Tanium 7.x Application on TanOS Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −3 ✎ 9
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 3
- V-254911 Medium The Tanium application must prohibit password reuse for a minimum of five generations.
- V-254922 Medium The Tanium application must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
- V-254937 Low Access to the Tanium Application Servers must be restricted. Only the designated administrator(s) can have elevated privileges to the Tanium Application Servers.
Content changes 9
- V-254903 Medium checkfix The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server.
- V-254904 Medium descriptioncheckfix The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.
- V-254923 Medium descriptioncheckfix Tanium must notify system administrator (SA) and the information system security officer (ISSO) when accounts are created.
- V-254924 Medium descriptioncheckfix Tanium must notify system administrators (SAs) and the information system security officer (ISSO) when accounts are modified.
- V-254925 Medium descriptioncheckfix Tanium must notify system administrators (SAs) and the information system security officer (ISSO) for account disabling actions.
- V-254926 Medium descriptioncheckfix Tanium must notify system administrators (SAs) and the information system security officer (ISSO) for account removal actions.
- V-254928 Medium descriptioncheckfix The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.
- V-254929 Medium descriptioncheckfix Tanium must notify the system administrator (SA) and information system security officer (ISSO) of account enabling actions.
- V-254938 Medium fix The Tanium application must prohibit user installation of software without explicit privileged status.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- TANS-AP-000005
- Vuln IDs
-
- V-254874
- Rule IDs
-
- SV-254874r960735_rule
Checks: C-58487r867520_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. In the "Filter items " search box, type "max_soap_sessions_total". 5. Click "Enter". If no results are returned, this is a finding. If results are returned for "max_soap_sessions_total", but the value does not follow {(Number of Users) * 1024} formula, this is a finding.
Fix: F-58431r867521_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. Click "Create Setting". 5. Select "Server" for "Setting Type". 6. In the "Create Platform Setting" dialog box, enter "max_soap_sessions_total" for "Name". 7. Select the "Numeric" radio button from "Value Type". 8. Use this formula for determining "Setting Value" {(Number of Users) * 1024 = max_soap_sessions_total} 9. Click "Save". 10. Add this setting to the system documentation for validation.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- TANS-AP-000010
- Vuln IDs
-
- V-254875
- Rule IDs
-
- SV-254875r960735_rule
Checks: C-58488r867523_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and logon with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. In the "Filter items" search box, type "max_soap_sessions_per_user". 5. Click "Enter". If no results are returned, this is a finding. If results are returned for "max_soap_sessions_per_user", but the value is not "1024", this is a finding.
Fix: F-58432r867524_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. Click "Create Setting". 5. Select "Server" for "Setting Type". 6. In the "Create Platform Setting" dialog box, enter "max_soap_sessions_per_user" for "Name". 7. Select the "Numeric" radio button from "Value Type". 8. Enter "1024" for the "Value:". 9. Click "Save". 10. Add this setting to the system documentation for validation.
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- TANS-AP-000020
- Vuln IDs
-
- V-254876
- Rule IDs
-
- SV-254876r960741_rule
Checks: C-58489r867526_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. In the "Filter items" search box type "max_console_idle_seconds". 5. Click "Enter". If no results are returned, this is a finding. If results are returned for "max_console_idle_seconds", but the value is not between the range of "1 - 900", this is a finding.
Fix: F-58433r867527_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. Click "Create Setting". 5. Select "Server" box for "Setting Type". 6. In the "Create Platform Setting" dialog box enter "max_console_idle_seconds" for "Name". 7. Select the "Numeric" radio button from "Value Type". 8. Select "Value" and enter a value between the range of "1 - 900". 9. Click "Save". 10. Add this setting to the system documentation for validation.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- TANS-AP-000040
- Vuln IDs
-
- V-254877
- Rule IDs
-
- SV-254877r960762_rule
Checks: C-58490r867529_chk
1. Using a web browser on a system that has connectivity to the Tanium application, access the Tanium application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Client Status". 4. Change "Show systems that have reported in the last:"; enter "7" in the first field. 5. Select "Days" from the drop-down menu in the second field to determine if any endpoints connected with an invalid key. If any systems are listed with "No" in the "Valid Key" column, this is a finding.
Fix: F-58434r867530_fix
For systems that do not have a valid key for the Tanium Server, redeploy the client software from Tanium using Tanium Client Management or work with the Tanium system administrator to accomplish this. 1. Configure a deployment. 2. Deploy the package or installer. 3. Target appropriate systems.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- TANS-AP-000045
- Vuln IDs
-
- V-254878
- Rule IDs
-
- SV-254878r960762_rule
Checks: C-58491r867532_chk
Note: If only using Tanium-provided content and not accepting content from any other content providers, this is Not Applicable. Consult with the Tanium System Administrator to review the documented list of trusted content providers along with the Hash for their respective public keys. If the site does not have the Tanium trusted content providers documented along with the SHA-256 Hash for their respective public keys, this is a finding.
Fix: F-58435r867533_fix
Prepare and maintain documentation identifying the Tanium trusted content providers along with the SHA-256 Hash from their respective public keys.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- TANS-AP-000050
- Vuln IDs
-
- V-254879
- Rule IDs
-
- SV-254879r960762_rule
Checks: C-58492r867535_chk
Note: If only using Tanium-provided content and not accepting content from any other content providers, this is Not Applicable. Obtain documentation from the Tanium System Administrator that contains the public key validation data. 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "2" for "Tanium Operations Menu," and then press "Enter". 4. Press "5" for "Manage Custom Signing Keys," and then press "Enter". 5. Press "L" for "List Content Signing Keys," and then press "Enter". If signing keys not listed in the provided documentation are present, this is a finding.
Fix: F-58436r867536_fix
Note: If only using Tanium-provided content and not accepting content from any other content providers, this is Not Applicable. Obtain documentation from the Tanium System Administrator that contains the public key validation data. 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "2" for "Tanium Operations Menu," and then press "Enter". 4. Press "5" for "Manage Custom Signing Keys," and then press "Enter". 5. Press "A" for "List Content Signing Keys," and then press "Enter". 6. Check the provided documentation and either update the document with the name and SHA-256 hash of the key or remove the key.
- RMF Control
- AC-17
- Severity
- M
- CCI
- CCI-001453
- Version
- TANS-AP-000055
- Vuln IDs
-
- V-254880
- Rule IDs
-
- SV-254880r960762_rule
Checks: C-58493r867538_chk
Note: If only using Tanium-provided content and not accepting content from any other content providers, this is Not Applicable. Obtain documentation from the Tanium System Administrator that contains the public key validation data. 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "2" for "Tanium Operations Menu," and then press "Enter". 4. Press "5" for "Manage Custom Signing Keys," and then press "Enter". 5. Press "L" for "List Content Signing Keys," and then press "Enter". If signing keys not listed in the provided documentation are present, this is a finding.
Fix: F-58437r867539_fix
Note: If only using Tanium-provided content and not accepting content from any other content providers, this is Not Applicable. Obtain documentation from the Tanium System Administrator that contains the public key validation data. 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "2" for "Tanium Operations Menu," and then press "Enter". 4. Press "5" for "Manage Custom Signing Keys," and then press "Enter". 5. Press "A" for "List Content Signing Keys," and then press "Enter". 6. Check the provided documentation and either update the document with the name and SHA-256 hash of the key or remove the key.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-AP-000065
- Vuln IDs
-
- V-254881
- Rule IDs
-
- SV-254881r960768_rule
Checks: C-58494r867541_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "LDAP/AD Sync Configurations". 4. Ensure LDAP sync is enabled. If LDAP is not enabled, this is a finding.
Fix: F-58438r867542_fix
Vendor documentation can be downloaded from the following URL: https://docs.tanium.com/platform_user/platform_user/console_using_ldap.html?Highlight=LDAP 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "LDAP/AD Sync Configurations". 4. Follow the vendor documentation titled "Integrating with LDAP Servers" to implement correct configuration settings for this requirement.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-AP-000100
- Vuln IDs
-
- V-254882
- Rule IDs
-
- SV-254882r960792_rule
Checks: C-58495r867544_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Select the "Computer Groups" tab. 4. Under the "Name" column, verify organization-specific computer groups match the organization-defined list in the system security plan (SSP). If site- or organization-specific computer groups do not match or exist, this is a finding.
Fix: F-58439r867545_fix
1. Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Select the "Computer Groups" tab. 4. Configure specific Computer Groups to facilitate the management of computers by authorized individuals for those computers. Note: Tanium offers two ways to define computer groups. Refer to documentation for explanation found here: https://docs.tanium.com/platform_user/platform_user/console_computer_groups.html#Computer_Group_types.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-AP-000105
- Vuln IDs
-
- V-254883
- Rule IDs
-
- SV-254883r960792_rule
Checks: C-58496r867547_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users. User Groups, Roles, Computer Groups, and correlated LDAP security groups must be documented for users. If the documentation does not exist, or is missing any Tanium users and their respective User Groups, Roles, Computer Groups, and correlated LDAP security groups documentation, this is a finding.
Fix: F-58440r867548_fix
Prepare and maintain documentation identifying the Tanium console users and their respective User Groups, Roles, Computer Groups, and associated LDAP security groups.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-AP-000110
- Vuln IDs
-
- V-254884
- Rule IDs
-
- SV-254884r960792_rule
Checks: C-58497r867550_chk
Consult with the Tanium System Administrator to review the documented list of Tanium User Groups. 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Permissions, select "User Groups". 4. Click each User Group and compare both the User Group name and the assigned Role(s) to the system documentation. If any users have access to Tanium and their User Group is not on the list of documented User Groups with the appropriate Role(s), this is a finding.
