examples
- Potential Targets vary by environment but can include: Azure, OneDrive, SharePoint, Exchange Online, Gmail, SQL, Oracle, Snowflake, Informix, etc.
Exchange Target
- To create a Tag to help you examine your Exchange Targets, both on-premise and online, create a tag which uses the following logic
- Logic:
- Tag Type: Conditional (optionally, use Manual, but this requires adding each Exchange Target manually)
- Action Type: Endpoint Name
- Operator: Contains
- Value: "Exchange"
File Server Targets (Target by Type)
- To create a Tag to help you examine your File Server Targets, create a tag which uses the following logic
- Logic:
- Tag Name: File Servers
- Tag Type: Manual
- Manual Tag types require you to manually add endpoints (Targets or Agents) to the Tag
- Action Type: Endpoint Name
Benefits of using Endpoint Name Tags for Targets
- Grouping Agents by Target or Target type enables you to focus on Agents from the viewpoint of the source being scanned - SQL database, Exchange endpoints, etc.
- For example, You may routinely discover exposed sensitive data on your Exchange mail servers and instruct your Exchange Agents to scan them daily or weekly instead of monthly.
- You may add Agents or build custom reports to collect more information about the number and kind of sensitive data matches
Use the Tag examples in this topic to help you create your own custom Tags, or else create the Tags listed here to give your platform a starting collection of useful Tags.
Legacy/Mac/Linux Agents, Windows v13+, Tags, and Target Icons used in Spirion Sensitive Data Platform
Tags by Endpoint Platform Example: macOS Machines (Laptops, Workstations)
This Tag collects all of the Spirion Agents installed on Mac endpoint platforms (macOS laptops or workstations) in your environment.
- Tag Name: Mac Endpoints
- Tag Type: Conditional
- Logic:
- Action Type: Endpoint Platform
- Operator: Contains
- Value: "Mac"
- In the screenshot below the Targets captured by this conditional tag include multiple Agents on Mac machines, indicated by the Legacy/Mac/Linux Agent icon.
- Agent Management page: All Agents/Targets captured by this Tag, "Mac Endpoints," are shown on the Agent Management page.
- These Agents satisfy the Tag's condition of being macOS Endpoint Platforms
- Critical information such as Status, Last Heartbeat, Policy, and Agent version
Tags by Endpoint Name Example: Departments (HR, IT, Sales, Accounting)
This Tag collects all of the Spirion Agents installed on machines labeled as a specific department in your environment.
The SPIglass dashboard contains a tile which displays the amount of sensitive data matches across machines in different departments in your organization.
SPIglass Dashboard - Areas of Exposure
- Tag Name: Department names such as "HR" or "IT." Note that you can nest child tags within parent tags as shown below (Manual tag types only):
- Tag Type: Manual or Conditional
Tags by Endpoint Name Example:Oracle Database
This Tag collects all of the Oracle databases (Targets) installed on the different servers, workstations, or laptops in your environment.
- Tag Name: OracleDB
- Tag Type: Conditional
- Logic:
- Action Type: Endpoint Name
- Operator: Contains
- Value: "Oracle"
- In the example below the Targets captured by this manual tag include an Oracle database ("OracleTesting" Target) and an Oracle database server (Oracle19c).
- A similar Tag could be set up for SQL database Targets, or any other configured Target type.
- For instructions about how to add Tags to Targets, see the topic How to Bulk Assign Tags to Targets
Available Conditional Tags, Settings, and Values
The following table details the available settings and options for Conditional Tags.
A single result matches all of the conditions: Selecting this option requires a single result in a search location to match all of the conditions in a definition for the rule to be applied.
A group of results match all of the conditions: Selecting this option requires a group of results in a search location to match all of the conditions in a definition for the rule to be applied. Additionally, when the filter is set to Quantity, Action, or Data Types; you can create horizontal AND groups. Within a horizontal AND group all conditions must be met by a single result to be considered a match. *This does not apply to endpoint-specific filters such as Endpoint Versionor Endpoint Platform.
Action Type | Operator | Rule Description | Value Input |
|---|---|---|---|
ACL: Ace Type | Contains Does Not Contain Is Empty Is Not Empty | A filter which restricts based upon the ACE (Access Control Entry) Type. | Specify the value to be used to qualify the data.
|
ACL: Authorization | A filter which restricts based upon the specific rights granted to the trustee, such as the ability to READ, WRITE or DELETE the file. | Specify the value to be used to qualify the data. Filter by ACL type to view specific options:
| |
ACL: Trustee | A filter which restricts based upon the individual user or group to which the access rights apply. | Specify the value to be used to qualify the data.
| |
Client Activity State | A filter which restricts based on an the activity state of the client endpoint.
| Specify the value to be used to qualify the data.
| |
Endpoint GUID | Equals Does Not Equal Contains Does Not Contain Begins With Does Not Begin With Ends With Does Not End With Is Empty Is Not Empty | A filter which restricts by the GUID of the Agent.
| Specify the GUID number of the Agent to use to qualify the data.
