Tanium 7.x Operating System on TanOS Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −2 ✎ 4
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 2
- V-254845 Medium The Tanium Operating System (TanOS) must prohibit password reuse for a minimum of five generations.
- V-254850 Medium The Tanium Operating System (TanOS) must terminate all sessions and network connections when nonlocal maintenance is completed.
Content changes 4
- V-254848 Medium description The Tanium Operating System (TanOS) must use multifactor authentication for network access to nonprivileged accounts.
- V-254857 Medium description The Tanium Operating System (TanOS) must audit and notify system administrators (SAs) and information system security officers (ISSOs) when accounts are modified.
- V-254858 Medium description The Tanium Operating System (TanOS) must notify system administrators (SAs) and information system security officers (ISSOs) when accounts are removed.
- V-254860 Medium description Tanium must audit and notify system administrators (SAs) and information system security officers (ISSOs) when accounts are enabled.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- TANS-OS-000070
- Vuln IDs
-
- V-254839
- Rule IDs
-
- SV-254839r958388_rule
Checks: C-58452r866056_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu," and then press "Enter". 4. Press L for "Local Tanium User Management," and then press "Enter". 5. Press "B" for "Security Policy Local Authentication Service," and then press "Enter". If the value of "Maximum Password Attempts:" is greater than "3", this is a finding.
Fix: F-58396r866057_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu," and then press "Enter". 4. Press "L" for "Local Tanium User Management," and then press "Enter". 5. Press B for "Security Policy Local Authentication Service," and then press "Enter". 6. Type "yes," and then press "Enter". 7. Input the following settings pressing "Enter" after every value: a) Minimum Password Lifetime: Configure an appropriate value b) Maximum Password Lifetime: Configure an appropriate value c) Minimum Password Length: Configure an appropriate value d) Minimum Password History: Configure an appropriate value e) Password Lockout: Configure an appropriate value f) Maximum Password Attempts: 3 8. Type "yes" to accept the new password policy.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- TANS-OS-000075
- Vuln IDs
-
- V-254840
- Rule IDs
-
- SV-254840r958390_rule
Checks: C-58453r870365_chk
1. Access the Tanium Server interactively. 2. Verify DOD use notification displayed prior to login. "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If a DOD-approved use notification banner does not display prior to logon, this is a finding.
Fix: F-58397r870366_fix
1. Create a .txt file composed of the DOD-authorized warning banner verbiage. "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." 2. Name the file "banner_ssh.txt". 3. Use SFTP to upload the HTML banner file to the /incoming folder. 4. Access the Tanium Server interactively. 5. Log on to the TanOS server with the tanadmin role, or any additional user with administrative privileges. 6. Enter A: Appliance Configuration Menu >> A: Security >> 3: Configure SSH Banner and follow the prompts. 7. Log off and back on to the Tanium Server to confirm application.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- TANS-OS-000095
- Vuln IDs
-
- V-254841
- Rule IDs
-
- SV-254841r958398_rule
Checks: C-58454r866062_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "P" for "Security Policy," and then press "Enter". 6. Press "M" for "Maximum Concurrent Logins," and then press "Enter". 7. Work with the Tanium Administrator to confirm the number of maximum concurrent users. If the value of "Maximum Concurrent Logins:" is greater than the approved value, this is a finding.
Fix: F-58398r866063_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press P for "Security Policy," and then press "Enter". 6. Press "M" for "Maximum Concurrent Logins," and then press "Enter". 7. Work with the Tanium Administrator to set the number of maximum concurrent users.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- TANS-OS-000165
- Vuln IDs
-
- V-254842
- Rule IDs
-
- SV-254842r958424_rule
Checks: C-58455r870377_chk
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press 4 for "Syslog Configuration," and then press "Enter". 4. Press "1" for "Check current status," and then press Enter. If the syslog status page states, "No existing TanOS syslog forwarding configuration found", this is a finding. If the syslog status page states, "Syslog forwarding configuration" and the SIEM administrator verifies SIEM is receiving the events correctly and generating notifications for audit processing failure events, this is not a finding.