Fix: F-58441r867551_fix
Consult the documentation identifying the Tanium User Groups and their respective Role(s). 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Permissions, select "User Groups". 4. Click each User Group and add any missing Role(s). 5. For any missing User Groups, make the appropriate adjustments in LDAP.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-AP-000115
- Vuln IDs
-
- V-254885
- Rule IDs
-
- SV-254885r960792_rule
Checks: C-58498r867553_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users and their respective, approved Computer Group rights. If the documented list does not have the Tanium users and their respective approved Computer Group rights documented, this is a finding.
Fix: F-58442r867554_fix
Prepare and maintain documentation identifying the Tanium console users and their respective Computer Group rights.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-000213
- Version
- TANS-AP-000120
- Vuln IDs
-
- V-254886
- Rule IDs
-
- SV-254886r960792_rule
Checks: C-58499r867556_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. In the "Filter items" search box type "require_action_approval". 5. Click "Enter". If no results are returned, this is a finding. If results are returned for "require_action_approval", but the value is not "1", this is a finding.
Fix: F-58443r867557_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. If "require_action_approval" does not exist, click "Create Setting". 5. Select "Server" for "Setting Type". 6. In the "Create Platform Setting" dialog box, enter "require_action_approval" for "Name". 7. Select "Numeric" radio button from "Value Type". 8. Select "Value" and enter "1". 9. Click "Save".
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-AP-000130
- Vuln IDs
-
- V-254887
- Rule IDs
-
- SV-254887r960804_rule
Checks: C-58500r867559_chk
Consult with the Tanium System Administrator to determine if the Threat Response module is being used. If not, this is Not Applicable. Review the documented list of IOC trusted stream sources. If the site does use an external source for IOCs and the IOC trusted stream source is not documented, this is a finding.
Fix: F-58444r867560_fix
Prepare and maintain documentation identifying the Threat Response trusted stream sources.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-AP-000135
- Vuln IDs
-
- V-254888
- Rule IDs
-
- SV-254888r960804_rule
Checks: C-58501r867562_chk
Consult with the Tanium System Administrator to determine if the Threat Response module is being used, if not this is Not Applicable. 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Threat Response". 4. Expand the left menu. 5. Click "Intel". 6. Select "Sources". 7. Verify all configured Threat Response Streams are configured to a documented trusted source. If Threat Response is configured to a stream that has not been documented as trusted, this is a finding.
Fix: F-58445r867563_fix
Consult the documentation on trusted intel subscription feeds. 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Threat Response". 4. Expand the left menu. 5. Click "Intel". 6. Select "Sources". 7. Click "New Source". 8. Select the specified Source from the list. 9. Fill out the specified information based on the documented trusted intel feeds. 10. Select "Create".
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-AP-000140
- Vuln IDs
-
- V-254889
- Rule IDs
-
- SV-254889r960804_rule
Checks: C-58502r867565_chk
Consult with the Tanium System Administrator to review the documented list of folder maintainers for Threat Response Local Directory Source. If the site does not leverage Local Directory Source to import IOCs, this finding is Not Applicable. If the site does use Local Directory Source to import IOCs and the folder maintainers are not documented, this is a finding.
Fix: F-58446r867566_fix
Prepare and maintain documentation identifying the Tanium Threat Response Local Directory Source maintainers.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-AP-000145
- Vuln IDs
-
- V-254890
- Rule IDs
-
- SV-254890r960804_rule
Checks: C-58503r867568_chk
Consult with the Tanium System Administrator to determine if the Tanium Threat Response module is being used. If not, this finding is Not Applicable. If the Local Directory Source type is being used, then determine where they get their IOC Stream. 1. Access the Tanium Module Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Open an Explorer window. 4. Navigate to Program Files >> Tanium >> Tanium Module Server >> Services >> Threat-Response-Files. 5. Right-click on the folder and choose "Properties". 6. Select the "Security" tab. 7. Click "Advanced". If the accounts listed in the Security tab do not match the list of accounts found in the Tanium documentation, this is a finding.
Fix: F-58447r867569_fix
1. Access the Tanium Module Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Open an Explorer window. 4. Navigate to Program Files >> Tanium >> Tanium Module Server >> Services >> Threat-Response-Files. 5. Right-click on the folder and choose "Properties". 6. Select the "Security" tab. 7. Click "Advanced". If the accounts listed in the Security tab do not match the list of accounts, with the exception of SYSTEM, remove the additionally listed accounts. If the accounts listed in the "Security" tab are missing accounts from the documentation, with the exception of SYSTEM, add the additionally listed accounts with a minimum of READ permissions.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-AP-000150
- Vuln IDs
-
- V-254891
- Rule IDs
-
- SV-254891r960804_rule
Checks: C-58504r867571_chk
Consult with the Tanium System Administrator to review the documented list of trusted SCAP sources. If the site does not have the "Tanium Comply" module, or does not use Tanium Comply for compliance validation, this finding is Not Applicable. If the site does use Tanium Comply and the source for SCAP content is not documented, this is a finding.
Fix: F-58448r867572_fix
If the site does not have the Tanium Comply module, or does not use Tanium Comply for compliance validation, this finding is Not Applicable. Prepare and maintain documentation identifying the source of SCAP sources that will be used by the Tanium Comply module.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-AP-000155
- Vuln IDs
-
- V-254892
- Rule IDs
-
- SV-254892r960804_rule
Checks: C-58505r867574_chk
Consult with the Tanium System Administrator to review the documented list of trusted OVAL feeds. If the site does not have Tanium Comply module, or does not use Tanium Comply for passive vulnerability scanning, this finding is Not Applicable. Otherwise, if the site does use Tanium Comply and the source for OVAL content is not documented, this is a finding.
Fix: F-58449r867575_fix
If the site does not have Tanium Comply module, or does not use Tanium Comply for passive vulnerability scanning, this finding is Not Applicable. Prepare and maintain documentation identifying the source of OVAL feeds that will be used by Tanium Comply module.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-AP-000160
- Vuln IDs
-
- V-254893
- Rule IDs
-
- SV-254893r960804_rule
Checks: C-58506r867577_chk
1. Using a web browser on a system, that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top banner of the console. 3. Click "Comply". 4. Click the menu on the left side of the interface and then click "Compliance" under "Standards". Verify all imported compliance benchmarks are from a documented trusted source. If any compliance benchmark is found that does not come from a documented trusted source, this is a finding.
Fix: F-58450r867578_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top banner of the console. 3. Click "Comply". 4. Click the menu on the left side of the interface and then click "Compliance" under "Standards". 5. Delete any compliance benchmarks that come from nontrusted sources.
- RMF Control
- AC-4
- Severity
- M
- CCI
- CCI-001414
- Version
- TANS-AP-000165
- Vuln IDs
-
- V-254894
- Rule IDs
-
- SV-254894r960804_rule
Checks: C-58507r867580_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Comply". 4. Expand the left menu. 5. Under "Standards," click "Vulnerability". 6. Verify all imported vulnerability sources are from a documented trusted source. If any vulnerability sources are found that do not come from a documented trusted source, this is a finding.
Fix: F-58451r867581_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Comply". 4. Expand the left menu. 5. Under "Standards," click "Vulnerability". 6. Delete any vulnerability sources configured to nontrusted sources, or reconfigure to point to trusted sources.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- TANS-AP-000175
- Vuln IDs
-
- V-254895
- Rule IDs
-
- SV-254895r960843_rule
Checks: C-58508r867583_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Verify DOD use notification displayed prior to login. "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If a DOD-approved use notification banner does not display prior to logon, this is a finding.
Fix: F-58452r867584_fix
1. Create an .html file composed of the DOD-authorized warning banner verbiage. "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." 2. Name the file "warning_banner.html". 3. Use SFTP to upload the HTML banner file to the /incoming folder. 4. Access the Tanium Server interactively. 5. Log on to the TanOS server with the tanadmin user role. 6. Enter 2: Tanium Operations >> X: Advanced Operations >> 4: Manage HTML Banner and follow the prompts to copy the HTML banner file to the appropriate location. 7. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 8. Click "Administration" on the top navigation banner. 9. Under Configuration, select "Platform Settings. 10. Click "Create Setting". 11. Select "Server" box from "Setting Type". 12. In " Create Platform Setting" dialog box, enter "console_PreLoginBannerHTML" for "Name". 13. Select "Text" radio button from "Value Type". 14. Enter "warning_banner.html" for "Value:". 15. Click "Save".
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000050
- Version
- TANS-AP-000180
- Vuln IDs
-
- V-254896
- Rule IDs
-
- SV-254896r960846_rule
Checks: C-58509r867586_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Verify DOD use notification displayed prior to login. "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details. If a DOD-approved use notification banner does not display prior to logon, this is a finding.
