Tanium 7.3 Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +102 −102
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 102
- V-234031 Medium Tanium must centrally review and analyze audit records from multiple components within the system.
- V-234032 Medium Tanium must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
- V-234033 Medium Tanium must employ a deny-all, permit-by-exception (whitelist) policy to allow the execution of authorized software programs.
- V-234034 Medium The vulnerability scanning application must implement privileged access authorization to all Tanium information systems and infrastructure components for selected organization-defined vulnerability scanning activities.
- V-234035 Medium The Tanium endpoint must have the Tanium Servers public key in its installation.
- V-234036 Medium Access to Tanium logs on each endpoint must be restricted by permissions.
- V-234037 Medium The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server.
- V-234038 Medium Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications.
- V-234039 Medium Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
- V-234040 Medium The ability to uninstall the Tanium Client service must be disabled on all managed clients.
- V-234041 Medium The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.
- V-234042 Medium Tanium endpoint files must be excluded from on-access antivirus actions.
- V-234043 Medium The Tanium Client Deployment Tool (CDT) must not be configured to use the psexec method of deployment.
- V-234044 Medium Tanium endpoint files must be protected from file encryption actions.
- V-234045 Medium The Tanium application must restrict the ability of individuals to place too much impact upon the network, which might result in a Denial of Service (DoS) event on the network by using RandomSensorDelayInSeconds.
- V-234046 Medium Tanium endpoint files must be excluded from host-based intrusion prevention intervention.
- V-234047 Medium The Tanium application must retain the session lock until the user reestablishes access using established identification and authentication procedures.
- V-234048 Medium The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.
- V-234049 Medium The Tanium Application Server must be configured to only use Microsoft Active Directory for account management functions.
- V-234050 Medium Tanium Computer Groups must be used to restrict console users from affecting changes to unauthorized computers.
- V-234051 Medium Documentation identifying Tanium console users, their respective functional roles, and computer groups must be maintained.
- V-234052 High Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.
- V-234053 Medium Tanium console users User Roles must be validated against the documentation for User Roles.
- V-234054 Medium Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.
- V-234055 Medium Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.
- V-234056 High Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with privileged accounts.
- V-234057 Medium Firewall rules must be configured on the Tanium Server for Console-to-Server communications.
- V-234058 Medium The publicly accessible Tanium application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application.
- V-234059 Medium Tanium must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- V-234060 Medium Flaw remediation Tanium applications must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
- V-234061 Medium Tanium must notify SA and ISSO when accounts are created.
- V-234062 Medium Tanium must notify SA and ISSO when accounts are modified.
- V-234063 Medium The Tanium application must notify SA and ISSO of account enabling actions.
- V-234064 Medium The Tanium application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- V-234065 Medium The Tanium enterprise audit log reduction option must be configured to provide alerts based off Tanium audit data.
- V-234066 Medium Common Access Card (CAC)-based authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
- V-234067 Medium Tanium must notify SA and ISSO for account disabling actions.
- V-234068 Medium Tanium must notify SA and ISSO for account removal actions.
- V-234069 Medium The Tanium application must prohibit user installation of software without explicit privileged status.
- V-234070 Medium Documentation defining Tanium functional roles must be maintained.
- V-234071 Medium The Tanium database(s) must be installed on a separate system.
- V-234072 Medium The Tanium application database must be dedicated to only the Tanium application.
- V-234073 Medium The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.
- V-234074 Medium The Tanium Server installers account database permissions must be reduced to an appropriate level.
- V-234075 Medium Firewall rules must be configured on the Tanium Server for Server-to-Database communications.
- V-234076 Medium SQL stored queries or procedures installed during Tanium installation must be removed from the Tanium Server.
- V-234077 Medium The Tanium Server must protect the confidentiality and integrity of transmitted information, in preparation to be transmitted and data at rest, with cryptographic signing capabilities enabled to protect the authenticity of communications sessions when making requests from Tanium Clients.
- V-234078 Medium The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity.
- V-234079 Medium Tanium Trusted Content providers must be documented.
- V-234080 Medium Content providers must provide their public key to the Tanium administrator to import for validating signed content.
- V-234081 Medium Tanium public keys of content providers must be validated against documented trusted content providers.
- V-234082 Medium The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.
- V-234083 Medium The Tanium documentation identifying recognized and trusted Intel streams must be maintained.
- V-234084 Medium The Tanium Detect must be configured to receive IOC streams only from trusted sources.
- V-234085 Medium The Tanium Connect module must be configured to forward Tanium Detect events to identified destinations.
- V-234086 Medium The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.
- V-234087 Medium The Tanium Server must be configured to only allow signed content to be imported.
- V-234088 Medium All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory.
- V-234089 Medium Firewall rules must be configured on the Tanium Server for Client-to-Server communications.
- V-234090 Medium Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications.
- V-234091 Medium The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-234092 Medium The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication.
- V-234093 High The Tanium Server certificate and private/public keys directory must be protected with appropriate permissions.
- V-234094 Medium The Tanium Module server must be installed on a separate system.
- V-234095 Medium The Tanium Server directory must be restricted with appropriate permissions.
- V-234096 Medium The Tanium Server http directory and sub-directories must be restricted with appropriate permissions.
- V-234097 Medium The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account and the [Tanium Admins] group.
- V-234098 Medium The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions.
- V-234099 Medium All Active Directory accounts synchronized with Tanium for non-privileged functions must be non-privileged domain accounts.
- V-234100 Medium A Tanium connector must be configured to send log data to an external audit log reduction capable system.
- V-234101 Medium File integrity monitoring of critical executables that Tanium uses must be configured.
- V-234102 Medium Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server.
- V-234103 Medium Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.
- V-234104 Medium Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.
- V-234105 Medium The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server.
- V-234106 Medium The Tanium Server certificate must be signed by a DoD Certificate Authority.
- V-234107 Medium Any Tanium configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.
- V-234108 Medium Tanium Server files must be excluded from on-access antivirus actions.
- V-234109 Medium Tanium Server files must be protected from file encryption actions.
- V-234110 Medium The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.
- V-234111 Medium The Tanium max_soap_sessions_total setting must be explicitly enabled to limit the number of simultaneous sessions.
- V-234112 Medium The Tanium max_soap_sessions_per_user setting must be explicitly enabled to limit the number of simultaneous sessions.
- V-234113 Medium The Tanium soap_max_keep_alive setting must be explicitly enabled to limit the number of simultaneous sessions.
- V-234114 Medium The Tanium documentation identifying recognized and trusted folders for Detect Local Directory Source must be maintained.
- V-234115 Medium The Tanium Detect Local Directory Source must be configured to restrict access to only authorized maintainers of Intel.
- V-234116 Medium The Tanium documentation identifying recognized and trusted SCAP sources must be maintained.
- V-234117 Medium The Tanium documentation identifying recognized and trusted OVAL feeds must be maintained.
- V-234118 Medium Tanium Comply must be configured to receive SCAP content only from trusted sources.
- V-234119 Medium Tanium Comply must be configured to receive OVAL feeds only from trusted sources.
- V-234120 Medium The Tanium application must be configured in a High-Availability (HA) setup to ensure minimal loss of data and minimal disruption to mission processes in the event of a system failure.
- V-234121 Medium The bandwidth consumption for the Tanium Application server must be limited.
- V-234122 Medium The Tanium SQL Server RDBMS must be configured with sufficient free space to ensure audit logging is not impacted.
- V-234123 Medium The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a Denial of Service (DoS) condition at the server.
- V-234124 Medium The Tanium Application Server must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
- V-234125 Medium Tanium Server files must be excluded from host-based intrusion prevention intervention.
- V-234126 Medium The Tanium application must set an absolute timeout for sessions.
- V-234127 Medium The Tanium application must set an inactive timeout for sessions.
- V-234128 Medium The Tanium application service must be protected from being stopped by a non-privileged user.
- V-234129 Medium The Tanium web server must be tuned to handle the operational requirements of the hosted application.
- V-234130 Medium The Tanium application, SQL and Module servers must all be configured to communicate using TLS 1.2 Strict Only.
- V-234131 Medium The Tanium application must be configured to communicate using TLS 1.2 Strict Only.
- V-234132 Medium The Tanium application must be configured to communicate using TLS 1.2 Strict Only.
Removed rules 102
- V-92033 Medium Tanium must centrally review and analyze audit records from multiple components within the system.
- V-92035 Medium Tanium must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
- V-92037 Medium Tanium must employ a deny-all, permit-by-exception (whitelist) policy to allow the execution of authorized software programs.
- V-92039 Medium The vulnerability scanning application must implement privileged access authorization to all Tanium information systems and infrastructure components for selected organization-defined vulnerability scanning activities.
- V-92041 Medium The Tanium endpoint must have the Tanium Servers public key in its installation.
- V-92043 Medium Access to Tanium logs on each endpoint must be restricted by permissions.
- V-92045 Medium The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server.
- V-92047 Medium Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications.
- V-92049 Medium Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
- V-92051 Medium The ability to uninstall the Tanium Client service must be disabled on all managed clients.
- V-92053 Medium The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.
- V-92055 Medium Tanium endpoint files must be excluded from on-access antivirus actions.
- V-92057 Medium The Tanium Client Deployment Tool (CDT) must not be configured to use the psexec method of deployment.
- V-92059 Medium Tanium endpoint files must be protected from file encryption actions.
- V-92061 Medium The Tanium application must restrict the ability of individuals to place too much impact upon the network, which might result in a Denial of Service (DoS) event on the network by using RandomSensorDelayInSeconds.
- V-92063 Medium Tanium endpoint files must be excluded from host-based intrusion prevention intervention.
- V-92065 Medium The Tanium application must retain the session lock until the user reestablishes access using established identification and authentication procedures.
- V-92067 Medium The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.
- V-92069 Medium The Tanium Application Server must be configured to only use Microsoft Active Directory for account management functions.
- V-92071 Medium Tanium Computer Groups must be used to restrict console users from affecting changes to unauthorized computers.
- V-92073 Medium Documentation identifying Tanium console users, their respective functional roles, and computer groups must be maintained.
- V-92075 High Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.
- V-92077 Medium Tanium console users User Roles must be validated against the documentation for User Roles.
- V-92079 Medium Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.
- V-92081 Medium Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.
- V-92083 High Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with privileged accounts.
- V-92085 Medium Firewall rules must be configured on the Tanium Server for Console-to-Server communications.
- V-92087 Medium The publicly accessible Tanium application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application.
- V-92089 Medium Tanium must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
- V-92091 Medium Flaw remediation Tanium applications must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
- V-92093 Medium Tanium must notify SA and ISSO when accounts are created.
- V-92095 Medium Tanium must notify SA and ISSO when accounts are modified.
- V-92097 Medium The Tanium application must notify SA and ISSO of account enabling actions.
- V-92099 Medium The Tanium application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
- V-92101 Medium The Tanium enterprise audit log reduction option must be configured to provide alerts based off Tanium audit data.
- V-92103 Medium Common Access Card (CAC)-based authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
- V-92105 Medium Tanium must notify SA and ISSO for account disabling actions.
- V-92107 Medium Tanium must notify SA and ISSO for account removal actions.
- V-92109 Medium The Tanium application must prohibit user installation of software without explicit privileged status.
- V-92111 Medium Documentation defining Tanium functional roles must be maintained.
- V-92113 Medium The Tanium database(s) must be installed on a separate system.
- V-92115 Medium The Tanium application database must be dedicated to only the Tanium application.
- V-92117 Medium The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.
- V-92119 Medium The Tanium Server installers account database permissions must be reduced to an appropriate level.
- V-92121 Medium Firewall rules must be configured on the Tanium Server for Server-to-Database communications.
- V-92123 Medium SQL stored queries or procedures installed during Tanium installation must be removed from the Tanium Server.
- V-92125 Medium The Tanium Server must protect the confidentiality and integrity of transmitted information, in preparation to be transmitted and data at rest, with cryptographic signing capabilities enabled to protect the authenticity of communications sessions when making requests from Tanium Clients.
- V-92127 Medium The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity.
- V-92129 Medium Tanium Trusted Content providers must be documented.
- V-92131 Medium Content providers must provide their public key to the Tanium administrator to import for validating signed content.
- V-92133 Medium Tanium public keys of content providers must be validated against documented trusted content providers.
- V-92135 Medium The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.
- V-92137 Medium The Tanium documentation identifying recognized and trusted Intel streams must be maintained.
- V-92139 Medium The Tanium Detect must be configured to receive IOC streams only from trusted sources.
- V-92141 Medium The Tanium Connect module must be configured to forward Tanium Detect events to identified destinations.
- V-92143 Medium The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.
- V-92145 Medium The Tanium Server must be configured to only allow signed content to be imported.
- V-92147 Medium All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory.
- V-92149 Medium Firewall rules must be configured on the Tanium Server for Client-to-Server communications.
- V-92151 Medium Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications.
- V-92153 Medium The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
- V-92155 Medium The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication.
- V-92157 High The Tanium Server certificate and private/public keys directory must be protected with appropriate permissions.
- V-92159 Medium The Tanium Module server must be installed on a separate system.
- V-92161 Medium The Tanium Server directory must be restricted with appropriate permissions.
