Previous Topic: Assets Tagging

Next Topic: Configure Tags in CA Access Control Enterprise Management

How You Use Tags To Administer Security Groups

Using tags and tag rules can facilitate security groups management. Based on the tags and tag rules you define, CA Access Control Enterprise Management can automatically add managed devices to security groups and apply policies to the managed devices.

Follow these steps:

  1. You create a tag in CA Access Control Enterprise Management.
  2. You do one of the following:
  3. You define a tag rule, associate a tag with the rule you create and define the rule criteria.
  4. CA Access Control Enterprise Management does the following:
    1. Applies the rule to the security group that the tag is associated with
    2. Assigns the tag to each managed device that complies with the tag rule
    3. Adds the managed devices that comply with the tag rule to the security group
    4. Applies the policies you configured for the security group to the managed devices

    You can now administer the managed devices from the security group.

    Note: If you delete the tag rule, CA Access Control Enterprise Management removes the managed devices from the security group