Fix: F-58453r867587_fix
1. Create an .html file composed of the DOD-authorized warning banner verbiage. "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. At any time, the USG may inspect and seize data stored on this IS. Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." 2. Name the file "warning_banner.html". 3. Use SFTP to upload the HTML banner file to the /incoming folder. 4. Access the Tanium Server interactively. 5. Log on to the TanOS server with the tanadmin user role. 6. Enter 2: Tanium Operations >> X: Advanced Operations >> 4: Manage HTML Banner and follow the prompts to copy the HTML banner file to the appropriate location. 7. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 8. Click "Administration" on the top navigation banner. 9. Under Configuration, select "Platform Settings. 10. Click "Create Setting". 11. Select "Server" from "Setting Type". 12. In " Create Platform Setting" dialog box, enter "console_PreLoginBannerHTML" for "Name". 13. Select "Text" radio button from "Value Type". 14. Enter "warning_banner.html" for "Value:". 15. Click "Save".
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000056
- Version
- TANS-AP-000195
- Vuln IDs
-
- V-254897
- Rule IDs
-
- SV-254897r986516_rule
Checks: C-58510r986514_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS console with the "tanadmin" user role. 3. Enter "2" to access the "Tanium Operations" menu. 4. Enter "2" to access the "Tanium Configuration" Settings menu. 5. Enter "1" to access the "Edit Tanium Server Settings" menu. 6. Validate the value for "ForceSOAPSSLClientCert" is set to "1". 7. Validate the following keys exist and are configured: 7A. "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name. 7B. "ClientCertificateAuthRegex" For example: .*:\s(\d+)@.* Note: This regex may vary. 7C. "ClientCertificateAuth" For example: /opt/Tanium/TaniumServer/cac.pem 7D. "TrustedHostList" For example: Append 127.0.0.1 (for IPv4) and [::1] (for IPv6) If the value for "ForceSOAPSSLClientCert" is not set to "1" and the remaining registry values are not configured, this is a finding.
Fix: F-58454r986515_fix
Use the vendor documentation titled "Multi-Factor Authentication" to implement correct configuration settings for this requirement. Vendor documentation can be downloaded from the following URL: https://docs.tanium.com/platform_deployment_reference/platform_deployment_reference/smart_card_authentication.html#cac_Tanium_Appliance 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin user role. 3. Enter "2" to access the "Tanium Operations" menu. 4. Enter "2" to access the "Tanium Configuration" Settings menu. 5. Enter "1" to access the "Edit Tanium Server Settings" menu. 6. Validate the value for "ForceSOAPSSLClientCert" is set to "1". 7. Validate the following keys exist and are configured: 7A. "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name. 7B. "ClientCertificateAuthRegex" For example: .*:\s(\d+)@.* Note: This regex may vary. 7C. "ClientCertificateAuth" For example: /opt/Tanium/TaniumServer/cac.pem Note: The path name is case sensitive. 7D. "TrustedHostList" For example: Append 127.0.0.1 (for IPv4) and [::1] (for IPv6).
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- TANS-AP-000260
- Vuln IDs
-
- V-254898
- Rule IDs
-
- SV-254898r960912_rule
Checks: C-58511r867592_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Review the configured Connections under "Connections" section. Work with the SIEM administrator to determine if an alert is configured when audit data is no longer received as expected. If there is no alert configured, this is a finding.
Fix: F-58455r867593_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Expand the left menu. 5. Click "Connections". 6. Configure a Connection for the "Tanium Audit Source" source from the Tanium Application to a SIEM tool. Work with the SIEM administrator to configure an alert when no audit data is received from Tanium based on the defined schedule of connections.
- RMF Control
- AU-6
- Severity
- M
- CCI
- CCI-000154
- Version
- TANS-AP-000270
- Vuln IDs
-
- V-254899
- Rule IDs
-
- SV-254899r960918_rule
Checks: C-58512r870360_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Review the configured Connections under the "Connections" section. If no Connection exists to send the "Tanium Audit Source" to a SIEM tool, this is a finding.
Fix: F-58456r867596_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Click "Create Connection". 5. In the "Configuration" section under "Source," select "Tanium Audit Source" as the source from the drop-down menu. 6. In the "Configuration" section under "Destination," select the desired Destination and fill in the respective fields. 7. In the "Configure Output" section under "Format," select the desired file format type. 8. In the "Schedule" section, select the desired schedule. 9. Click "Create Connection".
- RMF Control
- AU-7
- Severity
- M
- CCI
- CCI-000158
- Version
- TANS-AP-000280
- Vuln IDs
-
- V-254900
- Rule IDs
-
- SV-254900r960924_rule
Checks: C-58513r867598_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Expand the left menu. 5. Click "Connections". 5. Review the configured Connections. If there are no configured connections, this is a finding.
Fix: F-58457r867599_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Expand the left menu. 5. Click "Connections". 6. Click "Create Connection" or if importing, click "Import". 7. Give the "Connection" a name and description. 8. In the "Configuration" section, select "Event" as the source. 9. Select appropriate source under "Event Group". Any source to generate interest-based events (Discover, Asset, IM, THR, etc.). 10. Select the appropriate events to send. Note: Consult with the Tanium System Administrator for the Destination. 11. Select "Listen for this Event". 12. Click "Save".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000163
- Version
- TANS-AP-000295
- Vuln IDs
-
- V-254901
- Rule IDs
-
- SV-254901r960933_rule
Checks: C-58514r870361_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Actions, select "Scheduled Actions". 4. Look for a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory". If a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory" does not exist, or there is a Scheduled Action contradicting the "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory" scheduled action, this is a finding. If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding.
Fix: F-58458r867602_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Ask the question "Get Tanium Client Directory Permissions from all machines". Tanium will parse the script and return a row for "Restricted" and a row for "Not Restricted", with their respective client counts. 3. Click the "Not Restricted" row. 4. Select "Deploy Action". In the "Deploy Action" dialog box, the package "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory" will be selected. The clients, which have their Tanium Client directory "Not Restricted" will be displayed in the bottom window. 5. Choose a schedule to deploy the hardening. 6. Under "Targeting Criteria," in the Action Group, select "All Computers" from the drop-down. 7. Click "Deploy Action". 8. Verify settings. 9. Click "Show Client Status Details".
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001493
- Version
- TANS-AP-000305
- Vuln IDs
-
- V-254902
- Rule IDs
-
- SV-254902r960939_rule
Checks: C-58515r867604_chk
1. Consult with the Tanium System Administrator to review the documented list of Tanium users. 2. Review the users' respective approved roles, as well as the correlated LDAP security group for the User Roles. 3. Validate LDAP security groups/Tanium roles are documented to assign least privileged access to the functions of the Tanium Server through the Tanium interface. If the documentation does not reflect a granular, least privileged access approach to the LDAP Groups/Tanium Roles assignment, this is a finding.
Fix: F-58459r867605_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Permissions, select "Users". 4. Analyze the users configured in the Tanium interface. 5. Determine least privileged access required for each user to perform their respective duties. 6. Move users to the appropriate LDAP security group to ensure the user is synced to the appropriate Tanium User Role. 7. If the appropriate LDAP security groups are not already configured, create the groups and add the appropriate users. 8. Ensure LDAP sync repopulates the Tanium Users' associated Roles accordingly.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- TANS-AP-000330
- Vuln IDs
-
- V-254903
- Rule IDs
-
- SV-254903r986519_rule
Checks: C-58516r986517_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. In the "Filter Items" search box type "AllQuestionsRequireSignatureFlag". 5. Click "Enter". If no results are returned, this is a finding. If results are returned for "AllQuestionsRequireSignatureFlag" but the value is not "1", this is a finding.
Fix: F-58460r986518_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web UI and log on with multifactor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. Click "Create Setting". 5. Select "Client" box for "Setting Type." 6. In "Create Platform Setting" dialog box, enter "AllQuestionsRequireSignatureFlag" for "Name". 7. Select "Numeric" radio button for "Value Type". 8. Enter "1" for "Value". 9. Click "Save".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- TANS-AP-000335
- Vuln IDs
-
- V-254904
- Rule IDs
-
- SV-254904r997043_rule
Checks: C-58517r986520_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. In the "Filter Items" search box, enter "sign_all_questions_flag". 5. Click "Enter". If no results are returned, this is a finding. If results are returned for "sign_all_questions_flag" but the value is not "1", this is a finding.
Fix: F-58461r986521_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface UI and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. Click "Create Setting". 5. Select "Server" for "Setting Type." 6. In "Create Platform Setting" dialog box, enter "sign_all_questions_flag" for "Name". 7. Select "Numeric" radio button for "Value Type". 8. Enter "1" for "Value". 9. Click "Save".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- TANS-AP-000355
- Vuln IDs
-
- V-254905
- Rule IDs
-
- SV-254905r960966_rule
Checks: C-58518r867613_chk
Note: This check is performed for the Tanium Endpoints and must be validated against the enterprise firewall solution (e.g., Endpoint Security Solution Firewall, Microsoft Windows Defender Firewall setting, Microsoft Advance Threat Protection Firewall, etc.) policies applied to the Endpoints. 1. Consult with the personnel who maintain the Enterprise Security Suite configuration for assistance. 2. Validate a rule exists within the firewall policies for managed clients for the following: 2A. Port Needed: Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, this is a finding. 3. Consult with the boundary network firewall administrator and validate rules exist for the following: 3A. Allow TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network. If a network firewall rule does not exist to allow TCP port 17472 from any managed computer to any other managed computer on the same local area network, this is a finding.
