The primary use or function of the IT product as described by the checklist (e.g., client desktop host, web server, bastion host, network border protection, intrusion detection).
						                            Source(s):
						                            
								                            
                                                                    NIST SP 800-70 Rev. 4