Fortinet black logo

EMS Administration Guide

Zero Trust Tagging Rules

Zero Trust Tagging Rules

You can create, edit, and delete Zero Trust tagging rules for Windows, macOS, and Linux endpoints. You can also view and manage the tags used to dynamically group endpoints.

The following occurs when using Zero Trust tagging rules with EMS and FortiClient:

  1. EMS sends Zero Trust tagging rules to endpoints via Telemetry communication.
  2. FortiClient checks endpoints using the provided rules and sends the results to EMS.
  3. EMS receives the results from FortiClient.
  4. EMS dynamically groups endpoints together using the tag configured for each rule. You can view the dynamic endpoint groups in Zero Trust Tags > Zero Trust Tag Monitor. See Zero Trust Tag Monitor.

Zero Trust Tagging Rules

You can create, edit, and delete Zero Trust tagging rules for Windows, macOS, and Linux endpoints. You can also view and manage the tags used to dynamically group endpoints.

The following occurs when using Zero Trust tagging rules with EMS and FortiClient:

  1. EMS sends Zero Trust tagging rules to endpoints via Telemetry communication.
  2. FortiClient checks endpoints using the provided rules and sends the results to EMS.
  3. EMS receives the results from FortiClient.
  4. EMS dynamically groups endpoints together using the tag configured for each rule. You can view the dynamic endpoint groups in Zero Trust Tags > Zero Trust Tag Monitor. See Zero Trust Tag Monitor.