Fix: F-58462r867614_fix
1. Consult with the personnel who maintain the Enterprise Security Suite to configure host-based and network firewall rules to allow the following: 1A. Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. 2. Consult with the boundary network firewall administrator to create a rule to allow the following: 2A. TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- TANS-AP-000360
- Vuln IDs
-
- V-254906
- Rule IDs
-
- SV-254906r960966_rule
Checks: C-58519r867616_chk
Note: This check is performed for the Tanium Endpoints and must be validated against the enterprise firewall solution (e.g., Endpoint Security Solution Firewall, Microsoft Windows Defender Firewall setting, Microsoft Advance Threat Protection Firewall, etc.) policies applied to the Endpoints. 1. Consult with the personnel who maintain the Enterprise Security Suite configuration for assistance. 2. Validate a rule exists within the firewall policies for managed clients for the following: 2A. Port Needed: Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, this is a finding. 3. Consult with the boundary network firewall administrator and validate rules exist for the following: 3A. Allow TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network. If a network firewall rule does not exist to allow TCP port 17472 from any managed computer to any other managed computer on the same local area network, this is a finding.
Fix: F-58463r867617_fix
1. Consult with the personnel who maintain the Enterprise Security Suite to configure host-based and network firewall rules to allow the following: 1A. Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. 2. Consult with the boundary network firewall administrator to create a rule to allow the following: 2A. TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- TANS-AP-000365
- Vuln IDs
-
- V-254907
- Rule IDs
-
- SV-254907r960966_rule
Checks: C-58520r867619_chk
Note: If a Zone Server is not being used, this is Not Applicable. 1. Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Zone Server. 2. Access the host-based firewall configuration on the Tanium Zone Server. 3. Validate a rule exists for the following: 3A. Port Needed: Tanium Clients to Zone Server over TCP port 17472, bi-directionally. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, from Tanium Clients to the Tanium Zone Server, this is a finding.
Fix: F-58464r867620_fix
1. Consult with the personnel who maintain the Enterprise Security Suite to configure host-based and network firewall rules to allow the following: 1A. Tanium Clients or Zone Clients over TCP port 17472, bi-directionally.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000382
- Version
- TANS-AP-000370
- Vuln IDs
-
- V-254908
- Rule IDs
-
- SV-254908r960966_rule
Checks: C-58521r867622_chk
Review the PPSM CAL to ensure Tanium has been registered with all of the TCP ports required for functionality to include (but not limited to) TCP 17472, 17477, 17440, 17441, 443, and 1433. If any TCP ports are being used on the Tanium Server that have been deemed as restricted by the PPSM CAL, this is a finding.
Fix: F-58465r867623_fix
Submit a formal request to have the Tanium communication ports evaluated and added to the PPSM CAL.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-000778
- Version
- TANS-AP-000415
- Vuln IDs
-
- V-254909
- Rule IDs
-
- SV-254909r960999_rule
Checks: C-58522r867625_chk
The Tanium endpoint makes a connection to the Tanium Server; the endpoint's copy of the Tanium Server's public key is used to verify the validity of the registration day coming from the Tanium Server. If any endpoint systems do not have the correct Tanium Server public key in its configuration, they will not perform any instructions from the Tanium Server and a record of those endpoints will be listed in the Tanium Server's System Status. To validate: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3 . Select the "Client Status" tab. 4. Click "Administration". 5. Change "Show systems that have reported in the last:", enter "7" in the first field. 6. Select "Days" from the drop-down menu in the second field to determine if any endpoints connected with an invalid key. If any systems are listed with "No" in the "Valid Key" column, this is a finding.
Fix: F-58466r867626_fix
For systems which do not have a valid key for the Tanium Server, redeploy the client software using the Tanium Client Management (TCM) or work with the Tanium System Administrator to accomplish this. Documentation on TCM: https://docs.tanium.com/client/client/index.html.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- TANS-AP-000425
- Vuln IDs
-
- V-254910
- Rule IDs
-
- SV-254910r986523_rule
Checks: C-58523r867628_chk
Console Users: Per guidance, Enterprise Console users are inherited via LDAP synchronization, as such passwords are not managed or enforced at the Tanium application level. Local TanOS account: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu," and then press "Enter". 4. Press "L" for "Local Tanium User Management," and then press "Enter". 5. Press "B" for "Security Policy Local Authentication Service," and then press "Enter". If the value of "Password Minimum Length:" is less than "15", this is a finding.
Fix: F-58467r867629_fix
Console Users: Per guidance, Enterprise Console users are inherited via LDAP synchronization, as such passwords are not managed or enforced at the Tanium application level. Local TanOS account: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu," and then press "Enter". 4. Press "L" for "Local Tanium User Management," and then press "Enter". 5. Press "B" for "Security Policy Local Authentication Service," and then press "Enter". 6. Type "yes," and then press "Enter". 7. Input the following settings, pressing "Enter" after every value: a) Minimum Password Lifetime - 1 b) Maximum Password Lifetime - 60 c) Minimum Password Length - 15 d) Minimum Password History - 5 e) Password Lockout - TRUE f) Maximum Password Attempts - 3 8. Type "yes" to accept the new password policy.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- TANS-AP-000470
- Vuln IDs
-
- V-254912
- Rule IDs
-
- SV-254912r986524_rule
Checks: C-58525r867634_chk
Console Users: Per guidance, Enterprise Console users are inherited via LDAP synchronization as such passwords are not managed or enforced at the Tanium application level. Local TanOS account: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu," and then press "Enter". 4. Press "L" for " Local Tanium User Management," and then press "Enter". 5. Press "B" for " Security Policy Local Authentication Service," and then press "Enter". If the value of "Password Minimum Age (days):" is greater than "1", this is a finding.
Fix: F-58469r867635_fix
Console Users: Per guidance, Enterprise Console users are inherited via LDAP synchronization as such passwords are not managed or enforced at the Tanium application level. Local TanOS account: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu," and then press "Enter". 4. Press "L" for "Local Tanium User Management," and then press "Enter". 5. Press "B" for "Security Policy Local Authentication Service," and then press "Enter". 6. Type "yes" and press "Enter". 7. Input the following settings, pressing "Enter" after every value: a) Minimum Password Lifetime - 1 b) Maximum Password Lifetime - 60 c) Minimum Password Length - 15 d) Minimum Password History - 5 e) Password Lockout - TRUE f) Maximum Password Attempts - 3 8. Type "yes" to accept the new password policy.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- TANS-AP-000475
- Vuln IDs
-
- V-254913
- Rule IDs
-
- SV-254913r986525_rule
Checks: C-58526r867637_chk
Console Users: Per guidance, Enterprise Console users are inherited via LDAP synchronization as such passwords are not managed or enforced at the Tanium application level. Local TanOS account: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Enter "C" for "User Administration Menu," and then press "Enter". 4. Enter "L" for " Local Tanium User Management," and then press "Enter". 5. Enter "B" for " Security Policy Local Authentication Service," and then press "Enter". If the value of "Password Maximum Age (days):" is greater than "60", this is a finding.
Fix: F-58470r867638_fix
Console Users: Per guidance, Enterprise Console users are inherited via LDAP synchronization as such passwords are not managed or enforced at the Tanium application level. Local TanOS account: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Enter "" for "User Administration Menu," and then press "Enter". 4. Enter "L" for "Local Tanium User Management," and then press "Enter". 5. Enter "B" for "Security Policy Local Authentication Service," and then press "Enter". 6. Type "yes," and then press "Enter". 7. Input the following settings, pressing "Enter" after every value: a) Minimum Password Lifetime - 1 b) Maximum Password Lifetime - 60 c) Minimum Password Length - 15 d) Minimum Password History - 5 e) Password Lockout - TRUE f) Maximum Password Attempts - 3 8. Type "yes" to accept the new password policy.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- TANS-AP-000480
- Vuln IDs
-
- V-254914
- Rule IDs
-
- SV-254914r961038_rule
Checks: C-58527r867640_chk
From Browser: 1. Navigate to the Tanium Console URI and log in using multi-factor authentication. 2. Click the lock to the left of the URI in the address bar. 3. Select the lock on the left of the URI in the address bar: a) Chrome: Select "Certificate". b) Edge: Select "Connection is Secure," and then select the certificate icon on the right. 4. Select the "Details" tab. 5. Scroll down through the details to find and select the "Enhanced Key Usage" field. If there is no "Enhanced Key Usage" field, this is a finding. In the bottom screen, verify "Server Authentication" and "Client Authentication" are both identified. If "Server Authentication" and "Client Authentication" are not both identified, this is a finding. From Server: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "2" for "Tanium Operations Menu," and then press "Enter". 4. Press "7" for "Download SOAP Certificate," and then press "Enter". 5. In a browser with access to the Tanium Server Console, navigate to https://<tanium server>/pub/SOAPServer.crt. 6. Download the SOAPServer.crt file when prompted. 7. Double-click on the file to open the certificate. 8. Select the "Details" tab. 9. Scroll down through the details to find and select the "Enhanced Key Usage" field. If there is no "Enhanced Key Usage" field, this is a finding. In the bottom screen, verify "Server Authentication" and "Client Authentication" are both identified. If "Server Authentication" and "Client Authentication" are not both identified, this is a finding.
Fix: F-58471r867641_fix
Request or regenerate the certificate being used to include both the "Server Authentication" and "Client Authentication" objects.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000187
- Version
- TANS-AP-000490
- Vuln IDs
-
- V-254915
- Rule IDs
-
- SV-254915r961044_rule
Checks: C-58528r867643_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "LDAP/AD Sync Configurations". 4. Verify a sync exists under "Enabled Servers". If no sync exists, this is a finding. If sync exists under "Disabled Servers" and there are no Enabled Servers, this is a finding."