- V-92163 Medium The Tanium Server http directory and sub-directories must be restricted with appropriate permissions.
- V-92165 Medium The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account and the [Tanium Admins] group.
- V-92167 Medium The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions.
- V-92169 Medium All Active Directory accounts synchronized with Tanium for non-privileged functions must be non-privileged domain accounts.
- V-92171 Medium A Tanium connector must be configured to send log data to an external audit log reduction capable system.
- V-92173 Medium File integrity monitoring of critical executables that Tanium uses must be configured.
- V-92175 Medium Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server.
- V-92177 Medium Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.
- V-92179 Medium Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.
- V-92181 Medium The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server.
- V-92183 Medium The Tanium Server certificate must be signed by a DoD Certificate Authority.
- V-92185 Medium Any Tanium configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.
- V-92187 Medium Tanium Server files must be excluded from on-access antivirus actions.
- V-92189 Medium Tanium Server files must be protected from file encryption actions.
- V-92191 Medium The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.
- V-92193 Medium The Tanium max_soap_sessions_total setting must be explicitly enabled to limit the number of simultaneous sessions.
- V-92195 Medium The Tanium max_soap_sessions_per_user setting must be explicitly enabled to limit the number of simultaneous sessions.
- V-92197 Medium The Tanium soap_max_keep_alive setting must be explicitly enabled to limit the number of simultaneous sessions.
- V-92199 Medium The Tanium documentation identifying recognized and trusted folders for Detect Local Directory Source must be maintained.
- V-92201 Medium The Tanium Detect Local Directory Source must be configured to restrict access to only authorized maintainers of Intel.
- V-92203 Medium The Tanium documentation identifying recognized and trusted SCAP sources must be maintained.
- V-92205 Medium The Tanium documentation identifying recognized and trusted OVAL feeds must be maintained.
- V-92207 Medium Tanium Comply must be configured to receive SCAP content only from trusted sources.
- V-92209 Medium Tanium Comply must be configured to receive OVAL feeds only from trusted sources.
- V-92211 Medium The Tanium application must be configured in a High-Availability (HA) setup to ensure minimal loss of data and minimal disruption to mission processes in the event of a system failure.
- V-92213 Medium The bandwidth consumption for the Tanium Application server must be limited.
- V-92215 Medium The Tanium SQL Server RDBMS must be configured with sufficient free space to ensure audit logging is not impacted.
- V-92217 Medium The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a Denial of Service (DoS) condition at the server.
- V-92219 Medium The Tanium Application Server must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
- V-92221 Medium Tanium Server files must be excluded from host-based intrusion prevention intervention.
- V-92223 Medium The Tanium application must set an absolute timeout for sessions.
- V-92225 Medium The Tanium application must set an inactive timeout for sessions.
- V-92227 Medium The Tanium application service must be protected from being stopped by a non-privileged user.
- V-92229 Medium The Tanium web server must be tuned to handle the operational requirements of the hosted application.
- V-92231 Medium The Tanium application, SQL and Module servers must all be configured to communicate using TLS 1.2 Strict Only.
- V-92233 Medium The Tanium application must be configured to communicate using TLS 1.2 Strict Only.
- V-92235 Medium The Tanium application must be configured to communicate using TLS 1.2 Strict Only.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- TANS-00-000155
- Vuln IDs
-
- V-234031
- V-92033
- Rule IDs
-
- SV-234031r612749_rule
- SV-102135
Checks: C-37216r610593_chk
Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured sources under "Configured Sources and Destinations" section. If an "Audit Log" source does not exist, this is a finding.
Fix: F-37181r610594_fix
Using a web browser on a system that has connectivity to Tanium, access the Tanium web UI. Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Click "Create Connection". In the "Source and Destination" section, select "Audit Log" as the source from the drop-down menu. In the "Destination" section, select the desired Destination and fill in the respective fields. In the "Format" section, select the desired file format type. In the "Schedule" section, select the desired schedule. Click "Create Connection".
- RMF Control
- CM-3
- Severity
- M
- CCI
- CCI-001744
- Version
- TANS-00-000655
- Vuln IDs
-
- V-234032
- V-92035
- Rule IDs
-
- SV-234032r612749_rule
- SV-102137
Checks: C-37217r610596_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on the module "Integrity Monitor". Click on "Monitors" from the left menu. Ensure "Monitors" are deployed with applicable Watchlists and Endpoints. Record any that have a number greater than "0" otherwise, this is a finding. If using third party integrity monitoring tools, this is Not Applicable.
Fix: F-37182r610597_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on the module "Integrity Monitor". Click "Watchlist" from the left menu. "Create a New Watchlist" in the upper right corner. Add Name and Description of the new Watchlist. Select "Path Style" that fits your enterprise needs. Select "Create". Click on the new Watchlist. Select "Add Paths". Add paths to be monitored (Work with your TAM to determine correct paths). Click "Monitor" from the left menu. "Create a New Monitor" in the upper right corner. Add "Name" Add "Description". Add computers for the new Monitor along with Watchlist. Click "Create". Select "Deploy Monitors".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001774
- Version
- TANS-00-000670
- Vuln IDs
-
- V-234033
- V-92037
- Rule IDs
-
- SV-234033r612749_rule
- SV-102139
Checks: C-37218r610599_chk
Using a web browser on a system, which has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on the navigation button (menu) on the top left of the console. Click on the "Protect Workbench". Select the arrow on the left-hand side to expand the menu. Click on "Policies". Click on the Policy with Policy Type named "AppLocker". If there is no policy type defined for "AppLocker", this is a finding. Ensure the computer group containing the Tanium server is showing as online and enforced. If the "AppLocker" policy enforcement does not contain the Tanium Server, then this is a finding. Under Policy Details ensure the Mode is set to "Blocking". If Mode is not set to "Blocking", this is a finding. Under "Policy Details" expand the arrow next to "Everyone". If all files are allowed, this is a finding. If additional paths are found, such as %PROGRAMFILES%\", "%WINDIR%" and "?:\Program Files\Tanium Server\", they must be documented. If additional file paths are found and have not been documented, this is a finding. If Tanium Protect is not available, this is not applicable.
Fix: F-37183r610600_fix
Using a web browser on a system, which has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on the navigation button (menu) on the top left of the console. Click on the "Protect Workbench". Select the arrow on the left-hand side to expand the menu. Click on "Policies". Click on "New Policy". Select "Create". Provide a name to the policy. Select "AppLocker" from the Policy Type menu. Within the policy, ensure the "Blocking" radio button is selected. In the "Allow" section, ensure the default rules for "All files located in the Program Files Folder" and "All Files located in the Windows folder" are present. If the Tanium Server is installed in a non-default location, then a rule needs to be created to allow that file path. All rules need Windows user set to "Everyone". Save the Policy. Click on "Add Enforcement". From the dropdown, select the computer group, which contains the Tanium Server. Select "enforce".
- RMF Control
- RA-5
- Severity
- M
- CCI
- CCI-001067
- Version
- TANS-00-000755
- Vuln IDs
-
- V-234034
- V-92039
- Rule IDs
-
- SV-234034r612749_rule
- SV-102141
Checks: C-37219r610602_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users. If any users have access to Tanium Comply and are not on the list of documented users, this is a finding. If Tanium Comply is not installed, this check is Not Applicable.
Fix: F-37184r610603_fix
Prepare and maintain documentation identifying the Tanium Comply users and their respective User Roles and AD security groups.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- TANS-CL-000001
- Vuln IDs
-
- V-234035
- V-92041
- Rule IDs
-
- SV-234035r612749_rule
- SV-102143
Checks: C-37220r610605_chk
The Tanium endpoint makes a connection to the Tanium Server; the endpoint's copy of the Tanium Server's public key is used to verify the validity of the registration day coming from the Tanium Server. If any endpoint systems do not have the correct Tanium Server public key in its configuration, they will not perform any instructions from the Tanium Server and a record of those endpoints will be listed in the Tanium Server's System Status. To validate, Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "System Status" tab. Change "Show systems that have reported in the last:", enter "7" in the first field. Select "Days" from the drop down menu in the second field to determine if any endpoints connected with an invalid key. If any systems are listed with "No" in the "Valid Key" column, this is a finding.
Fix: F-37185r610606_fix
For systems which do not have a valid key for the Tanium Server, redeploy the client software from Tanium using the Tanium Client Deployment Tool or work with the Tanium System Administrator to accomplish this.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- TANS-CL-000002
- Vuln IDs
-
- V-234036
- V-92043
- Rule IDs
-
- SV-234036r612749_rule
- SV-102145
Checks: C-37221r610608_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Actions". Click on "Scheduled Actions". Look for a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory". If a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory" does not exist, or there is a Scheduled Action contradicting the "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory" scheduled action, this is a finding. If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding.
Fix: F-37186r610609_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. On the Dashboard, select "Client Service Hardening". Select the "Set Client Directory Permissions". Tanium will parse the script and return a row for "Restricted" and a row for "Not Restricted", with their respective client counts. Click on the "Not Restricted" row. Select "Deploy Action". In the "Deploy Action" dialog box, the package "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory" will be selected. The clients, which have their Tanium Client directory "Not Restricted" will be displayed in the bottom window. Choose a schedule to deploy the hardening. Under "Targeting Criteria", in the Action Group, select "All Computers" from the drop-down. Click on "Deploy Action". Verify settings. Click on "Show Client Status Details".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- TANS-CL-000003
- Vuln IDs
-
- V-234037
- V-92045
- Rule IDs
-
- SV-234037r612749_rule
- SV-102147
Checks: C-37222r610611_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box type "AllQuestionsRequireSignatureFlag". Click "Enter". If no results are returned, this is a finding. If results are returned for "AllQuestionsRequireSignatureFlag" but the value is not "1", this is a finding.
Fix: F-37187r610612_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog box, enter "AllQuestionsRequireSignatureFlag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Client" from "Affects" drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- TANS-CL-000004
- Vuln IDs
-
- V-234038
- V-92047
- Rule IDs
-
- SV-234038r612749_rule
- SV-102149
Checks: C-37223r610614_chk
Note: This check is performed for the Tanium Endpoints and must be validated against the HBSS desktop firewall policy applied to the Endpoints. Consult with the HBSS administration for assistance. Validate a rule exists within the HBSS HIPS firewall policies for managed clients for the following: Port Needed: Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network. If a network firewall rule does not exist to allow TCP port 17472 from any managed computer to any other managed computer on the same local area network, this is a finding.
Fix: F-37188r610615_fix
Configure host-based and network firewall rules as required.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-CL-000005
- Vuln IDs
-
- V-234039
- V-92049
- Rule IDs
-
- SV-234039r612749_rule
- SV-102151
Checks: C-37224r610617_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Scheduled Actions" tab. Look for a scheduled action titled "Client Service Hardening - Allow Only Local SYSTEM to Control Service". If a scheduled action titled "Client Service Hardening - Allow Only Local SYSTEM to Control Service" does not exist, this is a finding. If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding. If the scheduled action exists and has been approved but does not restrict control of the Tanium Client service to Allow Only Local SYSTEM to Control Service, this is a finding. If the action is not configured to repeat at least every hour, this is a finding. If the scheduled action is not targeted at an "All Computers" Action Group, this is a finding.
Fix: F-37189r610618_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Control Service State Permissions". The results will show a "Count" of clients matching the "Service Control is set to default permissions" query. Select the result line for "Service Control is set to default permissions". Choose "Deploy Action". Deployment Package drop-down select "Client Service Hardening - Allow Only Local SYSTEM to Control Service". Configure the schedule to repeat at least every hour for the requested action. Under "Targeting Criteria", in the Action Group, select "All Computers" from the drop-down. Click on "Show preview to continue". Non-compliant systems will be displayed at the bottom. Click on "Deploy Action". Verify settings. Click on "Show Client Status Details".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-CL-000006
- Vuln IDs
-
- V-234040
- V-92051
- Rule IDs
-
- SV-234040r612749_rule
- SV-102153
Checks: C-37225r610620_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Scheduled Actions" tab. Look for a scheduled action titled "Client Service Hardening - Hide Client from Add-Remove Programs". If a scheduled action titled "Client Service Hardening - Hide Client from Add-Remove Programs" does not exist, this is a finding. If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding. If the scheduled action exists and has been approved but does not disable the visibility of the client in Add-Remove Programs, this is a finding. If the action is not configured to repeat at least every hour, this is a finding. If the scheduled action is not targeted at an "All Computers" Action Group, this is a finding.
Fix: F-37190r610621_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Hide From Add-Remove Programs". The results will show a "Count" of clients matching the "Tanium Client Visible in Add-Remove Programs" query. Select the result line. Choose "Deploy Action". The "Deploy Action" dialog box will display "Client Service Hardening - Hide Client from Add-Remove Programs" as the package. The computer names comprising the "Count" of non-compliant systems will be displayed in the bottom. Deployment Package drop-down select "Client Service Hardening - Hide Client from Add-Remove Programs". Configure the schedule to repeat at least every hour for the requested action. Under "Targeting Criteria", in the Action Group, select "All Computers" from the drop-down. Click on "Show preview to continue". Non-compliant systems will be displayed in the bottom. Click on "Deploy Action". Verify settings. Click on "Show Client Status Details".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-CL-000007
- Vuln IDs
-
- V-234041
- V-92053
- Rule IDs
-
- SV-234041r612749_rule
- SV-102155
Checks: C-37226r610623_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Scheduled Actions" tab. Look for a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory". If a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" does not exist, this is a finding. If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding. If the scheduled action exists and has been approved but does not disable the visibility of the client in Add-Remove Programs, this is a finding. If the action is not configured to repeat at least every hour, this is a finding. If the scheduled action is not targeted at an "All Computers" Action Group, this is a finding.
