Asset tags are groups of related assets with shared characteristics and sensitivity in the organization. With asset tagging, Hunters allows security teams to enrich security events with the business context and importance of the assets in the organization, as well as impact the severity of the security event, and hence the risk evaluation.
Asset tags tell the system to adjust the lead's risk score based on the importance and sensitivity of the involved asset. For instance, leads involving the email address of the company's CEO will be extra-sensitive, as if breached, it could lead to extensive damage to the company.
Tag origin
Tags can originate from 2 different sources:
Hunters innate tags
User define tags
Hunters innate tags
Hunters provides an innate list of asset tags that are automatically created based on raw security data. These include Domain Controllers, Domain Administrators, Exchange Servers, Google and Okta Admins, and more.
Hunters tag | How is it done? |
---|---|
| The logic depends on the data provided by the Endpoint Detection and Response (EDR) system. For example, in Crowdstrike we look for (1) an event with the simple name |
| Hunters is looking for exchange processes running from |
| Hunters looks for records where the
|
| Hunters looks for records where the device_platform is WINDOWS and the lowered_target_process_path contains the path to certsrv.exe.
|
| Hunters looks for records in which:
|
| This tag will be applied to records in which:
|
| This tag will be applied to Windows devices related to specific Citrix processes.
|
| This tag will be applied to users who logged into assets that are tagged as domain controllers and are not:
|
| Currently applicable for Crowdstrike and Sentinel only.
|
|
|
| Different logic per EDR. |
| This tag will be added to assets in which event_type matches any of the values specified below.
|
|
|
| This tag will be added to assets whose
|
User-defined tags
You can define your own custom tags with rules that will allow assets to be automatically tagged.
User-defined asset tags appear under the Enrichment section of the relevant asset. So when examining a lead, you will need to navigate to the asset's tab and then scroll down to the Enrichment section to locate the Asset tag enrichment, if exists.
📘 Learn more
Learn more about working with user-defined tags here.
Asset tagging will only be applied to new security events, and not retroactively.
Hunters innate tags vs. User defined tags
Hunters innate tags | User-defined tags | |
---|---|---|
Origin | Hunters OOTB | User |
Setup | Not required | Manually under Knowledge Center> Tags or using API |
Visibility | Under the asset/attribute name | Under the Enrichment section |
Retroactive application | Not relevant | Not applied retroactively |
Supported asset types
Asset tagging can be applied only to assets from the types below:
Kind |
---|
Agent ID |
Hostname |
Username |
OS Username |
IP |
Person Name |
AWS Secret |
AWS account ID |
AWS user identity ARN |
Domain |
Available sensitivity levels
When setting up an asset tag you can define the sensitivity level that will be assigned to each asset with this tag. Each sensitivity level has a different impact on the lead's final risk score.
While Custom Scoring allows for control over the Confidence level of leads, asset tags allow a global level of control over the Severity of leads.
Asset sensitivity is an additional scoring layer that influences the severity of the security event.
Sensitivity Level | Severity Impact | Description |
---|---|---|
Critical | Increase the severity level by 1 | This level should be assigned to groups that are considered the organization’s critical assets and crown jewels. Examples: the organization's critical infrastructure servers, Billing servers, and Domain Controllers. |
High | Increase the severity level by 0.5 | This level should be assigned to groups that are considered important to the organization’s day to day operation and mission. Examples: service accounts, Exchange servers. |
Neutral | Do nothing (i.e. informational only) | This level should be assigned to groups mainly to enrich the security event with more business context regarding the assets’ essence and role in the organization. Examples: company employees, domain names. |
Low | Decrease the severity level by 0.5 | This level should be assigned to assets that if impacted as part of a security event, have very low impact on the organization. Examples: simulation and testing accounts and environments. |