Fix: F-58472r867644_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "LDAP/AD Sync Configurations". 4. Verify a sync exists under "Enabled Servers". 5. If no sync exists, click "Add Server". 6. Fill in the correct information for connecting to the organizations LDAP server. Work with a systems administrator to get this information if necessary. 7. Click "Save". 8. If a sync exists and it is disabled, click the edit icon. 9. Change the status to "enabled". 10. Click "Save".
- RMF Control
- IA-8
- Severity
- M
- CCI
- CCI-000804
- Version
- TANS-AP-000505
- Vuln IDs
-
- V-254916
- Rule IDs
-
- SV-254916r961053_rule
Checks: C-58529r867646_chk
Local users can be identified by the following: 1. Using a web browser on a system, which has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Permissions," select "Users". 4. Compare users listed to the prepared documentation. If documentation identifying the Tanium console users and their respective User Groups, Roles, Computer Groups, and associated LDAP security groups does not exist this is a finding.
Fix: F-58473r867647_fix
Prepare and maintain documentation identifying the Tanium console users and their respective User Groups, Roles, Computer Groups, and associated LDAP security groups.
- RMF Control
- SC-2
- Severity
- M
- CCI
- CCI-001082
- Version
- TANS-AP-000555
- Vuln IDs
-
- V-254917
- Rule IDs
-
- SV-254917r961095_rule
Checks: C-58530r867649_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users. The users' User Groups, Roles, Computer Groups, and correlated LDAP security groups or Local Users must be documented. Local users can be identified by the following: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Permissions," select "Users". 4. Compare users that do not have a Domain listed to the prepared documentation. If documentation identifying the Tanium console users and their respective User Groups, Roles, Computer Groups, and associated LDAP security groups does not exist this is a finding.
Fix: F-58474r867650_fix
Prepare and maintain documentation identifying the Tanium console users and their respective User Groups, Roles, Computer Groups, and associated LDAP security groups.
- RMF Control
- SC-24
- Severity
- M
- CCI
- CCI-001665
- Version
- TANS-AP-000600
- Vuln IDs
-
- V-254918
- Rule IDs
-
- SV-254918r961125_rule
Checks: C-58531r867652_chk
Tanium Server: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Common". 4. Select "Log Level". 5. In "Log Verbosity Level for Troubleshooting," verify current level for "Tanium Server" is set. If the value for current level for "Tanium Server" is not set to "1" or higher this is a finding. Tanium Client: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Interact". 4. In the "Explore Data" box, type the following question: 4A. Get Tanium Client Explicit Setting[LogVerbosityLevel] < 1 and Is Windows from all machines with Tanium Client Explicit Setting[LogVerbosityLevel] < 1 Note: For VDI systems, follow vendor guidance: https://docs.tanium.com/client/client/os_imaging.html#VDI If there are any answers returned that are "0" this is a finding.
Fix: F-58475r867653_fix
Tanium Server: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Common". 4. Select "Log Level". 5. In "Log Verbosity Level for Troubleshooting," verify current level for "Tanium Server" is set. Tanium Client: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Interact". 4. In the "Explore Data" box, type the following question: 4A. Get Tanium Client Explicit Setting[LogVerbosityLevel] < 1 and Is Windows from all machines with Tanium Client Explicit Setting[LogVerbosityLevel] < 1 5. Select the row with "Is windows" set to "True" and deploy the following action and settings: a) Deployment Package: Modify Tanium Client Setting b) RegType: REG_DWORD c) ValueName: LogVerbosityLevel d) ValueData: 1 or higher Schedule Deployment a) Distribute over: 1 hour 6. Click "Show Preview to continue". 7. Click "Deploy Action". 8. Select the row with "Is windows" set to "False" and deploy the following action and settings: a) Deployment Package: Modify Tanium Client Setting [Non-Windows] b) RegType: NUMERIC c) ValueName: LogVerbosityLevel d) ValueData: 1 or higher Schedule Deployment a) Distribute over: 1 hour 9. Click "Show Preview to continue". 10. Click "Deploy Action".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001094
- Version
- TANS-AP-000630
- Vuln IDs
-
- V-254919
- Rule IDs
-
- SV-254919r961152_rule
Checks: C-58532r867655_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. In the "Filter items" search box, type "require_action_approval". 5. Click "Enter". If no results are returned, this is a finding. If results are returned for "require_action_approval", but the value is not "1", this is a finding.
Fix: F-58476r867656_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. Click "Create Setting". 5. Select "Server" for "Setting Type". 5. In "Create Platform Setting" dialog box, enter "require_action_approval" does not exist: Flag" for " Name". 6. Select the "Numeric" radio button for "Value Type". 7. Enter "1" for "Value". 8. Click "Save".
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- TANS-AP-000635
- Vuln IDs
-
- V-254920
- Rule IDs
-
- SV-254920r961155_rule
Checks: C-58533r867658_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Bandwidth Throttles". 4. Work with the Tanium Administrator to confirm settings. 5. If bandwidth throttles are not configured, this is a finding. For more information, see the following: https://docs.tanium.com/platform_user/platform_user/console_bandwidth_throttling.html.
Fix: F-58477r867659_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Bandwidth Throttles". 4. Click "Add" on the line for "Global Throttle for All Data". 5. Work with Tanium Administrator to configure the required bandwidth throttles. 6. Click "Save". 7. Work with the Tanium Administrator to confirm or set settings for the remaining options: 7A. Global Throttle for Package Files. 7B. Global Throttle for Sensors. 7C. Site Throttles.
- RMF Control
- SI-11
- Severity
- M
- CCI
- CCI-001314
- Version
- TANS-AP-000655
- Vuln IDs
-
- V-254921
- Rule IDs
-
- SV-254921r961170_rule
Checks: C-58534r867661_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Enter "C" for "User Administration Menu," and then press "Enter". 4. Enter "U" for "TanOS User Management," and then press "Enter". If there are any users other than the documented approved TanOS users this is a finding.
Fix: F-58478r867662_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role, or any additional user with administrative privileges. 3. Enter "C" for "User Administration Menu," and then press "Enter". 4. Enter "U" for "TanOS User Management," and then press "Enter". 5. Work with Tanium System Administrator to either document approved accounts or remove nonapproved accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-AP-000700
- Vuln IDs
-
- V-254923
- Rule IDs
-
- SV-254923r986528_rule
Checks: C-58536r986526_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Review the configured connections. If no sources exist to send audit logs from Tanium to a SIEM tool or email destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when accounts are created. If there is no alert configured, this is a finding.
Fix: F-58480r986527_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web UI and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Click "Create Connection" in the "Connections" section. 5. Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or email destination. 6. Work with email administrator to configure email destination. 7. Work with the SIEM administrator to configure an alert when accounts are created.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-AP-000705
- Vuln IDs
-
- V-254924
- Rule IDs
-
- SV-254924r986531_rule
Checks: C-58537r986529_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Review the configured connections. If no sources exist to send audit logs from the Tanium Database to a SIEM tool or email destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when accounts are modified. If there is no alert configured, this is a finding.
Fix: F-58481r986530_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web UI and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Click "Create Connection" in the "Connections" section. 5. Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or email destination. 6. Work with email administrator to configure email destination. 7. Work with the SIEM administrator to configure an alert when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-AP-000710
- Vuln IDs
-
- V-254925
- Rule IDs
-
- SV-254925r986534_rule
Checks: C-58538r986532_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Review the configured connections. If no sources exist to send audit logs from the Tanium SQL Server to a SIEM tool or email destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when accounts are disabled. If there is no alert configured, this is a finding.
Fix: F-58482r986533_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web UI and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Click "Create Connection" in the "Connections" section. 5. Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or email destination. 6. Work with email administrator to configure email destination. 7. Work with the SIEM administrator to configure an alert when accounts are modified.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-AP-000715
- Vuln IDs
-
- V-254926
- Rule IDs
-
- SV-254926r986537_rule
Checks: C-58539r986535_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Review the configured connections. If no sources exist to send audit logs from the Tanium SQL Server to a SIEM tool or email destination, this is a finding. Work with the SIEM administrator to determine if an alert is configured when accounts are deleted. If there is no alert configured, this is a finding.
Fix: F-58483r986536_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web UI and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or email destination. 5. Work with email administrator to configure email destination. 6. Work with the SIEM administrator to configure an alert when accounts are deleted.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- TANS-AP-000720
- Vuln IDs
-
- V-254927
- Rule IDs
-
- SV-254927r961221_rule
Checks: C-58540r867679_chk
Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI). 1. Log on with multi-factor authentication. 2. Click "Administration" at top center of the screen. 3. Select the "Global Settings" under "Management". 4. In "Filter Items" box, enter "max_console_idle_seconds". If no results are returned, this is a finding. If results are returned for "max_console_idle_seconds", but the value is not "900" or less, this is a finding.
