Hi,
I am working on a new dashboard to understand, monitor and remediate threats and vulnerabilities specific to our remote users and their devices. I need to know how can we use the tags in IVM to identify remote assets accurately for monitoring and remediation.
Any advise would be appreciated.