Skip to content

Tags & Rules

Configure automatic tagging rules to categorize findings as they are discovered. Tag rules apply labels to exposures and alerts based on filter criteria you define, making it easier to organize, search, and route findings to the right teams.

Overview

Tags & Rules

The Tag Rules page displays all configured rules as a list. Each rule shows its name, active/disabled status indicator, and action buttons. Rules can be created, edited, enabled, disabled, or deleted from this view.

Rule List

Each tag rule in the list displays:

ElementDescription
Status indicatorGreen dot for active rules, gray dot for disabled rules. Hover shows a tooltip ("Active" or "Disabled").
Rule nameThe name of the rule. Hovering shows the rule's description in a tooltip (if a description was provided).
ActionsThree icon buttons: Delete (trash icon), Edit (pencil icon), and Enable/Disable (eye icon toggle)

Creating a Tag Rule

Click Add Tag Rule in the page header to open the rule creation form:

FieldDescription
Rule NameA descriptive name for the rule (required, max 190 characters). Example: "Critical Cloud Assets", "EU Infrastructure"
QueryThe filter criteria that determines which findings this rule applies to (required). Uses the same filter query syntax as the search filters throughout ShadowMap.
Apply retroactivelyCheckbox to apply the tag to all currently matching exposures or alerts, not just future ones

Tag rules can target either exposures (findings from asset discovery and vulnerability scanning) or alerts (security events and notifications).

Enabling and Disabling Rules

Rules can be toggled between active and disabled states without deleting them:

  • Active rules continuously apply their tags to new findings that match the query criteria
  • Disabled rules stop tagging new findings but do not remove tags already applied
  • Toggle between states using the eye icon in the rule's action buttons. A confirmation dialog appears before the change is applied.

How Tags Flow Into Alerts and Filters

Once a tag rule is active:

  1. New findings that match the rule's query criteria are automatically tagged
  2. Tagged findings can be filtered by tag in the Alerts view and other listing pages
  3. Team routing can use tags to direct specific categories of findings to the appropriate team
  4. Reports can be filtered by tag for focused reporting on specific asset groups or risk categories
  5. SLA tracking can reference tags for priority-based escalation workflows

Use Case Examples

Rule NameQueryPurpose
Critical Cloud Assetssource:aws AND risk:criticalTag all critical findings from AWS infrastructure for the cloud security team
EU Domainscountry:DE OR country:FR OR country:NLTag findings related to European infrastructure for GDPR compliance tracking
Public-Facing APIsport:443 AND technology:apiTag exposed API endpoints for the application security team

Deleting a Rule

Click the delete (trash) icon to remove a rule. A confirmation dialog asks you to confirm deletion. Deleting a rule does not remove tags from previously tagged findings -- it only stops future tagging.

ShadowMap by Security Brigade