Fix: F-58484r867680_fix
In the event the "max_console_idle_seconds" setting exists, but is not "900" or less: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. In the "Filter Items" box, enter "max_console_idle_seconds". 5. Select the "max_console_idle_seconds" setting. 6. Enter "900" or less for "Value". 7. Click "Save". In the event the "max_console_idle_seconds" setting does not exist: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Platform Settings". 4. Click "Create Setting" in the top right. 5. Select "Server" for "Setting Type". 6. In "Create Platform Setting" dialog box, enter "max_console_idle_seconds" for "Name". 7. Select "Numeric" for the "Value Type". 8. Enter "900" or less for the "Value". 9. Click "Save".
- RMF Control
- SC-3
- Severity
- M
- CCI
- CCI-001084
- Version
- TANS-AP-000765
- Vuln IDs
-
- V-254928
- Rule IDs
-
- SV-254928r986540_rule
Checks: C-58541r986538_chk
Console Users: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "LDAP/AD Sync Configurations". 4. Verify a sync exists under "Enabled Servers". If no sync exists, this is a finding. If sync exists under "Disabled Servers" and there are no Enabled Servers, this is a finding. Local TanOS Accounts: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role, or any additional user with administrative privileges. 3. Enter "C" for "User Administration Menu," and then press "Enter". 4. Enter "L" for "Local Tanium User Management," and then press "Enter". 5. Press "2" for "Manage Local User(s)," and then press "Enter". If there are any users other than the documented approved local users this is a finding.
Fix: F-58485r986539_fix
Console Users: 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web UI and log on with multifactor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "LDAP/AD Sync Configurations". 4. Click "Add Server". 5. Complete the settings using guidance from https://docs.tanium.com/platform_user/platform_user/console_using_ldap.html. 6. Click "Show Preview to Continue". 7. Review the users and groups to be imported. 8. Click "Save". Local TanOS Accounts: 1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role, or any additional user with administrative privileges. 3. Enter "C" for "User Administration Menu," and then press "Enter". 4. Enter "L" for "Local Tanium User Management," and then press "Enter". 5. Press "2" for "Manage Local User(s)," and then press "Enter". 6. Work with Tanium System Administrator to either document approved accounts or remove nonapproved accounts.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-AP-000780
- Vuln IDs
-
- V-254929
- Rule IDs
-
- SV-254929r986543_rule
Checks: C-58542r986541_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Review the configured sources. If no sources exist to send audit logs from the Tanium SQL Server to a SIEM tool or email destination, this is a finding. 1. Work with the SIEM administrator to determine if an alert is configured when account-enabling actions are performed. If there is no alert configured, this is a finding.
Fix: F-58486r986542_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web UI and log on with multifactor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Configure sources to send audit logs from the Tanium SQL Server to a SIEM tool or email destination. 5. Work with email administrator to configure email destination. 6. Work with the SIEM administrator to configure an alert when account-enabling actions are performed.
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-AP-000800
- Vuln IDs
-
- V-254930
- Rule IDs
-
- SV-254930r961317_rule
Checks: C-58543r867688_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Actions, select "Scheduled Actions". 4. Look for a scheduled action titled "Client Service Hardening - Allow Only Local SYSTEM to Control Service". If a scheduled action titled "Client Service Hardening - Allow Only Local SYSTEM to Control Service" does not exist, this is a finding. 5. If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding. If the scheduled action exists and has been approved but does not restrict control of the Tanium Client service to "Allow Only Local SYSTEM to Control Service," this is a finding. If the action is not configured to repeat at least every hour, this is a finding. If the scheduled action is not targeted at an "All Computers" Action Group, this is a finding.
Fix: F-58487r867689_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Interact". 4. In "Categories" section, select "Client Service Hardening". 5. In "Dashboards" section, select "Control Service State Permissions". 6. The results will show a "Count" of clients matching the "Service Control is set to default permissions" query. 7. Select the result line for "Service Control is set to default permissions". 8. Choose "Deploy Action". 9. Deployment Package drop-down select "Client Service Hardening - Allow Only Local SYSTEM to Control Service". 10. Configure the schedule to repeat at least every hour for the requested action. 11. Under "Targeting Criteria" in the Action Group, select "All Computers" from the drop-down. 12. Click "Show preview to continue". 13. Noncompliant systems will be displayed at the bottom. 14. Click "Deploy Action". 15. Verify settings. 16. Click "Show Client Status Details".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-AP-000805
- Vuln IDs
-
- V-254931
- Rule IDs
-
- SV-254931r961317_rule
Checks: C-58544r867691_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Actions, select "Scheduled Actions". 4. Look for a scheduled action titled "Client Service Hardening - Hide Client from Add-Remove Programs". 5. If a scheduled action titled "Client Service Hardening - Hide Client from Add-Remove Programs" does not exist, this is a finding. If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding. If the scheduled action exists and has been approved but does not disable the visibility of the client in Add-Remove Programs, this is a finding. If the action is not configured to repeat at least every hour, this is a finding. If the scheduled action is not targeted at an "All Computers" Action Group, this is a finding.
Fix: F-58488r867692_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Interact". 4. In the "Categories" section, select "Client Service Hardening". 5. In "Dashboard" section, select "Hide From Add-Remove Program". 6. The results will show a "Count" of clients matching the "Tanium Client Visible in Add-Remove Programs" query. 7. Select the result line. 8. Choose "Deploy Action". 9. The "Deploy Action" dialog box will display "Client Service Hardening - Hide Client from Add-Remove Programs" as the package. The computer names comprising the "count" of noncompliant systems will be displayed in the bottom. 10. Deployment Package drop-down select "Client Service Hardening - Hide Client from Add-Remove Programs". 11. Configure the schedule to repeat at least every hour for the requested action. 12. Under "Targeting Criteria", in the "Action Group," select "All Computers" from the drop-down. 13. Click "Show preview to continue". Noncompliant systems will be displayed in the bottom. 14. Click "Deploy Action". 15. Verify settings. 16. Click "Show Client Status Details".
- RMF Control
- AC-3
- Severity
- M
- CCI
- CCI-002165
- Version
- TANS-AP-000810
- Vuln IDs
-
- V-254932
- Rule IDs
-
- SV-254932r961317_rule
Checks: C-58545r867694_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Actions, select "Scheduled Actions". 4. Look for a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory". If a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" does not exist, this is a finding. If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding. If the scheduled action exists and has been approved but does not disable the visibility of the client in Add-Remove Programs, this is a finding. If the action is not configured to repeat at least every hour, this is a finding. If the scheduled action is not targeted at an "All Computers" Action Group, this is a finding.
Fix: F-58489r867695_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Interact". 4. In the "Categories" section, select "Client Service Hardening". 5. In the "Dashboard" section, select "Set Client Directory Permissions". The results will show a "Count" of clients' compliant and noncompliant hardening for the "Tanium Client Directory Permissions". Noncompliant clients will have a count other than "0" for "Not Restricted" or "Error: No Permissions". 6. Select each of the "Not Restricted" or "Error: No Permissions." Statuses. 7. Select "Deploy Action". 8. In the "Deploy Action" dialog box, change the package to "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" as the package. 9. Configure the schedule to repeat at least every hour for the requested action. 10. Under "Targeting Criteria", in the Action Group, select "All Computers" from the drop-down. 11. Click "Show preview to continue". Noncompliant systems will be displayed in the bottom. 12. Click "Deploy Action". 13. Verify settings. 14. Click "Show Client Status Details".
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001849
- Version
- TANS-AP-000860
- Vuln IDs
-
- V-254933
- Rule IDs
-
- SV-254933r961392_rule
Checks: C-58546r867697_chk
Consult with the Tanium system administrator or database administrator to determine the memory plan needed for the database. 1. Access the Tanium Server interactively. 2. Log on to the TanOS console as the user "tanadmin". 3. Enter "3" to access the "Tanium Support" menu. 4. Enter "3" to access the "Tanium Database Operations" menu. 5. Enter "D" to view "Memory Data Plan". Work with the SIEM administrator to determine if an alert is configured when Disk Free Space of the Tanium SQL Server reaches below 25 percent. If there is no alert configured, this is a finding.
Fix: F-58490r867698_fix
Consult with the Tanium system administrator or database administrator to determine the memory plan needed for the database. 1. Access the Tanium Server interactively. 2. Log on to the TanOS SSH console as the user with tanadmin rights. 3. Enter "3" to access the "Tanium Support" menu. 4. Enter "3" to access the "Tanium Database Operations" menu. 5. Enter "D" to access "Database Memory Plan" menu. 6. Enter "S" to "Select DB Memory Plan". 7. Enter "T","D","S","M","L", or "X" to confirm memory plan size, and then press "Enter" to continue. 8. Enter "A" to save and apply the DB memory plan. Work with the SIEM administrator to determine if an alert is configured when Disk Free Space of the Tanium SQL Server reaches below 25 percent. If there is no alert configured, this is a finding.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- TANS-AP-000865
- Vuln IDs
-
- V-254934
- Rule IDs
-
- SV-254934r961395_rule
Checks: C-58547r867700_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on using multi-factor authentication. 2. Click "Modules" on the top of the banner of the console. 3. Click "Connect". 4. Review the configured connections under "Connections" section. If no connection exists to send the "Tanium Audit Source" to a SIEM tool, this is a finding.
Fix: F-58491r867701_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on using multi-factor authentication. 2. Click "Modules" on the top of the console. 3. Click "Connect". 4. Click "Create Connection". 5. In the "Configuration" section under "Source", select "Tanium Audit Source" as the source from the drop-down menu. 6. In the "Configuration" section under "Destination", select the desired destination and fill in the respective fields. 7. In the "Configure Output" section under "Format", select the desired file format type. 8. In the "Schedule" section, select the desired schedule. 9. Click "Save".