Fix: F-37191r610624_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Set Client Directory Permissions". The results will show a "Count" of clients' compliant and non-compliant hardening for the "Tanium Client Directory Permissions". Non-compliant clients will have a count other than "0" for "Not Restricted" or "Error: No Permissions". Select each of the "Not Restricted" or "Error: No Permissions" statuses. Select "Deploy Action". In the "Deploy Action" dialog box, change the package to "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" as the package. Configure the schedule to repeat at least every hour for the requested action. Under "Targeting Criteria", in the Action Group, select "All Computers" from the drop-down. Click on "Show preview to continue". Non-compliant systems will be displayed in the bottom. Click on "Deploy Action". Verify settings. Click on "Show Client Status Details".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-CL-000008
- Vuln IDs
-
- V-234042
- V-92055
- Rule IDs
-
- SV-234042r612749_rule
- SV-102157
Checks: C-37227r610626_chk
Consult with the Tanium System Administrator to determine the antivirus used on the Tanium clients. Review the settings of the antivirus software. Validate exclusions exist which exclude the Tanium program files from being scanned by antivirus on-access scans. If exclusions do not exist, this is a finding.
Fix: F-37192r610627_fix
Implement exclusion policies within the antivirus software solution to exclude the on-access scanning of Tanium client program files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-CL-000010
- Vuln IDs
-
- V-234043
- V-92057
- Rule IDs
-
- SV-234043r612749_rule
- SV-102159
Checks: C-37228r610629_chk
Access the Tanium Module Server interactively. Log on to the server with an account that has administrative privileges. Navigate to Program Files(x86) >> Tanium >> Tanium Client Deployment Tool. If the file "psexec.exe" exists, this is a finding.
Fix: F-37193r610630_fix
Access the Tanium Module Server interactively. Log on to the server with an account that has administrative privileges. Navigate to Program Files(x86) >> Tanium >> Tanium Client Deployment Tool. Remove the file "psexec.exe".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-CL-000012
- Vuln IDs
-
- V-234044
- V-92059
- Rule IDs
-
- SV-234044r612749_rule
- SV-102161
Checks: C-37229r610632_chk
Consult with the Tanium System Administrator to determine the file-based encryption software used on the Tanium clients. Review the settings for the file-based encryption software. Validate exclusions exist which exclude the Tanium program files from being encrypted by the file-based encryption software. If exclusions do not exist, this is a finding.
Fix: F-37194r610633_fix
Implement excluding policies within the file-based encryption software solution to exclude the file level encryption of the Tanium client program files.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- TANS-CL-000013
- Vuln IDs
-
- V-234045
- V-92061
- Rule IDs
-
- SV-234045r612749_rule
- SV-102163
Checks: C-37230r610635_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box type "RandomSensorDelayInSeconds". Click "Enter". If no results are returned, this is a finding. If results are returned for "RandomSensorDelayInSeconds", but do not match the defined value in the system documentation, this is a finding.
Fix: F-37195r610636_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog box, enter "RandomSensorDelayInSeconds" for "Setting Name:". Consult with a Tanium TAM for an appropriate value for a given network. Enter the value for "Setting Value:". Select "Clients" from "Affects" drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save". Document the value for later use.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-CL-000014
- Vuln IDs
-
- V-234046
- V-92063
- Rule IDs
-
- SV-234046r612749_rule
- SV-102165
Checks: C-37231r610638_chk
Consult with the Tanium System Administrator to determine the HIPS software used on the Tanium Clients. Review the settings of the HIPS software. Validate exclusions exist which exclude the Tanium program files from being restricted by HIPS. If exclusions do not exist, this is a finding.
Fix: F-37196r610639_fix
Implement exclusion policies within the HIPS software solution to exclude the Tanium client program files from HIPS intervention.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000060
- Version
- TANS-CN-000001
- Vuln IDs
-
- V-234047
- V-92065
- Rule IDs
-
- SV-234047r612749_rule
- SV-102167
Checks: C-37232r610641_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Run regedit as Administrator. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Validate the value for REG_DWORD "ForceSOAPSSLClientCert" is set to "1". Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Validate the following keys exist and are configured: REG_SZ "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name. REG_SZ "ClientCertificateAuthRegex" For example-DoD: .*\:\s*([^@]+)@.* $Note: This regedit should be valid for any Subject Alternative Name entry. REG_SZ "ClientCertificateAuth" Note: This registry value defines which certificate file to use for authentication. For example: C:\Program Files\Tanium\Tanium Server\dod.pem REG_SZ "cac_ldap_server_url" Note: This registry value requires that Tanium validate every CAC/PIV authentication attempt with AD to determine the state of the account that is logging in. It must use the syntax similar to LDAP://<AD instance FQDN> If the value for REG_DWORD "ForceSOAPSSLClientCert" is not set to "1" and the remaining registry values are not configured, this is a finding.
Fix: F-37197r610642_fix
Use the vendor documentation titled "Reference: Smartcard authentication" to implement correct configuration settings for this requirement. If assistance is required, contact the Tanium Technical Account Manager (TAM). Vendor documentation can be downloaded from the following URL: https://docs.tanium.com/platform_install/platform_install/reference_smart_card_authentication.html.
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- TANS-CN-000002
- Vuln IDs
-
- V-234048
- V-92067
- Rule IDs
-
- SV-234048r612749_rule
- SV-102169
Checks: C-37233r610644_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console, then click on "Configuration". Click the down arrow to view Apps. Find "LDAP Sync". Verify a sync exists under "Enabled Servers". If no sync exists, this is a finding. If sync exists under "Disabled Servers", this is a finding.
Fix: F-37198r610645_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console, then click on "Configuration". Click the down arrow to view Apps. Find "LDAP Sync". Click "Add Server". Complete the settings using guidance from https://docs.tanium.com/platform_user/platform_user/console_using_ldap.html. Click "Show Preview to Continue". Review the users and groups to be imported. Save the configuration.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-CN-000003
- Vuln IDs
-
- V-234049
- V-92069
- Rule IDs
-
- SV-234049r612749_rule
- SV-102171
Checks: C-37234r610647_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Users" tab. Consult with the Tanium System Administrator to review the documented list of Tanium users. Compare the list of Tanium users versus the users found in the appropriate Active Directory security groups for the User Roles. If there are any console users who are listed in the Tanium console that are not found in a synced Active Directory security group, this is a finding. Alternatively, the ISSO can document the non-synced Active Directory security group users and accept the risk for the users. If this is the case, this would no longer be a finding.
Fix: F-37199r610648_fix
Consult with the Tanium System Administrator to review the documented list of Tanium users. Compare the list of Tanium users versus the users found in the appropriate Active Directory security groups for the User Roles. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on "Administration". Select the "Users" tab. Any users populated manually, select the user's name, and then click on the ""trashcan"" icon at the top of the console to delete this user. Note: Consult with the Tanium System Administrator before deleting any user accounts to ensure any scheduled actions or other content is reassigned to another user. This will prevent any potential issues arising from the deletion of a user.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-CN-000004
- Vuln IDs
-
- V-234050
- V-92071
- Rule IDs
-
- SV-234050r612749_rule
- SV-102173
Checks: C-37235r610650_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Computer Groups" tab. Under the "Name" column, verify specific groups exist other than the default "All Computers" and "No Computers". If site or organization specific computer groups do not exist, this is a finding.
Fix: F-37200r610651_fix
Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Computer Groups" tab. Configure specific Computer Groups in order to facilitate the management of computers by authorized individuals for those computers. Note: Tanium offers two ways to define computer groups. Refer to documentation for explanation found here: https://docs.tanium.com/platform_user/platform_user/console_computer_groups.html#Computer_Group_types. Note: Active Directory Computer Groups may also be used to sync with Tanium Computer Groups as a means to satisfy this requirement.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-CN-000005
- Vuln IDs
-
- V-234051
- V-92073
- Rule IDs
-
- SV-234051r612749_rule
- SV-102175
Checks: C-37236r610653_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users. The users' functional roles, computer groups, and correlated Active Directory security groups must be documented. If the site does not have the Tanium users and their respective functional roles, computer groups, and correlated Active Directory security groups documented, this is a finding.
Fix: F-37201r610654_fix
Prepare and maintain documentation identifying the Tanium console users and their respective User Roles and AD security groups.
- RMF Control
- AC-3
- Severity
- H
- CCI
- CCI-000213
- Version
- TANS-CN-000006
- Vuln IDs
-
- V-234052
- V-92075
- Rule IDs
-
- SV-234052r612749_rule
- SV-102177
Checks: C-37237r610656_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users. Analyze the users configured in the Tanium interface. Review the users' respective approved roles, as well as the correlated Active Directory Group for the Tanium functional roles. Validate Active Directory Groups/Tanium functional roles are documented to assign least privileged access to the functions of the Tanium Server through the Tanium interface. If the documentation does not reflect a granular, least privileged access approach to the Active Directory Groups/Tanium functional roles assignment, this is a finding.
Fix: F-37202r610657_fix
Analyze the users configured in the Tanium interface. Determine least privileged access required for each user to perform their respective duties. Move users to the appropriate Active Directory Group in order to ensure the user is synced to the appropriate Tanium functional role. If appropriate Active Directory Groups are not already configured, create the Groups and add the appropriate users. Ensure LDAP sync repopulates the Tanium Users' associated functional roles accordingly.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-CN-000007
- Vuln IDs
-
- V-234053
- V-92077
- Rule IDs
-
- SV-234053r612749_rule
- SV-102179
Checks: C-37238r610659_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Users" tab. Verify each user against the Tanium-approved users list. Review the assigned roles for each user against the "User Functional Role" column. If any user exists in Tanium but is not on the Tanium-approved users list and/or if any user exists in Tanium at a more elevated User Functional Role than that documented on the list, this is a finding.
Fix: F-37203r610660_fix
When using Active Directory synchronization, as is required by this STIG, User Roles assignments are assigned by LDAP sync. AD security groups correlate, one to one, to Tanium User Roles. To change a Tanium user's User Functional Role, their Active Directory account needs to be moved to the AD security group, which correlates with the applicable User Functional Role. Access the Active Directory server. Locate the account(s), which have been determined to have the incorrect User Functional Roles in Tanium. Review the Tanium-related AD Security Groups to which the user account(s) belong that directly correlate to the incorrect Tanium User Functional Roles. Remove the user account(s) from the incorrect Tanium User Roles, ensuring the user account(s) are still members of the Tanium-related AD Security Groups for which they have been documented to be authorized.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-CN-000008
- Vuln IDs
-
- V-234054
- V-92079
- Rule IDs
-
- SV-234054r612749_rule
- SV-102181
Checks: C-37239r610662_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users and their respective, approved Computer Group rights. If the documented list does not have the Tanium users and their respective, approved Computer Group rights documented, this is a finding.
Fix: F-37204r610663_fix
Prepare and maintain documentation identifying the Tanium console users and their respective Computer Group rights.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-CN-000009
- Vuln IDs
-
- V-234055
- V-92081
- Rule IDs
-
- SV-234055r612749_rule
- SV-102183
Checks: C-37240r610665_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Users" tab. Verify each user against the approved users list. Review the assigned Computer Groups for each user by selecting the user then clicking view user. View Computer Groups for the user. If any user exists in Tanium but is not on the Tanium-approved users list and/or if any user exists in Tanium with more Computer Groups than documented, this is a finding.
Fix: F-37205r610666_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Users" tab. For any user(s) in Tanium, which is not on the approved, documented Tanium user list, access Microsoft Windows Active Directory Management. Remove, the respective user(s) from the AD Security Group in which those user(s) are members. For any user in Tanium which has not been assigned one or more Computer Groups as has been documented in the Computer Groups list, access the Microsoft Windows Active Directory Management. Add the respective user(s) to the AD Security Groups applicable for the functional roles for which the user(s) have been documented to be authorized. Click "Save".
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- TANS-CN-000010
- Vuln IDs
-
- V-234056
- V-92083
- Rule IDs
-
- SV-234056r612749_rule
- SV-102185
Checks: C-37241r610668_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Run regedit as Administrator. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Validate the value for REG_DWORD "ForceSOAPSSLClientCert" is set to "1". Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Validate the following keys exist and are configured: REG_SZ "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name. REG_SZ "ClientCertificateAuthRegex" For example-DoD: .*\:\s*([^@]+)@.* $Note: This regedit should be valid for any Subject Alternative Name entry. REG_SZ "ClientCertificateAuth" Note: This registry value defines which certificate file to use for authentication. For example: C:\Program Files\Tanium\Tanium Server\dod.pem REG_SZ "cac_ldap_server_url" Note: This registry value requires that Tanium validate every CAC/PIV authentication attempt with AD to determine the state of the account that is logging on. It must use the syntax similar to LDAP://<AD instance FQDN>. If the value for REG_DWORD "ForceSOAPSSLClientCert" is not set to "1" and the remaining registry values are not configured, this is a finding.
