...
- Device Access restrictions
- targets in Mass Config Push
- apply Backups Filters to devices
- apply Per-Tag Connectors to devices
- apply Sensitive Data Stripping policies
- a search criteria in Config Search
- etc.
Tags can be applied to devices from:
...
...
Tags can be applied to devices from:
...