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- TANS-AP-000870
- Vuln IDs
-
- V-254935
- Rule IDs
-
- SV-254935r961398_rule
Checks: C-58548r867703_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS console as the user "tanadmin". 3. Enter "3" to access the "Tanium Support" menu. 4. Enter "6" to display last scheduled health check results. If none exists, then this is a finding.
Fix: F-58492r867704_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS console as the user "tanadmin". 3. Enter "3" to access the "Tanium Support" menu. 4. Enter "5" to Run a Health Check.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- TANS-AP-000875
- Vuln IDs
-
- V-254936
- Rule IDs
-
- SV-254936r961401_rule
Checks: C-58549r867706_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Review the configured Tanium Sources listed. If an "Audit Log" source does not exist, this is a finding. 5. Select the "Audit Log" source. 6. Select the audit connection found in the lower half of the screen. 7. Verify the "Destination Type" is a SIEM tool. If the "Destination Type" is not a SIEM tool, this is a finding.
Fix: F-58493r870363_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Connect". 4. Click "Create Connection". 5. In the Configuration section, select "Tanium Audit Source" as the Event Source from the "Source" drop-down menu. 6. In the "Destination" section, select "Socket Receiver" from the drop-down menu. 7. Enter "Destination Name". 8. Enter "Host". 9. Enter "Network Protocol". 10. Enter "Port". 11. Click "Save". Consult documentation located at https://docs.tanium.com/connect/connect/siem.html#siem for reference on configuring other applicable SIEM connections. Work with the SIEM administrator to configure alerts based on audit failures.
- RMF Control
- Severity
- M
- CCI
- CCI-003980
- Version
- TANS-AP-000940
- Vuln IDs
-
- V-254938
- Rule IDs
-
- SV-254938r986545_rule
Checks: C-58551r867712_chk
Consult with the Tanium System Administrator to review the documented list of Tanium users. 1. Review the users' respective approved roles, as well as the correlated LDAP security group for the User Roles. 2. Validate LDAP security groups/Tanium roles are documented to assign least privileged access to the functions of the Tanium Server through the Tanium interface. If the documentation does not reflect a granular, least privileged access approach to the LDAP Groups/Tanium Roles assignment, this is a finding.
Fix: F-58495r986544_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multifactor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Permissions, select "Users". 4. Analyze the users configured in the Tanium interface. 5. Determine least privileged access required for each user to perform their respective duties. 6. Move users to the appropriate LDAP security group to ensure the user is synced to the appropriate Tanium User Role. 7. If the appropriate LDAP security groups are not already configured, create the groups and add the appropriate users. 8. Ensure LDAP sync repopulates the Tanium users' associated roles accordingly.
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001813
- Version
- TANS-AP-000950
- Vuln IDs
-
- V-254939
- Rule IDs
-
- SV-254939r961461_rule
Checks: C-58552r867715_chk
Consult with the Tanium System Administrator to review the documented list of Tanium Administrators. 1. Review the administrators' respective approved roles, as the correlated LDAP security group for the User Roles. If the documentation does not reflect a granular, least privileged access approach to the LDAP Groups/Tanium Roles assignment, this is a finding.
Fix: F-58496r867716_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Permissions", select "Users". 4. Analyze the users configured in the Tanium interface. 5. Determine least privileged access required for each user to perform their respective duties. 6. Move users to the appropriate LDAP security group to ensure the user is synced to the appropriate Tanium User Role. 7. If the appropriate LDAP security groups are not already configured, create the groups and add the appropriate users. 8. Ensure LDAP sync repopulates the Tanium Users' associated Roles accordingly.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-AP-000965
- Vuln IDs
-
- V-254940
- Rule IDs
-
- SV-254940r961470_rule
Checks: C-58553r867718_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. 1. Access the Tanium Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Access the host-based firewall configuration on the Tanium Server. 4. Validate a rule exists for the following: 4A. Port Needed: From only designated Tanium console user clients to Tanium Server over TCP port 443. If a host-based firewall rule does not exist to allow only designated Tanium console user clients to Tanium Server over TCP port 443, this is a finding. 4B. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic from only designated Tanium console user clients to Tanium Server over TCP ports 443. If a network firewall rule does not exist to allow traffic from only designated Tanium console user clients to Tanium Server over TCP port 443, this is a finding.
Fix: F-58497r867719_fix
1. Configure host-based firewall rules on the Tanium Server to include the following required traffic: 1A. Allow TCP traffic on port 433 to the Tanium Server from designated Tanium console user clients. 1B. Configure the network firewall to allow the above traffic.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-AP-000970
- Vuln IDs
-
- V-254941
- Rule IDs
-
- SV-254941r961470_rule
Checks: C-58554r867721_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. 1. Access the Tanium Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Access the host-based firewall configuration on the Tanium Server. 4. Validate a rule exists for the following: 4A. Port Needed: Tanium Server to Remote SQL Server over TCP port 1433. If a host-based firewall rule does not exist to allow Tanium Server to Remote SQL Server over TCP port 1433, this is a finding. 4B. Consult with the network firewall administrator and validate rules exist for the following: Allow traffic from Tanium Server to Remote SQL Server over TCP port 1433. If a network firewall rule does not exist to allow traffic from Tanium Server to Remote SQL Server over TCP port 1433, this is a finding.
Fix: F-58498r867722_fix
1. Configure host-based firewall rules on the Tanium Server to include the following required traffic: 1A. Allow TCP traffic on port 1433 from the Tanium Server to the Remote SQL Server. 2. Configure the network firewall to allow the above traffic.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-AP-000975
- Vuln IDs
-
- V-254942
- Rule IDs
-
- SV-254942r961470_rule
Checks: C-58555r867724_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Module Server. 1. Access the Tanium Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Access the host-based firewall configuration on the Tanium Module Server. 4. Validate a rule exists for the following: 4A. Port Needed: Tanium Server to Tanium Module Server over TCP port 17477. If a host-based firewall rule does not exist to allow TCP port 17477, from the Tanium Server to the Tanium Module Server, this is a finding. 4B. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. If a network firewall rule does not exist to allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server, this is a finding.
Fix: F-58499r867725_fix
1. Configure host-based firewall rules on the Tanium Module Server to include the following required traffic: 1A. Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. 2. Configure the network firewall to allow the above traffic.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-AP-000980
- Vuln IDs
-
- V-254943
- Rule IDs
-
- SV-254943r961470_rule
Checks: C-58556r867727_chk
Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. 1. Access the Tanium Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Access the host-based firewall configuration on the Tanium Server. 4. Validate a rule exists for the following: 4A. Port Needed: Tanium Server to Tanium Module Server over TCP port 17477. If a host-based firewall rule does not exist to allow TCP port 17477, from the Tanium Server to the Tanium Module Server, this is a finding. 4B. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. If a network firewall rule does not exist to allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server, this is a finding.
Fix: F-58500r867728_fix
1. Configure host-based firewall rules on the Tanium Server to allow the following required traffic: 1A. Allow TCP traffic on port 17477 to the Tanium Module Server from the Tanium Server. 2. Configure the network firewall to allow the above traffic.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-001762
- Version
- TANS-AP-000985
- Vuln IDs
-
- V-254944
- Rule IDs
-
- SV-254944r961470_rule
Checks: C-58557r867730_chk
Note: If a Zone Server is not being used, this is Not Applicable. Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. 1. Access the Tanium Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Access the host-based firewall configuration on the Tanium Server. 4. Validate a rule exists for the following: 4A. Port Needed: Tanium Server to Zone Server over TCP port 17472. Note: By default, the Zone Server uses 17472 for traffic from Zone Server Hubs and Tanium Clients. However, as a best practice to improve the security of the Zone Server, different ports can be configured for the hubs and clients. If a host-based firewall rule does not exist to allow TCP port 17472 or other defined port, bidirectionally, from Tanium Server to the Tanium Zone Server, this is a finding.
Fix: F-58501r867731_fix
1. Configure host-based firewall rules on the Tanium Zone server to include the following required traffic: 1A. Allow Tanium Server to Zone Server over TCP port 17472. 2. Configure the network firewall to allow the above traffic. Note: By default, the Zone Server uses 17472 for traffic from Zone Server Hubs and Tanium Clients. However, as a best practice to improve the security of the Zone Server, different ports can be configured for the hubs and clients.
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- TANS-AP-001090
- Vuln IDs
-
- V-254945
- Rule IDs
-
- SV-254945r962034_rule
Checks: C-58558r867733_chk
1. Access the Tanium Server interactively. 2. Log on to the server with the tanadmin role. 3. Enter 2: Tanium Operations >> 2: Tanium Configuration Settings >> 1: Edit Tanium Server Settings. 4. Verify the existence of a "SSLHonorCipherOrder" key with a value of "1". If the "SSLHonorCipherOrder" key does not exist with a value of "1", this is a finding.