Fix: F-37206r610669_fix
Use the vendor documentation titled "Reference: Smart card authentication" to implement correct configuration settings for this requirement. If assistance is required, contact the Tanium Technical Account Manager (TAM). Vendor documentation can be downloaded from the following URL: https://docs.tanium.com/platform_install/platform_install/reference_smart_card_authentication.html.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-CN-000014
- Vuln IDs
-
- V-234057
- V-92085
- Rule IDs
-
- SV-234057r612749_rule
- SV-102187
Checks: C-37242r610671_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate a rule exists for the following: Port Needed: From only designated Tanium console user clients to Tanium Server over TCP port 443. If a host-based firewall rule does not exist to allow only designated Tanium console user clients to Tanium Server over TCP port 443, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic from only designated Tanium console user clients to Tanium Server over TCP ports 443. If a network firewall rule does not exist to allow traffic from only designated Tanium console user clients to Tanium Server over TCP port 443, this is a finding.
Fix: F-37207r610672_fix
Configure host-based firewall rules on the Tanium Server to include the following required traffic: Allow TCP traffic on port 433 to the Tanium Server from designated Tanium console user clients. Configure the network firewall to allow the above traffic.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- TANS-CN-000015
- Vuln IDs
-
- V-234058
- V-92087
- Rule IDs
-
- SV-234058r612749_rule
- SV-102189
Checks: C-37243r610674_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). If a DoD-approved use notification banner does not display prior to logon, this is a finding.
Fix: F-37208r610675_fix
Create an .html file composed of the DoD-authorized warning banner verbiage. Name the file "warning_banner.html". Copy the .html file to the Tanium Server’s http folder. Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog box, enter "console_PreLoginBannerHTML" for "Setting Name:". Enter "warning_banner.html" for "Setting Value:". Enter Server for "Affects:". Enter Text for "Value Type:". Click "Save".
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- TANS-CN-000016
- Vuln IDs
-
- V-234059
- V-92089
- Rule IDs
-
- SV-234059r612749_rule
- SV-102191
Checks: C-37244r610677_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured Sources. If no "Sources" exist to send audit logs from the Tanium SQL Server to a SIEM tool, this is a finding. Work with the SIEM administrator to determine if an alert is configured when audit data is no longer received as expected. If there is no alert configured, this is a finding.
Fix: F-37209r610678_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Configure "Sources" to send audit logs from the Tanium SQL Server to a SIEM tool. Work with the SIEM administrator to configure an alert when no audit data is received from Tanium based on the defined schedule of connections.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-001233
- Version
- TANS-CN-000018
- Vuln IDs
-
- V-234060
- V-92091
- Rule IDs
-
- SV-234060r612749_rule
- SV-102193
Checks: C-37245r610680_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Scheduled Actions" tab. Look for a scheduled action targeting all machines that is titled either "Patch - Distribute Scan Configuration" or "Patch Management - Run Patch Scan". If there is no Scheduled Action for patching or the Scheduled Action is less frequent than every "30" days, this is a finding.
Fix: F-37210r610681_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Scheduled Actions" tab. Look for a scheduled action targeting all machines that is titled either "Patch - Distribute Scan Configuration" or "Patch Management - Run Patch Scan". Make sure the action is enabled, and configure it to reissue at a minimum, every "30" days.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001683
- Version
- TANS-CN-000019
- Vuln IDs
-
- V-234061
- V-92093
- Rule IDs
-
- SV-234061r612749_rule
- SV-102195
Checks: C-37246r610683_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured sources. If no sources exists to send audit logs from Tanium to a SIEM tool or Email Destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when accounts are created. If there is no alert configured, this is a finding.
Fix: F-37211r610684_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination. Work with Email administrator to configure Email destination. Work with the SIEM administrator to configure an alert when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001684
- Version
- TANS-CN-000020
- Vuln IDs
-
- V-234062
- V-92095
- Rule IDs
-
- SV-234062r612749_rule
- SV-102197
Checks: C-37247r610686_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured sources. If no sources exists to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when accounts are modified. If there is no alert configured, this is a finding.
Fix: F-37212r610687_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Configure a source to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination. Work with Email administrator to configure Email destination. Work with the SIEM administrator to configure an alert when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002132
- Version
- TANS-CN-000021
- Vuln IDs
-
- V-234063
- V-92097
- Rule IDs
-
- SV-234063r612749_rule
- SV-102199
Checks: C-37248r610689_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured sources. If no sources exists to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when account-enabling actions are performed. If there is no alert configured, this is a finding.
Fix: F-37213r610690_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination. Work with Email administrator to configure Email destination. Work with the SIEM administrator to configure an alert when account-enabling actions are performed.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- TANS-CN-000022
- Vuln IDs
-
- V-234064
- V-92099
- Rule IDs
-
- SV-234064r612749_rule
- SV-102201
Checks: C-37249r610692_chk
Consult with the Tanium system administrator or database administrator to determine the volume on which the Tanium SQL databases are installed. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured Sources. If none exist to send Disk Free Space of the Tanium SQL Server, this is a finding. Work with the SIEM administrator to determine if an alert is configured when Disk Free Space of the Tanium SQL Server reaches below 25%. If there is no alert configured, this is a finding.
Fix: F-37214r610693_fix
Consult with the Tanium system administrator or database administrator to determine the volume on which the Tanium SQL databases are installed. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Interact". Enter "Get Disk Free Space from all machines with Computer Name containing "[Your SQL Computer Name]. Press "Enter". Select "Save this question" located under the Question box. Enter a name (e.g., SQL Disk Free Space). Select "Create Saved Question". Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Select "Create Connection". In the Sources and Destination section, select "Saved Question" from the drop-down menu. Enter the "Saved Question Name" created above or select from the drop-down menu. Select the "Computer Group" name from the drop-down menu. Select the desired destination from the drop-down menu (must be a SIEM tool). In the General Information section, provide a name and description. Select "Create Connection" at bottom of the page. Work with the SIEM administrator to configure an alert when Disk Free Space of the Tanium SQL Server reaches below 25% of maximum.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- TANS-CN-000023
- Vuln IDs
-
- V-234065
- V-92101
- Rule IDs
-
- SV-234065r612749_rule
- SV-102203
Checks: C-37250r610695_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured Tanium Sources listed. If an "Audit Log" source does not exist, this is a finding. Select the "Audit Log" source. Select the audit connection found in the lower half of the screen. Verify the "Destination Type" is a SIEM tool. If the "Destination Type" is not a SIEM tool, this is a finding.
Fix: F-37215r610696_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Click "Create Connection". In the Source and Destination Section, select "Audit Log" as the Event Source from the drop-down menu. In the "Destination" section, select "Socket Receiver" from the drop-down menu. Enter "Destination Name". Enter "Host". Enter "Network Protocol". Enter "Port". Consult documentation located at https://docs.tanium.com/connect/connect/index.html for reference on configuring other applicable SIEM connections. Work with the SIEM administrator to configure alerts based on audit failures.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- TANS-CN-000027
- Vuln IDs
-
- V-234066
- V-92103
- Rule IDs
-
- SV-234066r612749_rule
- SV-102205
Checks: C-37251r610698_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Run regedit as Administrator. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Validate the value for REG_DWORD "ForceSOAPSSLClientCert" is set to "1". Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Validate the following keys exist and are configured: REG_SZ "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name REG_SZ "ClientCertificateAuthRegex" For example-DoD: .*\:\s*([^@]+)@.* $Note: This regedit should be valid for any Subject Alternative Name entry. REG_SZ "ClientCertificateAuth" Note: This registry value defines which certificate file to use for authentication. For example: C:\Program Files\Tanium\Tanium Server\dod.pem REG_SZ "cac_ldap_server_url" Note: This registry value requires that Tanium validate every CAC/PIV authentication attempt with AD to determine the state of the account that is logging on. It must use the syntax similar to LDAP://<AD instance FQDN>. If the value for REG_DWORD "ForceSOAPSSLClientCert" is not set to "1" and the remaining registry values are not configured, this is a finding.
Fix: F-37216r610699_fix
Use the vendor documentation titled "Reference: Smart card authentication" to implement correct configuration settings for this requirement. If assistance is required, contact the Tanium Technical Account Manager (TAM). Vendor documentation can be downloaded from the following URL: https://docs.tanium.com/platform_install/platform_install/reference_smart_card_authentication.html.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001685
- Version
- TANS-CN-000032
- Vuln IDs
-
- V-234067
- V-92105
- Rule IDs
-
- SV-234067r612749_rule
- SV-102207
Checks: C-37252r610701_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured sources. If no sources exists to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when accounts are disabled. If there is no alert configured, this is a finding.
Fix: F-37217r610702_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination. Work with Email administrator to configure Email destination. Work with the SIEM administrator to configure an alert when accounts are disabled.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001686
- Version
- TANS-CN-000033
- Vuln IDs
-
- V-234068
- V-92107
- Rule IDs
-
- SV-234068r612749_rule
- SV-102209
Checks: C-37253r610704_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured sources. If no sources exists to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when accounts are deleted. If there is no alert configured, this is a finding.
Fix: F-37218r610705_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or Email Destination. Work with Email administrator to configure Email destination. Work with the SIEM administrator to configure an alert when accounts are deleted.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- TANS-CN-000036
- Vuln IDs
-
- V-234069
- V-92109
- Rule IDs
-
- SV-234069r612749_rule
- SV-102211
Checks: C-37254r610707_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users. Review the users' respective approved roles, as well as the correlated Active Directory security group for the User Roles. Validate Active Directory security groups/Tanium roles are documented to assign least privileged access to the functions of the Tanium Server through the Tanium interface. If the documentation does not reflect a granular, least privileged access approach to the Active Directory Groups/Tanium Roles assignment, this is a finding.
Fix: F-37219r610708_fix
Analyze the users configured in the Tanium interface. Determine least privileged access required for each user to perform their respective duties. Move users to the appropriate Active Directory security group in order to ensure the user is synced to the appropriate Tanium User Role. If the appropriate Active Directory security groups are not already configured, create the groups and add the appropriate users. Ensure LDAP sync repopulates the Tanium Users' associated Roles accordingly.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-CN-000037
- Vuln IDs
-
- V-234070
- V-92111
- Rule IDs
-
- SV-234070r612749_rule
- SV-102213
Checks: C-37255r610710_chk
Consult with the Tanium System Administrator to review the documented list of Tanium functional roles. If the documentation does not define functional roles, this is a finding.
Fix: F-37220r610711_fix
Consult with the Tanium System Administrator to review the documented list of Tanium functional roles. If the documentation does not define functional roles, this is a finding.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- TANS-DB-000001
- Vuln IDs
-
- V-234071
- V-92113
- Rule IDs
-
- SV-234071r612749_rule
- SV-102215
Checks: C-37256r610713_chk
Consult with the Tanium System Administrator to determine the server to which the database has been installed and is configured. If the customer is using a Tanium Appliance, this is Not Applicable. If the database is installed on the same server as the Tanium Server or Tanium Module Server, this is a finding.
Fix: F-37221r610714_fix
Move the Tanium database from the Tanium Server or Tanium Module Server to a separate server.
- RMF Control
- AC-23
- Severity
- M
- CCI
- CCI-002346
- Version
- TANS-DB-000002
- Vuln IDs
-
- V-234072
- V-92115
- Rule IDs
-
- SV-234072r612749_rule
- SV-102217
Checks: C-37257r610716_chk
With the Tanium System Administrator's assistance, access the server on which the Tanium database(s) is installed. Review the Tanium database(s). If databases related to products other than Tanium exist in the Tanium database, this is a finding.
Fix: F-37222r610717_fix
Move the Tanium database from the server hosting multiple databases for products other than Tanium or remove other product databases co-located with Tanium database(s).
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- TANS-DB-000003
- Vuln IDs
-
- V-234073
- V-92117
- Rule IDs
-
- SV-234073r612749_rule
- SV-102219
Checks: C-37258r610719_chk
Access the Tanium SQL server interactively. Log on to the server with an account that has administrative privileges. Open SQL Server Management Studio. Connect to a Tanium instance of SQL Server. In the left pane, click "Databases". Select the Tanium database. Click "Security". Click "Users". In the "Users" pane, review the roles assigned to the user accounts. (Note: This does not apply to service accounts.) If any user account has an elevated privilege role other than the assigned database administrators, this is a finding.
