Dashboard to understand, monitor and remediate threats and vulnerabilities specific to our remote users and their devices

Hi,

I am working on a new dashboard to understand, monitor and remediate threats and vulnerabilities specific to our remote users and their devices. I need to know how can we use the tags in IVM to identify remote assets accurately for monitoring and remediation.

Any advise would be appreciated.