Fix: F-58502r870382_fix
1. Access the Tanium Server interactively. 2. Log on to the server with the tanadmin role. 3. Enter 2: Tanium Operations >> 2: Tanium Configuration Settings >> 1: Edit Tanium Server Settings. 4. Enter number associated with key "SSLHonorCipherOrder" to edit its value. 5. Add or modify the "SSLHonorCipherOrder" key to have a value of "1".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- TANS-AP-001095
- Vuln IDs
-
- V-254946
- Rule IDs
-
- SV-254946r962034_rule
Checks: C-58559r867736_chk
1. Access the Tanium Server interactively. 2. Log on to the server with the tanadmin role. 3. Enter 2: Tanium Operations >> 2: Tanium Configuration Settings >> 1: Edit Tanium Server Settings. 4. Verify the existence of a "SSLCipherSuite" key with a value of: ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK If the String "SSLCipherSuite" does not exist with the appropriate list values, this is a finding.
Fix: F-58503r870383_fix
1. Access the Tanium Server interactively. 2. Log on to the server with the tanadmin role. 3. Enter 2: Tanium Operations >> 2: Tanium Configuration Settings >> 1: Edit Tanium Server Settings. 4. Enter the number associated with key "SSLCipherSuite" to edit its value. 5. Add or modify the "SSLCipherSuite" key to have a value of: ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- TANS-AP-001130
- Vuln IDs
-
- V-254947
- Rule IDs
-
- SV-254947r961596_rule
Checks: C-58560r867739_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. When connected, review the Certificate for the Tanium Server. 3. In the web browser, view the presented Certificate and verify that the Certificate shows as issued by a DOD Root CA. Also verify that the Certification path's top-level is a DOD Root CA. 4. If the certificate authority is not DOD Root CA, this is a finding.
Fix: F-58504r867740_fix
Request or regenerate the certificate from a DOD Root Certificate Authority.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- TANS-AP-001150
- Vuln IDs
-
- V-254948
- Rule IDs
-
- SV-254948r961620_rule
Checks: C-58561r867742_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration", select "Bandwidth Throttles". 4. Work with the Tanium Administrator to confirm settings. If bandwidth throttles are not configured, this is a finding. For more information, see the following: https://docs.tanium.com/platform_user/platform_user/console_bandwidth_throttling.html.
Fix: F-58505r867743_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Configuration, select "Bandwidth Throttles". 4. Click "Add" on the line for "Global Throttle for All Data". 5. Work with Tanium Administrator to configure the required bandwidth throttles. 6. Click "Save". 7. Work with the Tanium Administrator to confirm or set settings for the remaining options: a) Global Throttle for Package Files b) Global Throttle for Sensors c) Site Throttles
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- TANS-AP-001215
- Vuln IDs
-
- V-254949
- Rule IDs
-
- SV-254949r961683_rule
Checks: C-58562r867745_chk
Ensure all components of the Tanium application have been updated within 60 days of the vulnerability being announced by Tanium. Critical Vulnerabilities must be updated within 30 days. --- Consult with the Tanium System Administrator to review the documented time window designated for updates. If a window of time is not defined, or does not specify a reoccurring frequency, this is a finding. 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Solutions". If any module has the text, "Update to" a newer (greater) version number compared to the Installed version number in the Tanium Modules section of the page, this is a finding. If the Tanium application is an "airgap" installation, work with the Tanium Technical System Administrator to determine if the modules are up to date.
Fix: F-58506r867746_fix
Consult with the Tanium System Administrator to review the documented time window designated for updates. If a window of time is not defined, or does not specify a reoccurring frequency, work with the Tanium Administrator to document. 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under Configuration, select "Solutions". If any module has the text, "Update to" a newer (greater) version number compared to the Installed version number in the Tanium Modules section of the page, work with the Tanium Administrator to update those modules or content. If the Tanium application is an "airgap" installation, work with the Tanium Technical System Administrator to determine if the modules are up to date.
- RMF Control
- SI-4
- Severity
- M
- CCI
- CCI-002664
- Version
- TANS-AP-001250
- Vuln IDs
-
- V-254950
- Rule IDs
-
- SV-254950r961728_rule
Checks: C-58563r867748_chk
Note: If THR is not licensed or used for detection then this is not applicable. 1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Threat Response". 4. Expand the left menu. 5. Click "Alerts". 6. Filter on status "Unresolved". If any alerts are unresolved, this is a finding.
Fix: F-58507r867749_fix
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Click "Threat Response". 4. Expand the left menu. 5. Click "Alerts". 6. Filter on status "Unresolved". 7. Resolve any open IOC-based alerts and change status to applicable status.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- TANS-AP-001405
- Vuln IDs
-
- V-254951
- Rule IDs
-
- SV-254951r961860_rule
Checks: C-58564r867751_chk
1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Select "Connect". 4. Review the "Connections" sections for source "Tanium Audit Source". If necessary, filter the connections by filtering by "Source" and the term "Audit". 5. Select "Audit" from list. 6. In the Summary section, verify the "State" is "Enabled" and the "Next Run" value is less than "7" days. If no results are returned, this is a finding. If results are returned but the state is not "Enabled", this is a finding. If the schedule duration is more than one week, this is a finding. If a schedule is not set, this is a finding.
Fix: F-58508r870364_fix
1.Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 2. Click "Modules" on the top navigation banner. 3. Select "Connect". 4. Click "Create Connection". 5. Enter "Name". 6. Enter "Description". 7. In the "Configuration" section, select "Source: Tanium Audit Source" and then under "Basic" options select appropriate audits. 8. In the Destination section, select a source from the drop-down menu. 9. Enter "Destination Name". 10. Enter "Host". 11. Select "Network Protocol", then "TCP" or "UDP". 12. Enter "Port". 13. In the Schedule section, select "Enable Schedule". 14. Select "Basic". 15. Select the drop-down under "Frequency" and choose, "One run per day, on selected days of the week". 16. Select a day. 17. Select a time. 18. Select "Save".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-AP-001410
- Vuln IDs
-
- V-254952
- Rule IDs
-
- SV-254952r961863_rule
Checks: C-58565r867754_chk
Review the settings of the antivirus software. Validate exclusions exist that exclude the Tanium Client process interactions from on-access scans and are treated as low-risk. If exclusions do not exist, this is a finding.
Fix: F-58509r867755_fix
Implement exclusion policies within the antivirus software solution to exclude the on-access scanning of Tanium Client process interactions. These processes should be treated as low-risk and not scanned during read or write events.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-AP-001415
- Vuln IDs
-
- V-254953
- Rule IDs
-
- SV-254953r961863_rule
Checks: C-58566r867757_chk
Review the settings of the antivirus software. Validate exclusions exist that exclude the Tanium Client directory and subsequent files interactions from on-access scans. If exclusions do not exist, this is a finding.
Fix: F-58510r867758_fix
Implement exclusion policies within the antivirus software solution to exclude the on-access scanning of Tanium Client directory and subsequent files interactions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-AP-001420
- Vuln IDs
-
- V-254954
- Rule IDs
-
- SV-254954r961863_rule
Checks: C-58567r867760_chk
Consult with the Tanium System Administrator to determine the HIPS software used on the Tanium Clients. Review the settings of the HIPS software. Validate exclusions exist which exclude the Tanium program files from being restricted by HIPS. If exclusions do not exist, this is a finding.
Fix: F-58511r867761_fix
In the host-based intrusion prevention system, ensure the following folders are excluded: Windows (64-bit OS versions) - \Program Files (x86)\Tanium\Tanium Client Windows (32-bit OS versions) - \Program Files\Tanium\Tanium Client macOS - /Library/Tanium/TaniumClient Linux, Solaris, AIX - /opt/Tanium/TaniumClient In the host-based intrusion prevention system, ensure the following processes are excluded: Windows, macOS, Linux - <Tanium Client>/Tools/StdUtils directory or all the files that it contains, including: Windows, macOS, Linux - 7za.exe (Windows) or 7za (macOS, Linux) Windows, macOS, Linux - runasuser.exe (Windows only) Windows, macOS, Linux - runasuser64.exe (Windows only) Windows, macOS, Linux - TaniumExecWrapper.exe (Windows) or TaniumExecWrapper (macOS, Linux) Windows, macOS, Linux - TaniumFileInfo.exe (Windows only) Windows, macOS, Linux - TPowerShell.exe (Windows only) macOS, Linux, Solaris, AIX - <Tanium Client>/TaniumClient macOS, Linux, Solaris, AIX - <Tanium Client>/taniumclient macOS, Linux - <Tanium Client>/distribute-tools.sh macOS, Linux - <Tanium Client>/TaniumCX Windows - <Tanium Client>\TaniumClient.exe Windows - <Tanium Client>\TaniumCX.exe
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-AP-001425
- Vuln IDs
-
- V-254955
- Rule IDs
-
- SV-254955r961863_rule
Checks: C-58568r867763_chk
Review the settings of the antivirus software. Validate exclusions exist that exclude the Tanium Server directory and subsequent files interactions from on-access scans. If exclusions do not exist, this is a finding.
Fix: F-58512r867764_fix
Implement exclusion policies within the antivirus software solution to exclude the on-access scanning of Tanium Server directory and subsequent files interactions.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- TANS-AP-001430
- Vuln IDs
-
- V-254956
- Rule IDs
-
- SV-254956r961863_rule
Checks: C-58569r867766_chk
Review the settings of the antivirus software. Validate exclusions exist that exclude the Tanium Server process interactions from on-access scans and are treated as low-risk. If exclusions do not exist, this is a finding.
Fix: F-58513r867767_fix
Implement exclusion policies within the antivirus software solution to exclude the on-access scanning of Tanium Server process interactions. These processes should be treated as low-risk and not scanned during read or write events.