Fix: F-37223r610720_fix
Access the Tanium SQL server interactively. Log on to the server with an account that has administrative privileges. Open SQL Server Management Studio. Connect to a Tanium instance of SQL Server. In the left pane, click "Databases". Select the Tanium database. Click "Security". Click "Users". In the "Users" pane, review the roles assigned to the user accounts. For any user accounts with elevated privileges, reduce the role assigned to a least privileged role.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001814
- Version
- TANS-DB-000004
- Vuln IDs
-
- V-234074
- V-92119
- Rule IDs
-
- SV-234074r612749_rule
- SV-102221
Checks: C-37259r610722_chk
Access the Tanium SQL server interactively. Log on to the server with an account that has administrative privileges. Open SQL Server Management Studio. Connect to Tanium instance of SQL Server. In the left pane, click "Databases". Select the Tanium database. Click "Security". Click "Users". In the "Users" pane, review the role assigned to the Tanium Server service user account. If the role assigned to the Tanium Server service account is not "db_owner", this is a finding. If using Postgres: Only owners of objects can change them. To view all functions, triggers, and trigger procedures, their ownership and source, as the database administrator (shown here as "postgres") run the following SQL: $ sudo su - postgres $ psql -x -c "\df+"
Fix: F-37224r610723_fix
Access the Tanium SQL server interactively. Log on to the server with an account that has administrative privileges. Open SQL Server Management Studio. Connect to Tanium instance of SQL Server. In the left pane, click "Databases". Select the Tanium database. Click "Security". Click "Users". In the "Users" pane, right-click the Tanium Server service user account. On the shortcut menu, click "Properties". Under Database role membership, change role from "sysadmin" to "db_owner". Click "OK". If using Postgres: Configure PostgreSQL to enforce access restrictions associated with changes to the configuration of PostgreSQL or database(s). Use ALTER ROLE to remove accesses from roles: $ psql -c "ALTER ROLE <role_name> NOSUPERUSER"
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-DB-000005
- Vuln IDs
-
- V-234075
- V-92121
- Rule IDs
-
- SV-234075r612749_rule
- SV-102223
Checks: C-37260r610725_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate a rule exists for the following: Port Needed: Tanium Server to Remote SQL Server over TCP port 1433. If a host-based firewall rule does not exist to allow Tanium Server to Remote SQL Server over TCP port 1433, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow traffic from Tanium Server to Remote SQL Server over TCP port 1433. If a network firewall rule does not exist to allow traffic from Tanium Server to Remote SQL Server over TCP port 1433, this is a finding.
Fix: F-37225r610726_fix
Configure host-based firewall rules on the Tanium Server to include the following required traffic: Allow TCP traffic on port 1433 from the Tanium Server to the Remote SQL Server. Configure the network firewall to allow the above traffic.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002617
- Version
- TANS-DB-000006
- Vuln IDs
-
- V-234076
- V-92123
- Rule IDs
-
- SV-234076r612749_rule
- SV-102225
Checks: C-37261r610728_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Navigate to Program Files >> Tanium >> Tanium Server. If any SQL stored queries (.sql files) or procedures are found, this is a finding.
Fix: F-37226r610729_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Navigate to Program Files >> Tanium >> Tanium Server. Remove the SQL stored queries (.sql files) or procedures from the folder.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- TANS-SV-000001
- Vuln IDs
-
- V-234077
- V-92125
- Rule IDs
-
- SV-234077r612749_rule
- SV-102227
Checks: C-37262r610731_chk
Using a web browser on a system, which has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box type "ReportingTLSMode". Enter. If no results are returned, this is a finding. In the "Show Settings Containing:" search box type "StateProtectedFlag". Enter. If no results are returned or "StateProtectedFlag = 0", this is a finding. If results are returned for "ReportingTLSMode" but the value is "0", this is a finding.
Fix: F-37227r612218_fix
Using a web browser on a system, which has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog window to the right, enter "ReportingTLSMode" for "Setting Name:". Enter "2" for "Setting Value:". Select "Client" from "Affects" drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save". Click on "New Setting". In "New System Setting" dialog window to the right, enter "StateProtectedFlag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Client" from "Affects" drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- TANS-SV-000002
- Vuln IDs
-
- V-234078
- V-92127
- Rule IDs
-
- SV-234078r612749_rule
- SV-102229
Checks: C-37263r610734_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. After logging in, in the top right corner of the UI select the drop down arrow and click on "Preferences". Verify the "Suspend console automatically if no activity detected for:" is configured to a value of "15" minutes or less. If the "Suspend console automatically if no activity detected for:" is not configured to a value of "15" minutes or less, this is a finding.
Fix: F-37228r610735_fix
Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. After logging in, in the top right corner of the UI, select the drop down arrow and click on "Preferences". For "Suspend console automatically if no activity detected for:" select a value of "15" minutes or less. Click "Save".
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- TANS-SV-000003
- Vuln IDs
-
- V-234079
- V-92129
- Rule IDs
-
- SV-234079r612749_rule
- SV-102231
Checks: C-37264r610737_chk
Note: If only using Tanium provided content and not accepting content from any other content providers, this is Not Applicable. Consult with the Tanium System Administrator to review the documented list of trusted content providers along with the Hash for their respective public keys. If the site does not have the Tanium trusted content providers documented along with the SHA-256 Hash for their respective public keys, this is a finding.
Fix: F-37229r610738_fix
Prepare and maintain documentation identifying the Tanium trusted content providers along with the SHA-256 Hash from their respective public keys.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- TANS-SV-000004
- Vuln IDs
-
- V-234080
- V-92131
- Rule IDs
-
- SV-234080r612749_rule
- SV-102233
Checks: C-37265r610740_chk
Note: If only using Tanium provided content and not accepting content from any other content providers, this is Not Applicable. Obtain documentation from the Tanium System Administrator that contains the public key validation data. Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to the following folder: Program Files >> Tanium >> Tanium Server >> content_public_keys >> content folder. If the Tanium default content-release.pub key is the only key in the folder, this is not a finding. If there are documented content provider keys in the content folder, this is not a finding. If non-documented content provider keys are found in the content folder, this is a finding.
Fix: F-37230r610741_fix
Obtain the public key from the content providers and validate the keys are present in the Tanium folders. If the public keys are found for non-trusted content providers, remove the associated signing key and remove any content imported by that provider. Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to the following folder: Program Files >> Tanium >> Tanium Server >> content_public_keys >> content folder. Copy any Trusted Source's .pub key into the folder and document them. Remove any non-Trusted Source's .pub keys from the folder.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- TANS-SV-000005
- Vuln IDs
-
- V-234081
- V-92133
- Rule IDs
-
- SV-234081r612749_rule
- SV-102235
Checks: C-37266r610743_chk
Note: If only using Tanium provided content and not accepting content from any other content providers, this is Not Applicable. Obtain documentation from the Tanium System Administrator that contains the public key validation data. Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an "Explorer" window. Navigate to the following folder: Program Files >> Tanium >> Tanium Server >> content_public_keys >> content folder. Ensure the public keys listed in the content folder are documented. If a public key, other than the default Tanium public key, resides in the content folder and is not documented, this is a finding.
Fix: F-37231r610744_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an "Explorer" window. Navigate to the following folder: Program Files >> Tanium >> Tanium Server >> content_public_keys >> content folder. If a public key, other than the default Tanium public key, resides in the content folder, use a hashing utility (e.g., TaniumFileInfo.exe) to determine the hash of the public key. Document the owner, the name of the key, and the associated hash of the public key.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-SV-000006
- Vuln IDs
-
- V-234082
- V-92135
- Rule IDs
-
- SV-234082r612749_rule
- SV-102237
Checks: C-37267r610746_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console then click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box type "require_action_approval". Click “Enter”. If no results are returned, this is a finding. If results are returned for "require_action_approval", but the value is not "1", this is a finding.
Fix: F-37232r610747_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console then click on "Administration". Select the "Global Settings" tab. If "require_action_approval" does not exist: click on "New Setting". In "New System Setting" dialog box, enter "require_action_approval" for "Setting Name:". Enter "1" for "Setting Value:". Select "Server" from "Affects" drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save".
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-SV-000007
- Vuln IDs
-
- V-234083
- V-92137
- Rule IDs
-
- SV-234083r612749_rule
- SV-102239
Checks: C-37268r610749_chk
Consult with the Tanium System Administrator to determine if the "Tanium Detect" module is being used, if not this is Not Applicable. Review the documented list of IOC trusted stream sources. If the site does use an external source for IOCs and the IOC trusted stream source is not documented, this is a finding.
Fix: F-37233r610750_fix
Consult with the Tanium System Administrator to determine if the "Tanium Detect" module is being used, if not this is Not Applicable. Prepare and maintain documentation identifying the Tanium Detect IOC trusted stream sources.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-SV-000008
- Vuln IDs
-
- V-234084
- V-92139
- Rule IDs
-
- SV-234084r612749_rule
- SV-102241
Checks: C-37269r610752_chk
Consult with the Tanium System Administrator to determine if the "Tanium Detect" module is being used, if not this is Not Applicable. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Detect". Expand the left menu. Click the "Management" tab. Select "Sources". Verify all configured Detect Streams are configured to a documented trusted source. If any configured Detect Stream is configured to a stream that has not been documented as trusted, this is a finding.
Fix: F-37234r610753_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Detect". Expand the left menu. Click the "Management" tab. Select "Sources". Click "New Source". Select the specified Source from the list. Fill out the specified information. Select "Create".
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- TANS-SV-000010
- Vuln IDs
-
- V-234085
- V-92141
- Rule IDs
-
- SV-234085r612749_rule
- SV-102243
Checks: C-37270r610755_chk
Consult with the Tanium System Administrator to determine if the "Tanium Detect" module is being used. If it is not, this is Not Applicable. Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Click "Events" under "Sources". Verify the "Tanium IOC Detect" event is being sent to an identified destination. If there is no "Tanium IOC Detect" event source, this is a finding.
Fix: F-37235r610756_fix
Consult with the Tanium System Administrator to determine if the "Tanium Detect" module is being used. If not this is Not Applicable. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Click "New Connection". Click "Create" or if importing "Import". Give the "Connection" a name and description. Select "Events" as the source. "Event Group" should be "Tanium Detect". Select the appropriate events to send. Consult with the Tanium System Administrator for the Destination. Click "Create Connection".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- TANS-SV-000014
- Vuln IDs
-
- V-234086
- V-92143
- Rule IDs
-
- SV-234086r612749_rule
- SV-102245
Checks: C-37271r610758_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box type "sign_all_questions_flag". Click "Enter". If no results are returned, this is a finding. If results are returned for "sign_all_questions_flag" but the value is not "1", this is a finding.
Fix: F-37236r610759_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog box, enter "sign_all_questions_flag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Server" from "Affects" drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- TANS-SV-000015
- Vuln IDs
-
- V-234087
- V-92145
- Rule IDs
-
- SV-234087r612749_rule
- SV-102247
Checks: C-37272r610761_chk
Note: This requirement only applies to Tanium implementations in production. If implementation being evaluated is in development, this requirement is Not Applicable. Access the Tanium Server through interactive logon. Drill to Program Files >> Tanium >> Tanium Server. Open the "tanium.license" in Notepad and search for "allow_unsigned_import". If "allow unsigned_import" is followed by ":true", this is a finding.
Fix: F-37237r610762_fix
Contact Tanium for a corrected license file.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- TANS-SV-000016
- Vuln IDs
-
- V-234088
- V-92147
- Rule IDs
-
- SV-234088r612749_rule
- SV-102249
Checks: C-37273r610764_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Run regedit as Administrator. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Validate the "DownloadPath REG_SZ" value does not point to a location within the Tanium Server directory. If the "DownloadPath REG_SZ" value points to a location within the Tanium Server directory, this is a finding.
Fix: F-37238r610765_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Configure a directory elsewhere on the server to relocate the installation package files. Run regedit as Administrator. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Change the "DownloadPath REG_SZ" value to point to the location of the relocated installation package files. Move the files from the original directory to the location created for the installation package files.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- TANS-SV-000017
- Vuln IDs
-
- V-234089
- V-92149
- Rule IDs
-
- SV-234089r612749_rule
- SV-102251
Checks: C-37274r610767_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate rules exist, as required, to include: Between Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network. If a network firewall rule does not exist to allow TCP port 17472 from any managed computer to any other managed computer on the same local area network, this is a finding.
Fix: F-37239r610768_fix
Configure host-based and network firewall rules as required, to include Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. Allow TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- TANS-SV-000018
- Vuln IDs
-
- V-234090
- V-92151
- Rule IDs
-
- SV-234090r612749_rule
- SV-102253
Checks: C-37275r610770_chk
Note: If a Zone Server is not being used, this is Not Applicable. Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Zone Server. Access the host-based firewall configuration on the Tanium Zone Server. Validate a rule exists for the following: Port Needed: Tanium Clients to Zone Server over TCP port 17472. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, from Tanium Clients to the Tanium Zone Server, this is a finding.
Fix: F-37240r610771_fix
Configure host-based firewall rules as required, to include Tanium Clients to Zone Server over TCP port 17472.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- TANS-SV-000019
- Vuln IDs
-
- V-234091
- V-92153
- Rule IDs
-
- SV-234091r612749_rule
- SV-102255
Checks: C-37276r610773_chk
Review the PPSM CAL to ensure Tanium has been registered with all of the TCP ports required for functionality to include (but not limited to) TCP 17472, 17477, 17440, 17441, 443, and 1433. If any TCP ports are being used on the Tanium Server that have been deemed as restricted by the PPSM CAL, this is a finding.