|
Endpoint Name | A filter which restricts by the endpoint name of the Agent/Target (endpoint) | Specify the name of the Agent/Target (endpoint) to use to qualify the data.
| |
Endpoint Platform | A filter which restricts by the endpoint platform of the Agent/Target (endpoint)
| Specify the platform of the Agent/Target (endpoint) to use to qualify the data.
| |
Endpoint Version | A filter which restricts by the version of the Agent (endpoint). In the example below, only Agents (displayed as Targets - Agents can act as Targets) whose version number contains a 13 (v13-13.6) are shown. | Specify the Agent version to use to qualify the data. Examples: v13.6 Agents only
v12.x Agents
v12.x Agents Available to Scan
| |
Last Poll Time | On Not On After On Or After Before On Or Before Today Yesterday Not Empty Empty Last 30 Days Last 365 Days (1 Year) Last Week This Week Last Month This Month Last Year This Year Last X Days Last X Weeks Last X Months Last X Years Last X Hours Older Than X Days Older Than X Weeks Older Than X Months | A filter which restricts by the specified date/time the Agent/Target (endpoint) was polled. Use the available operators to customize how the date is used. |
|
MAC Address | Equals | A filter which restricts by the MAC address of the Agent/Target (endpoint) | Specify the MAC address to use to qualify the data. MAC address is a unique identifier composed of 12 hexadecimal digits. The most common format is six pairs of digits separated by:
|
Match Quantity | Equals | A filter which restricts by the quantity of sensitive data matches on the Agent/Target (endpoint). | Specify the value to be used to qualify the data. For example, if you create a rule with the following:
Then only Agents/Targets (endpoints) with exactly 10 total sensitive data matches would match this rule. |
Number of Searches | A filter which restricts by the number of searches performed on the Agent/Target (endpoint) | Specify the value to be used to qualify the data. For example, if you selected:
Then only Agents/Targets (endpoints) searched a total of 120 or more times are returned. Typically, the greater the number of searches, the fewer Agents/Targets returned. | |
Platform Type | Contains Does Not Contain Is Empty Is Not Empty | A filter which restricts by the Platform type of the Agent/Target (endpoint). | Specify the Platform type to be used to qualify the data. Platform types include:
*You can select more than 1 platform type. |
Policies | A filter which restricts by the user-specified Policy or Scan used by the Agent/Target (endpoint). | Specify the policy or scan to be used to qualify the data. For example:
| |
Protected Quantity | Equals Does Not Equal Greater Than or Equals Greater Than Less Than or Equals Less Than Is Empty Is Not Empty | A filter which restricts Agents/Targets (endpoints) by the amount of sensitive data matches with "Protected" status. "Protected" sensitive data matches have at least one of the following actions applied to them:
*Sensitive data matches labeled "MIP" and/or "Classified" do not qualify as Protected matches. | Specify the value to be used to qualify the data. For example, if you created a rule with the following:
Then only those Agents/Targets (endpoints) with exactly 5 total Protected sensitive data matches are returned. |
Search Date/Time | On Not On After On Or After Before On Or Before Today Yesterday Not Empty Empty Last 7 Days Last 30 Days Last 365 Days (1 Year) Last Week This Week Last Month This Month Last Year This Year Last X Days Last X Weeks Last X Months Last X Years Last X Hours Older Than X Days Older Than X Weeks Older Than X Months | A filter which restricts based on the date and time the file was last reported by a search per the filter. | If the (All day) option is selected, the time portion of the filter does not display. If the (All day) option is not selected, the time portion of the filter displays and is applied.
|
Search In Progress | No Yes | A filter which restricts based on the status of the Agent/Target (endpoint). Are the endpoints being actively scanned by a Spirion Agent? This setting is useful for testing, monitoring, and troubleshooting your Agents/Targets (endpoints). | Specify the value to be used to qualify the data.
|
Tags | Contains Does Not Contain Is Empty Is Not Empty | A filter for Agents/Targets (endpoints) assigned to the Tags applied via the filter conditions. | Specify the value to be used to qualify the data. For example, if you created a rule as follows:
Then all Agents/Targets (endpoints) captured by all the Tags selected in the rule, are be returned. All endpoints included in Tags such as:
|
Tag Name | Equals Does Not Equal Contains Does Not Contain Begins With Does Not Begin With Ends With Does Not End With Is Empty Is Not Empty | A filter which restricts by the name of the Tag the Agent/Target (endpoint) is a member of. | Specify the value to be used to qualify the data. For example, if you created a rule as follows:
Then all Agents/Targets (endpoints) captured by tags with the term "Older" in the tag name are returned. Such Tags could include:
|
Unprotected Quantity | Equals Does Not Equal Greater Than or Equals Greater Than Less Than or Equals Less Than Is Empty Is Not Empty | A filter which restricts Agents/Targets (endpoints) by the amount of sensitive data matches with "Unprotected" status. Unprotected sensitive data matches are those with no actions applied to them or have the following actions applied to them:
| Specify the value to be used to qualify the data. For example, if you created a rule with the following:
Then only those locations with 10 total matches would match this rule. |