Fix: F-37241r610774_fix
Submit a formal request to have the Tanium communication ports evaluated and added to the PPSM CAL.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- TANS-SV-000020
- Vuln IDs
-
- V-234092
- V-92155
- Rule IDs
-
- SV-234092r612749_rule
- SV-102257
Checks: C-37277r610776_chk
Access the Tanium Application server interactively. Log on to the server with an account that has administrative privileges. Navigate to Program Files >> Tanium >> Tanium Server. Locate the "SOAPServer.crt" file. Double-click on the file to open the certificate. Select the "Details" tab. Scroll down through the details to find and select the "Enhanced Key Usage" field. If there is no "Enhanced Key Usage" field, this is a finding. In the bottom screen, verify "Server Authentication" and "Client Authentication" are both identified. If "Server Authentication" and "Client Authentication" are not both identified, this is a finding.
Fix: F-37242r610777_fix
Request or regenerate the certificate being used to include both the "Server Authentication" and "Client Authentication" objects.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000186
- Version
- TANS-SV-000021
- Vuln IDs
-
- V-234093
- V-92157
- Rule IDs
-
- SV-234093r612749_rule
- SV-102259
Checks: C-37278r610779_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to >> Program Files >> Tanium >> Tanium Server. Right-click on the "Certs" folder. Choose "Properties". Select the "Security" tab. Click on the "Advanced" button. Validate the owner of the directory is the [Tanium service account]. Validate System has "Read Only" permissions. Validate the [Tanium service account] has "Read Only" permissions. Validate [Tanium Admins group] has Full permissions. If the owner of the directory is not the [Tanium service account] and/or System and the [Tanium service account] has more privileges than "Read Only" and/or the [Tanium Admins group] has less than Full permissions, this is a finding. Navigate to Program Files >> Tanium >> Tanium Server >> Certs. Right-click on each of the following files: Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Installedcacert.crt Installed-server.crt Installed-server.key SOAPServer.crt SOAPServer.key Validate System and the [Tanium service account] have "Read-Only" permissions to each of the individual files, and the [Tanium Admin group] has Full permissions to each of the individual files. If System and the [Tanium service account] have more than "Read-Only" permissions to any of the individual files and/or the [Tanium Admin group] has less than Full permissions to any of the individual files, this is a finding. Navigate to Program Files >> Tanium >> Tanium Server >> content_public_keys. Right-click on each of the following files: Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Validate System has "Read-Only" permissions and is applied to child objects. Validate [Tanium service account] has "Read-Only" permissions and is applied to child objects. Validate [Tanium Admin Group] has Full permissions and is applied to child objects. If the [Tanium service account] and system permissions to the \content_public_keys folder is greater than "Read-Only" and/or the "Read-Only" permissions have not been applied to child objects and/or the [Tanium Admin Group] has less than Full permissions, this is a finding.
Fix: F-37243r610780_fix
Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to >> Program Files >> Tanium >> Tanium Server. Right-click on "Certs" folder. Choose "Properties". Select the "Security" tab. Click on the "Advanced" button. Change the owner of the directory to the [Tanium service account]. Reduce System and the [Tanium service account] to "Read-Only" permissions. Provide the [Tanium Admin group] with Full permissions. Navigate to >> Program Files >> Tanium >> Tanium Server >> Certs. Right-click on each of the following files: Select "Properties". Select the "Security" tab. Click on the "Advanced" button. For the following files, reduce System and the [Tanium service account] to "Read-Only": Installedcacert.crt Installed-server.crt Installed-server.key SOAPServer.crt SOAPServer.key Ensure the [Tanium Admin group] has Full permissions for those same files. Navigate to >> Program Files >> Tanium >> Tanium Server >> content_public_keys. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Reduce System to "Read-Only" permissions. – apply to child objects. Reduce [Tanium service account] to "Read-Only" permissions. – apply to child objects. Provide [Tanium Admin group] with Full permissions - apply to child objects.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- TANS-SV-000023
- Vuln IDs
-
- V-234094
- V-92159
- Rule IDs
-
- SV-234094r612749_rule
- SV-102261
Checks: C-37279r610782_chk
Note: If the server being validated is the Module server, this check is Not Applicable. Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Click "Start". Access the Server Manager. Select Local Server. In upper right corner, click "Tools". Select "Services". If the Tanium Module Server service is "Running", this is a finding.
Fix: F-37244r610783_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Click "Start". Access the Server Manager. Select "Local Server". In the upper right corner, click "Tools". Select "Services". Disable the Tanium Module Server service.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-SV-000024
- Vuln IDs
-
- V-234095
- V-92161
- Rule IDs
-
- SV-234095r612749_rule
- SV-102263
Checks: C-37280r610785_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to Program Files >> Tanium. Right-click on the "Tanium Server" folder. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Validate the owner of the "Tanium Server" folder is the service account [Tanium service account]. Validate the [Tanium service account] has full permissions to the "Tanium Server" folder. Validate the [Tanium Admins] group has full permissions to the "Tanium Server" folder. Validate Users have no permissions to the "Tanium Server" folder. If any accounts other than the [Tanium service account] and the [Tanium Admins] group have any permission to the "Tanium Server" folder, this is a finding. If the [Tanium service account] is not the owner of the "Tanium Server" folder, this is a finding.
Fix: F-37245r610786_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to Program Files >> Tanium. Right-click on the "Tanium Server" folder. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Disable folder inheritance. Change the owner of the directory to the service account [Tanium service account]. Remove User permissions. Give [Tanium service account] full permissions. Give [Tanium Admins] group full permissions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-SV-000025
- Vuln IDs
-
- V-234096
- V-92163
- Rule IDs
-
- SV-234096r612749_rule
- SV-102265
Checks: C-37281r610788_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to Program Files >> Tanium >> Tanium Server. Right-click on the "Tanium Server\http" folder. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate the [Tanium Admins] group has full permissions. Validate System has Read-Only permissions. Right-click on the "Tanium Server\http\libraries" folder. Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate System has Read-Only permissions. Validate the [Tanium service account] has Read-Only permissions. Validate the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\http\taniumjs" folder. Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate System has "Read-Only" permissions. Validate the [Tanium service account] has "Read-Only" permissions. Validate the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\http\tux" folder. Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate System has "Read-Only" permissions. Validate the [Tanium service account] has "Read Only" permissions. Validate the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\http\tux-console" folder. Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate System has "Read-Only" permissions. Validate the [Tanium service account] has "Read-Only" permissions. Validate the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\Logs" folder. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate the [Tanium Service Account] has only "Modify" permissions. Validate the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\TDL_Logs" folder. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate the [Tanium Service Account] has only "Modify" permissions. Validate the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\Certs" folder. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate System has "Read-Only" permissions. Validate the [Tanium Admins] group has full permissions. Navigate to Tanium Server >> Certs. For the following files verify System and [Tanium Service Account] have "Read-Only" permissions: installedcacert.crt installed-server.crt installed-server.key SOAPServer.crt SOAPServer.key Right-click on the "Tanium Server\content_public_keys" folder. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Validate Folder Inheritance is disabled. Validate the owner of the directory is the [Tanium service account]. Validate System has "Read-Only" permissions. Validate the [Tanium Service Account] has "Read-Only" permissions. Validate the [Tanium Admins] group has full permissions. If any of the above permissions are not configured correctly, this is a finding.
Fix: F-37246r610789_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to Program Files >> Tanium >> Tanium Server. Right-click on the "Tanium Server\http folder. Select "Properties". Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Change/verify the [Tanium Admins] group has full permissions. Reduce System to "Read-Only" permissions. Right-click on the "Tanium Server\http\libraries" folder. Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to "Read-Only" permissions. Reduce [Tanium service account] to "Read-Only" permissions. Change/verify the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\http\taniumjs" folder. Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to "Read-Only" permissions. Reduce [Tanium service account] to "Read-Only" permissions. Change/verify the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\http\tux" folder. Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to "Read-Only" permissions. Reduce [Tanium service account] to "Read-Only" permissions. Change/verify the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\http\tux-console" folder. Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to "Read-Only" permissions. Reduce [Tanium service account] to "Read-Only" permissions. Change/verify the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\Logs" folder. Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce [Tanium service account] to "Modify" permissions. Change/verify the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\http\TDL_Logs" folder. Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce [Tanium service account] to "Modify" permissions. Change/verify the [Tanium Admins] group has full permissions. Right-click on the "Tanium Server\Certs" folder. Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to "Read-Only" permissions. Change/verify the [Tanium Admins] group has full permissions. Navigate to Tanium Server >> Certs. For the following files verify/reduce System and [Tanium Service Account] to "Read-Only" permissions: installedcacert.crt installed-server.crt installed-server.key SOAPServer.crt SOAPServer.key Right-click on the "Tanium Server\content_public_keys" folder. Select the "Security" tab. Click on the "Advanced" button. Verify/Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to "Read-Only" permissions - apply to child objects. Reduce [Tanium service account] to "Read-Only" permissions - apply to child objects. Change/verify the [Tanium Admins] group has full permissions.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-SV-000026
- Vuln IDs
-
- V-234097
- V-92165
- Rule IDs
-
- SV-234097r612749_rule
- SV-102267
Checks: C-37282r610791_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Run regedit as Administrator. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Right-click on "Tanium Server". Select "Permissions". Click on the "Security" tab. Click on the "Advanced" button. Validate the [Tanium service account] has full permissions. Validate the [Tanium Admins] group has full permissions. Validate the SYSTEM account has full permissions. Validate the User accounts do not have any permissions. If any other account has full permissions and/or the User account has any permissions, this is a finding.
Fix: F-37247r610792_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Run regedit as Administrator. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Right-click on "Tanium Server". Select "Properties". Click on the "Security" tab. Click on the "Advanced" button. Provide the [Tanium service account] with full permissions. Provide the [Tanium Admins] group with full permissions. Reduce permissions for any other accounts with full permissions. Remove permissions for User accounts.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-SV-000027
- Vuln IDs
-
- V-234098
- V-92167
- Rule IDs
-
- SV-234098r612749_rule
- SV-102269
Checks: C-37283r610794_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to Program Files >> Tanium >> Tanium Server. Right-click on the "Logs" folder. Select "Properties". Click on the "Security" tab. Click on the "Advanced" button. Validate the owner of the directory is the [Tanium service account]. Validate the [Tanium service account] privileges is only account with modify permissions on the directory. Validate the [Tanium Administrators] group has full permissions on the directory. Right-click on the "TDL_Logs" folder. Select "Properties". Click on the "Security" tab. Click on the "Advanced" button. Validate the owner of the directory is the [Tanium service account]. Validate the [Tanium service account] privileges is the only account with modify permissions on the directory. Validate the [Tanium Administrators] group has full permissions on the directory. If any of the specified permissions are not set as required, this is a finding.
Fix: F-37248r610795_fix
Access the Tanium Server interactively. Log on to their server with an account that has administrative privileges. Open an Explorer window. Navigate to Program Files >> Tanium >> Tanium Server. Right-click on the "Logs" folder. Select "Properties". Click on the "Security" tab. Click on the "Advanced" button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce [Tanium service account] privileges to modify permissions on the directory. Ensure [Tanium Admins] group has full permissions on the directory. Right-click on the "TDL_Logs" folder. Select "Properties". Click on the "Security" tab. Click on the "Advanced" button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce [Tanium service account] privileges to modify permissions on the directory. Ensure [Tanium Admins] group has full permissions on the directory.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- TANS-SV-000028
- Vuln IDs
-
- V-234099
- V-92169
- Rule IDs
-
- SV-234099r612749_rule
- SV-102271
Checks: C-37284r610797_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Users" tab. Review each of the users listed and determine their Active Directory synced account. Access one of the domain's Active Directory Domain Controller servers with a Domain Administrator account. Review each of the Users for which a synced account is in the Tanium console as a user. Validate whether any of the users are considered to be non-privileged in Active Directory, yet have privileged capabilities in Tanium. If any of the non-privileged Active Directory accounts have elevated privileges and are synced as a Tanium privileged account, this is a finding.
Fix: F-37249r610798_fix
Access Active Directory with appropriate credentials. For each User, where a synced account is in the Tanium console as a privileged user, adjust the user to an appropriate security group in Active Directory. Verify, after syncing with Tanium, the non-privileged user account is no longer in a privileged role within Tanium.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- TANS-SV-000029
- Vuln IDs
-
- V-234100
- V-92171
- Rule IDs
-
- SV-234100r612749_rule
- SV-102273
Checks: C-37285r610800_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured Tanium Sources listed. If an "Audit Log" source does not exist, this is a finding. Select the "Audit Log" source. Select the audit connection found in the lower half of the screen. Verify the "Destination Type" is a SIEM tool. If the "Destination Type" is not a SIEM tool, this is a finding.
Fix: F-37250r610801_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Click "Create Connection". In the Source and Destination Section, select "Audit Log" as the Event Source from the drop-down menu. In the "Destination" section, select "Socket Receiver" from the drop-down menu. Enter "Destination Name". Enter "Host". Enter "Network Protocol". Enter "Port". Consult documentation located at https://docs.tanium.com/connect/connect/index.html for reference on configuring other applicable SIEM connections.
- RMF Control
- CM-11
- Severity
- M
- CCI
- CCI-001811
- Version
- TANS-SV-000030
- Vuln IDs
-
- V-234101
- V-92173
- Rule IDs
-
- SV-234101r612749_rule
- SV-102275
Checks: C-37286r610803_chk
If the site is using Tanium Integrity Monitor, Tanium Integrity Monitor should be used to monitor the file integrity of Tanium critical files. If Tanium Integrity Monitor is not installed, a third-party file integrity-monitoring tool must be used to monitor Tanium critical executables, defined files within the Tanium Server directory path. If the file integrity of Tanium critical executables is not monitored, this is a finding.
Fix: F-37251r610804_fix
Implement a file integrity monitoring system to monitor the Tanium critical executable files.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-SV-000031
- Vuln IDs
-
- V-234102
- V-92175
- Rule IDs
-
- SV-234102r612749_rule
- SV-102277
Checks: C-37287r610806_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Module Server. Access the host-based firewall configuration on the Tanium Module Server. Validate a rule exists for the following: Port Needed: Tanium Server to Tanium Module Server over TCP port 17477. If a host-based firewall rule does not exist to allow TCP port 17477, from the Tanium Server to the Tanium Module Server, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. If a network firewall rule does not exist to allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server, this is a finding.
Fix: F-37252r610807_fix
Configure host-based firewall rules on the Tanium Module Server to include the following required traffic: Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. Configure the network firewall to allow the above traffic.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-SV-000032
- Vuln IDs
-
- V-234103
- V-92177
- Rule IDs
-
- SV-234103r612749_rule
- SV-102279
Checks: C-37288r610809_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate a rule exists for the following: Port Needed: Tanium Server to Tanium Module Server over TCP port 17477. If a host-based firewall rule does not exist to allow TCP port 17477, from the Tanium Server to the Tanium Module Server, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. If a network firewall rule does not exist to allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server, this is a finding.
Fix: F-37253r610810_fix
Configure host-based firewall rules on the Tanium Server to allow the following required traffic: Allow TCP traffic on port 17477 to the Tanium Module Server from the Tanium Server. Configure the network firewall to allow the above traffic.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-SV-000033
- Vuln IDs
-
- V-234104
- V-92179
- Rule IDs
-
- SV-234104r612749_rule
- SV-102281
Checks: C-37289r610812_chk
Note: If a Zone Server is not being used, this is Not Applicable. Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate a rule exists for the following: Port Needed: Tanium Server to Zone Server over TCP port 17472. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, from Tanium Server to the Tanium Zone Server, this is a finding.
Fix: F-37254r610813_fix
Configure host-based firewall rules on the Tanium Zone server to include the following required traffic: Allow Tanium Server to Zone Server over TCP port 17472. Configure the network firewall to allow the above traffic.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- TANS-SV-000035
- Vuln IDs
-
- V-234105
- V-92181
- Rule IDs
-
- SV-234105r612749_rule
- SV-102283
Checks: C-37290r610815_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: regedit <enter>. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Verify the existence of a DWORD "SSLHonorCipherOrder" with a value of "0x00000001" (hex). If the DWORD "SSLHonorCipherOrder" does not exist with a value of "0x00000001" (hex), this is a finding.
Fix: F-37255r610816_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: regedit <enter>. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Add or modify the DWORD "SSLHonorCipherOrder" to have a value of 0x00000001 (hex).
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- TANS-SV-000036
- Vuln IDs
-
- V-234106
- V-92183
- Rule IDs
-
- SV-234106r612749_rule
- SV-102285
Checks: C-37291r610818_chk
Using a web browser on a system, which has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. When connected, review the Certificate for the Tanium Server: In Internet Explorer, right-click on the page. Select "Properties". Click on the "Certificates" tab. On the "General" tab, validate the Certificate shows as issued by a DOD Root CA. On Certification "Path" tab, validate the path top-level is a DoD Root CA. If the certificate authority is not DoD Root CA, this is a finding.
Fix: F-37256r610819_fix
Request or regenerate the certificate from a DoD Root Certificate Authority.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002422
- Version
- TANS-SV-000037
- Vuln IDs
-
- V-234107
- V-92185
- Rule IDs
-
- SV-234107r612749_rule
- SV-102287
Checks: C-37292r610821_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured Destinations listed. If an "Email" Destination does not exist, this is not a finding. Select "Email" destination. Select each Connection found in the lower half of the screen. Verify "Enable TLS" is "true". If "Enable TLS" is "false", this is a finding.
Fix: F-37257r610822_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Connect". Review the configured Destinations listed. Select "Email" destination. Select the Connection found in the lower half of the screen. Click "Edit" on the top right of the summary page. Under the "Source and Destination" section, select the "Enable TLS" checkbox under the "Mail Configuration". Confirm the rest of the data is correct. Click "Save" at the bottom of the page. Do this for all Connections configured with an "Email" destination.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-SV-000040
- Vuln IDs
-
- V-234108
- V-92187
- Rule IDs
-
- SV-234108r612749_rule
- SV-102289
Checks: C-37293r610824_chk
Consult with the Tanium System Administrator to determine the antivirus software used on the Tanium Server. Review the settings of the antivirus software. Validate exclusions exist which exclude the Tanium program files from being scanned by antivirus on-access scans. If exclusions do not exist, this is a finding.
Fix: F-37258r610825_fix
Implement exclusion policies within the antivirus software solution to prevent on-access scanning of Tanium Server program files.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-SV-000043
- Vuln IDs
-
- V-234109
- V-92189
- Rule IDs
-
- SV-234109r612749_rule
- SV-102291
Checks: C-37294r610827_chk
Consult with the Tanium System Administrator to determine the file-level encryption software used on the Tanium Server. Review the settings for the file-level encryption software. Validate exclusions exist which exclude the Tanium program files from being encrypted by the file-level encryption software. If exclusions do not exist, this is a finding.
Fix: F-37259r610828_fix
Implement excluding policies within the file-level encryption software solution to exclude encryption of the Tanium Server program files.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- TANS-SV-000044
- Vuln IDs
-
- V-234110
- V-92191
- Rule IDs
-
- SV-234110r612749_rule
- SV-102293
Checks: C-37295r610830_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: "regedit". Click "Enter". Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Verify the existence of a String "SSLCipherSuite" with a value of: ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK If the String "SSLCipherSuite" does not exist with the appropriate list values, this is a finding.
Fix: F-37260r610831_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: regedit <enter>. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Add or modify the String "SSLCipherSuite" to have a value of: ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- TANS-SV-000045
- Vuln IDs
-
- V-234111
- V-92193
- Rule IDs
-
- SV-234111r612749_rule
- SV-102295
Checks: C-37296r610833_chk
Using a web browser on a system, which has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box type "max_soap_sessions_total". Click "Enter". If no results are returned, this is a finding. If results are returned for "max_soap_sessions_total", but the value is not the value defined in the system documentation, this is a finding.
Fix: F-37261r610834_fix
Using a web browser on a system, which has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog box enter "max_soap_sessions_total" for "Setting Name:". Work with a Tanium Technical Account Manager (TAM) for a proper value and enter this for the "Setting Value:". Select "Server" from "Affects drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save". Add this setting to the system documentation for validation.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- TANS-SV-000046
- Vuln IDs
-
- V-234112
- V-92195
- Rule IDs
-
- SV-234112r612749_rule
- SV-102297
Checks: C-37297r610836_chk
Using a web browser on a system, which has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box type "max_soap_sessions_per_user". Click "Enter". If no results are returned, this is a finding. If results are returned for "max_soap_sessions_per_user", but the value is not the value defined in the system documentation, this is a finding.
Fix: F-37262r610837_fix
Using a web browser on a system, which has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog box enter "max_soap_sessions_per_user" for "Setting Name:". Work with a Tanium Technical Account Manager (TAM) for a proper value, and enter this for the "Setting Value:". Select "Server" from "Affects" drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save". Add this setting to the system documentation for validation.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- TANS-SV-000047
- Vuln IDs
-
- V-234113
- V-92197
- Rule IDs
-
- SV-234113r612749_rule
- SV-102299
Checks: C-37298r610839_chk
Using a web browser on a system, which has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box type "soap_max_keep_alive". Click "Enter". If no results are returned, this is a finding. If results are returned for "soap_max_keep_alive ", but the value is not the value defined in the system documentation, this is a finding.
Fix: F-37263r610840_fix
Using a web browser on a system, which has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog box enter "soap_max_keep_alive" for "Setting Name:". Work with a Tanium Technical Account Manager (TAM) for a proper value, and enter this for the "Setting Value:". Select "Server" from "Affects" drop-down list. Select "Numeric" from "Value Type" drop-down list. Click "Save". Add this setting to the system documentation for validation.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-SV-000048
- Vuln IDs
-
- V-234114
- V-92199
- Rule IDs
-
- SV-234114r612749_rule
- SV-102301
Checks: C-37299r610842_chk
Consult with the Tanium System Administrator to review the documented list of folder maintainers for Detect Local Directory Source. If the site does not leverage Local Directory Source to import IOCs, this finding is Not Applicable. If the site does use Local Directory Source to import IOCs and the folder maintainers are not documented, this is a finding.
Fix: F-37264r610843_fix
Prepare and maintain documentation identifying the Tanium IOC Local Directory Source maintainers.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-SV-000049
- Vuln IDs
-
- V-234115
- V-92201
- Rule IDs
-
- SV-234115r612749_rule
- SV-102303
Checks: C-37300r610845_chk
Consult with the Tanium System Administrator to determine if the Tanium Detect module is being used, if not then this finding is Not Applicable. If being used then determine where they get their IOC Stream. Access the Tanium Module Server interactively. Log on to the server with an account that has administrative privileges. Open an Explorer window. Navigate to Program Files >> Tanium >> Tanium Module Server >> services >> detect3-files Right-click on the folder and choose "Properties". Select the "Security" tab. Click on the "Advanced" button. If the accounts listed in the "Security" tab do not match the list of accounts found in the Tanium documentation, this is a finding.
Fix: F-37265r610846_fix
Consult with the Tanium System Administrator to determine if the "Detect" module is being used, if not then this is Not Applicable. Access the Tanium Module Server interactively. Log on to their server with an account that has administrative privileges. Open an Explorer window. Navigate to Program Files >> Tanium >> Tanium Module Server >> services >> detect3-files Right-click on the folder and choose "Properties". Select the "Security" tab. Click on the "Advanced" button. If the accounts listed in the "Security" tab do not match the list of accounts, with the exception of SYSTEM, remove the additionally listed accounts. If the accounts listed in the "Security" tab are missing accounts from the documentation, with the exception of SYSTEM, add the additionally listed accounts with a minimum of READ permissions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-SV-000050
- Vuln IDs
-
- V-234116
- V-92203
- Rule IDs
-
- SV-234116r612749_rule
- SV-102305
Checks: C-37301r610848_chk
Consult with the Tanium System Administrator to review the documented list of trusted SCAP sources. If the site does not have "Tanium Comply" module, or does not use "Tanium Comply" for compliance validation, this finding is Not Applicable. If the site does use "Tanium Comply" and the source for SCAP content is not documented, this is a finding.
Fix: F-37266r610849_fix
If the site does not have "Tanium Comply" module, or does not use "Tanium Comply" for compliance validation, this finding is Not Applicable. Prepare and maintain documentation identifying the source of SCAP sources that will be used by "Tanium Comply" module.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-SV-000051
- Vuln IDs
-
- V-234117
- V-92205
- Rule IDs
-
- SV-234117r612749_rule
- SV-102307
Checks: C-37302r610851_chk
Consult with the Tanium System Administrator to review the documented list of trusted OVAL feeds. If the site does not have "Tanium Comply" module, or does not use "Tanium Comply" for passive vulnerability scanning, this finding is Not Applicable. Otherwise, if the site does use "Tanium Comply" and the source for OVAL content is not documented, this is a finding.
Fix: F-37267r610852_fix
If the site does not have "Tanium Comply" module, or does not use "Tanium Comply" for passive vulnerability scanning, this finding is Not Applicable. Prepare and maintain documentation identifying the source of OVAL feeds that will be used by "Tanium Comply" module.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-SV-000052
- Vuln IDs
-
- V-234118
- V-92207
- Rule IDs
-
- SV-234118r612749_rule
- SV-102309
Checks: C-37303r610854_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Comply". Along the left side of the interface, click on "Benchmarks". Select "Configuration Compliance". Verify all imported compliance benchmarks are from a documented trusted source. If any compliance benchmark is found that does not come from a documented trusted source, this is a finding.
Fix: F-37268r610855_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Comply". Along the left side of the interface, click on "Benchmarks". Select "Configuration Compliance". Delete any compliance benchmarks that come from non-trusted sources.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-SV-000053
- Vuln IDs
-
- V-234119
- V-92209
- Rule IDs
-
- SV-234119r612749_rule
- SV-102311
Checks: C-37304r610857_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Comply". Along the left side of the interface, click on "Benchmarks". Select "Vulnerability". Verify all imported vulnerability sources are from a documented trusted source. If any vulnerability sources found do not match a documented trusted source, this is a finding.
Fix: F-37269r610858_fix
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Comply". Along the left side of the interface, click on "Benchmarks". Select "Vulnerability". Delete any vulnerability sources, which are configured to non-trusted sources, or reconfigured to point to trusted sources.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- TANS-SV-000054
- Vuln IDs
-
- V-234120
- V-92211
- Rule IDs
-
- SV-234120r612749_rule
- SV-102313
Checks: C-37305r610860_chk
If the system is not considered mission critical, this is Not Applicable. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Packages". Browse to the package called "Distribute Tanium Standard Utilities". Select it. Press "Status". Observe the text underneath a package file indicating the file cache status. If the cache status represents only one Tanium Server, this is a finding.
Fix: F-37270r610861_fix
If the system is not considered mission critical, this is Not Applicable. Work with the Tanium System Administrator to configure Tanium in a HA Active-Active setup based on the process outlined in the Tanium documentation found at: https://docs.tanium.com/platform_install/platform_install/installing_an_ha_active_active_cluster.html.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- TANS-SV-000055
- Vuln IDs
-
- V-234121
- V-92213
- Rule IDs
-
- SV-234121r612749_rule
- SV-102315
Checks: C-37306r610863_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: regedit <enter>. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Verify the existence of a DWORD "DownloadBytesPerSecondLimit". If the DWORD "DownloadBytesPerSecondLimit" does not exist with a value equal to the value recorded in the system documentation, this is a finding. Consult with your TAM for an appropriate value and record this in the system documentation. If this setting is not documented, this is a finding.
Fix: F-37271r610864_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: regedit <enter>. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Add or modify the DWORD "DownloadBytesPerSecondLimit" to have a value that matches the value recorded in the system documentation.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- TANS-SV-000056
- Vuln IDs
-
- V-234122
- V-92215
- Rule IDs
-
- SV-234122r612749_rule
- SV-102317
Checks: C-37307r610866_chk
Access the Tanium SQL Server interactively. Log on to their server with an account that has administrative privileges. Consult server sizing documentation at https://docs.tanium.com/platform_install/platform_install/reference_host_system_sizing_guidelines.html and the Tanium system administrator to determine the recommended disk space sizing for the size of the Tanium deployment. Launch File Explorer. Check the total disk space allocated to the hard drive allocated for the Tanium SQL databases. Compare the allocated size against the recommended disk space sizing for the size of the Tanium deployment. If the allocated size is less than the recommended disk space, this is a finding.
Fix: F-37272r610867_fix
Work with the Tanium System Administrator and/or database administrator to allocate additional disk space for the volume hosting the Tanium SQL databases.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- TANS-SV-000062
- Vuln IDs
-
- V-234123
- V-92217
- Rule IDs
-
- SV-234123r612749_rule
- SV-102319
Checks: C-37308r610869_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: regedit <enter>. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Verify the existence of a DWORD "DownloadBytesPerSecondLimit" with a value matching what is in the system documentation. If the DWORD "DownloadBytesPerSecondLimit" does not exist with the correct value, this is a finding.
Fix: F-37273r610870_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: regedit <enter>. Navigate to HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Add or modify the DWORD "DownloadBytesPerSecondLimit" to have a value consistent with the value found in the system documentation.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- TANS-SV-000064
- Vuln IDs
-
- V-234124
- V-92219
- Rule IDs
-
- SV-234124r612749_rule
- SV-102321
Checks: C-37309r610872_chk
Consult with the Tanium System Administrator to review the documented time window designated for updates. If a window of time is not defined, or does not specify a reoccurring frequency, this is a finding. Using a web browser on a system that has connectivity to the Tanium application, access the Tanium application web user interface (UI). Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Tanium Solutions". If any module has the text "Upgrade to" a newer (greater) version number compared to the Installed version number in the Tanium Modules section of the page, this is a finding. If the Tanium install is an air gap install, work with the Tanium Technical Account Manager (TAM) to determine if the modules are up to date.
Fix: F-37274r610873_fix
Work with the Tanium System Administrator to define the reoccurring time window designated for updates. Update the system documentation to reflect this window of time. Using a web browser on a system that has connectivity to the Tanium application, access the Tanium application web UI. Log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Tanium Solutions". Select any modules that indicate "Upgrade to" and proceed with importing the modules.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-SV-000065
- Vuln IDs
-
- V-234125
- V-92221
- Rule IDs
-
- SV-234125r612749_rule
- SV-102323
Checks: C-37310r610875_chk
Consult with the Tanium System Administrator to determine the HIPS software used on the Tanium Server. Review the settings of the HIPS software. Validate exclusions exist which exclude the Tanium program files from being restricted by HIPS. If exclusions do not exist, this is a finding.
Fix: F-37275r610876_fix
Implement exclusion policies within the HIPS software solution to exclude the Tanium Server program files from HIPS intervention.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- TANS-SV-000066
- Vuln IDs
-
- V-234126
- V-92223
- Rule IDs
-
- SV-234126r612749_rule
- SV-102325
Checks: C-37311r610878_chk
Using a web browser on a system that has connectivity to the Tanium application, access the Tanium application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box, type "session_expiration_seconds". Click "Enter". If no results are returned, this is a finding. If results are returned for "session_expiration_seconds", but the value is not "900" or less, this is a finding.
Fix: F-37276r610879_fix
Using a web browser on a system that has connectivity to the Tanium application, access the Tanium application web UI and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In the "New System Setting" dialog box, enter "session_expiration_seconds" for "Setting Name:". Enter "900" or less for "Setting Value:". Select "Server" from the "Affects" drop-down list. Select "Numeric" from the "Value Type" drop-down list. Click "Save". If "session_expiration_seconds" exists but is not "900" or less, select the box beside the value and click on "Edit". Enter "900" or less for "Setting Value:". Click "Save".
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- TANS-SV-000067
- Vuln IDs
-
- V-234127
- V-92225
- Rule IDs
-
- SV-234127r612749_rule
- SV-102327
Checks: C-37312r610881_chk
Using a web browser on a system that has connectivity to the Tanium application, access the Tanium application web user interface (UI) and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. In the "Show Settings Containing:" search box, type "max_console_idle_seconds". Click "Enter". If no results are returned, this is a finding. If results are returned for "max_console_idle_seconds", but the value is not "900" or less, this is a finding.
Fix: F-37277r610882_fix
Using a web browser on a system that has connectivity to the Tanium application, access the Tanium application web UI and log on with CAC. Click on the navigation button (hamburger menu) on the top left of the console. Click on "Administration". Select the "Global Settings" tab. Click on "New Setting". In "New System Setting" dialog box, enter "max_console_idle_seconds" for "Setting Name:". Enter "900" for "Setting Value:". Select "Server" from the "Affects" drop-down list. Select "Numeric" from the "Value Type" drop-down list. Click "Save". If "max_console_idle_seconds" exists but is not "900" or less, select the box beside the value and click "Edit". Enter "900" or less for "Setting Value:". Click "Save".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- TANS-SV-000068
- Vuln IDs
-
- V-234128
- V-92227
- Rule IDs
-
- SV-234128r612749_rule
- SV-102329
Checks: C-37313r610884_chk
Verify that to prevent a non-privileged user from affecting the Tanium Server's ability to operate, the control of the service is restricted to the Local Administrators. Log on interactively to the Tanium Server. Open the CMD prompt as admin. Run "sc sdshow "Tanium Server"". If the string does not match "D:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCLCSWLOCRRC;;;AU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)", this is a finding. Run the above on all other Tanium Servers, to include Tanium Servers in an Active-Active pair.
Fix: F-37278r610885_fix
Log on interactively to the Tanium Server. Open the CMD prompt as admin. Run "sc sdset "Tanium Server" D:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCLCSWLOCRRC;;;AU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)". Run the above on all other Tanium Servers, to include Tanium Servers in an Active-Active pair.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- TANS-SV-000069
- Vuln IDs
-
- V-234129
- V-92229
- Rule IDs
-
- SV-234129r612749_rule
- SV-102331
Checks: C-37314r610887_chk
As part of any Tanium install, Tanium has a tuning process that takes into account customer-provided inputs on the size of the deployment as well as characteristics of the network. Obtain from Tanium the document that states the tuning settings for the particular installation. If the organization cannot provide a server-tuning document from the vendor, this is a finding.
Fix: F-37279r610888_fix
Obtain the vendor tuning documentation for the deployment. Include it in the system's documentation as proof of tuning.
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- TANS-SV-000070
- Vuln IDs
-
- V-234130
- V-92231
- Rule IDs
-
- SV-234130r612749_rule
- SV-102333
Checks: C-37315r610890_chk
Access the Tanium Servers (Application, SQL and Module) interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: "regedit". Press "Enter". Navigate to: HKEY_LOCAL_MACHINE >> SYSTEM >> CurrentControlSet >> Control >> SecurityProviders >> SCHANNEL >> Protocols >> SSL 2.0 >> Client for Module server. Navigate to: HKEY_LOCAL_MACHINE >> SYSTEM >> CurrentControlSet >> Control >> SecurityProviders >> SCHANNEL >> Protocols >> SSL 2.0 >> Server for Application server and SQL server. Name: DisabledByDefault Type: REG_DWORD Data: 0x0000001 (hex) If the value for "DisabledByDefault" is not set to "1" and "Type" is not configured to "REG_DWORD" or does not exist, this is a finding. Name: Enabled Type: REG_DWORD Data: 0x00000000 (hex) If the value for "Enabled" is not set to "0" and "Type" is not configured to "REG_DWORD" or does not exist, this is a finding.
Fix: F-37280r610891_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: "regedit". Press "Enter". Navigate to: HKEY_LOCAL_MACHINE >> SYSTEM >> CurrentControlSet >> Control >> SecurityProviders >> SCHANNEL >> Protocols >> SSL 2.0 >> Client. Right-click in the right window pane. Select: New >> DWORD (32-bit) Value. In the "Name" field, enter "DisabledByDefault". Press "Enter". Right-click on the newly created "Name". Select "Modify...". Enter "1" in "Value data:" and ensure that under "Base" the "Hexadecimal" radio button is selected. Click "OK". Right-click in the right window pane. Select: New >> DWORD (32-bit) Value. In the "Name" field, enter "Enabled". Press "Enter". Right-click on the newly created "Name". Select "Modify...". Leave default value of "0" in "Value data:". Ensure that under "Base" the "Hexadecimal" radio button is selected. Click "OK".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- TANS-SV-000101
- Vuln IDs
-
- V-234131
- V-92233
- Rule IDs
-
- SV-234131r612749_rule
- SV-102335
Checks: C-37316r610893_chk
Access the Tanium Server, Tanium Module Server and Tanium SQL Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: "regedit". Press "Enter". Navigate to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Microsoft >> .NETFramework >> v4.0.xxxxx (the sub-version number may vary, but it is a 4.0 version; example: 4.0.30319) for Tanium Application Server. Navigate to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Microsoft >> .NETFramework >> v4.0.xxxxx (the sub-version number may vary, but it is a 4.0 version; example: 4.0.30319) for Tanium SQL Server. Navigate to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Microsoft >> .NETFramework >> v4.0.xxxxx (the sub-version number may vary, but it is a 4.0 version; example: 4.0.30319) for Tanium Module Server. Name: SchUseStrongCrypto Type: REG_DWORD Data: 0x0000001 (hex) If the value for "SchUseStrongCrypto" is not set to "0x00000001" (hex) and "Type" is not configured to "REG_DWORD" or does not exist, this is a finding.
Fix: F-37281r610894_fix
Access the Tanium Server, Tanium SQL Server, and Tanium Module Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: "regedit". Press "Enter". Navigate to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Microsoft >> .NETFramework >> v4.0.xxxxx (the sub-version number may vary, but it is a 4.0 version; example: 4.0.30319) for Tanium Application Server. Navigate to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Microsoft >> .NETFramework >> v4.0.xxxxx (the sub-version number may vary, but it is a 4.0 version; example: 4.0.30319) for Tanium SQL Server. Navigate to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Microsoft >> .NETFramework >> v4.0.xxxxx (the sub-version number may vary, but it is a 4.0 version; example: 4.0.30319) for Tanium Module Server. Right-click in the right window pane. Select: New >> DWORD (32-bit) Value. In the "Name" field, enter "SchUseStrongCrypto". Press "Enter". Right-click on the newly created "Name". Select "Modify...". Enter "1" in "Value data:". Ensure that under "Base" the "Hexadecimal" radio button is selected. Click "OK".
- RMF Control
- SC-8
- Severity
- M
- CCI
- CCI-002418
- Version
- TANS-SV-000107
- Vuln IDs
-
- V-234132
- V-92235
- Rule IDs
-
- SV-234132r612749_rule
- SV-102337
Checks: C-37317r610896_chk
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: "regedit". Press "Enter". Navigate to: HKEY_LOCAL_MACHINE >> SOFTWARE >> Wow6432Node >> Tanium >> Tanium Server. Name: SSLCipherSuite Type: String Value:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSAAES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK If the String "SSLCipherSuite" does not exist with the appropriate list values, this is a finding.
Fix: F-37282r610897_fix
Access the Tanium Server interactively. Log on to the server with an account that has administrative privileges. Access the server's registry by typing: "regedit". Press "Enter". Navigate to: HKEY_LOCAL_MACHINE >> Software >> Wow6432Node >> Tanium >> Tanium Server. Right-click in the right window pane. Select: New >> String Value. In the "Name" field, enter "SSLCipherSuite". Press "Enter". Right-click on the newly created "Name". Select "Modify...". Add the following: ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSAAES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK Click "OK".