Fix: F-58399r866066_fix
1. Access the TanOS interactively. 2. Press A for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press 5 for "Configure syslog forwarding," and then press "Enter". 5. Enter the destination host (IP address or hostname) provided by the SIEM administrator, and then press "Enter". 6. Enter the destination port number and press "Enter". 7. If TLS is required for this syslog destination, enter "Yes", otherwise enter "No", and then press "Enter". 8. Enter the destination protocol, "udp" or "tcp", and then press "Enter". 9. Work with the SIEM administrator to validate events are being received, and to configure notifications for audit processing failure events.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- TANS-OS-000270
- Vuln IDs
-
- V-254843
- Rule IDs
-
- SV-254843r986548_rule
Checks: C-58456r866068_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu". 4. Press "L" for "Local Tanium User Management". 5. Press "B" for "Security Policy Local Authentication Service". If the "Password Minimum Age (days)" is not set to "1", this is a finding.
Fix: F-58400r866069_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu". 4. Press "L" for "Local Tanium User Management". 5. Press "B" for "Security Policy Local Authentication Service". 6. Type "Yes". 7. Set the value for "Define the minimum password in days [0 - 20]" to "1". 8. Press "Enter" to accept the current values for the rest of the options. 9. Type "Yes" to apply the new security policy.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- TANS-OS-000275
- Vuln IDs
-
- V-254844
- Rule IDs
-
- SV-254844r986549_rule
Checks: C-58457r866071_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu". 4. Press "L" for "Local Tanium User Management". 5. Press "B" for "Security Policy Local Authentication Service". If the "Password Maximum Age (days)" is not set to "60", this is a finding.
Fix: F-58401r866072_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu". 4. Press "L" for "Local Tanium User Management". 5. Press "B" for "Security Policy Local Authentication Service". 6. Type "Yes". 7. Press "Enter" to accept the current value for "Define the minimum password in days [0 - 20]". 8. Set the value of "Define the maximum password lifetime in days [0-300]" to "60". 9. Press "Enter" to accept the current values for the rest of the options. 10. Type "Yes" to apply the new security policy.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- TANS-OS-000285
- Vuln IDs
-
- V-254846
- Rule IDs
-
- SV-254846r986550_rule
Checks: C-58459r866077_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu". 4. Press "L" for "Local Tanium User Management". 5. Press "B" for "Security Policy Local Authentication Service". If "Password Minimum Length" is not set to 15, this is a finding.
Fix: F-58403r866078_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "C" for "User Administration Menu". 4. Press "L" for "Local Tanium User Management". 5. Press "B" for "Security Policy Local Authentication Service". 6. Type "Yes". 7. Press "Enter" to accept the current value for "Define the minimum password in days [0 - 20]". 8. Press "Enter" to accept the current value for "Define the maximum password lifetime in days [0-300]". 9. Set the value for "Define the maximum password length (characters) [0-30]" to "15". 11. Press "Enter" to accept the current values for the rest of the options. 12. Type "Yes" to apply the new security policy.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- TANS-OS-000325
- Vuln IDs
-
- V-254847
- Rule IDs
-
- SV-254847r986546_rule
Checks: C-58460r866080_chk
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "C" to go to the "User Administration" menu. 3. Enter "M" to go to the "Multi-Factor Global Settings" menu. 4. If the status shows "Multi-Factor: Optional", this is a finding.
Fix: F-58404r866081_fix
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "C" to go to the "User Administration" menu. 3. Enter "M" to go to the "Multi-Factor Global Settings" menu. 4. Enter "M" to "Require Multi-Factor Authentication". 5. Enter "E" to "Enable Require Multi-factor Authentication".
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000766
- Version
- TANS-OS-000330
- Vuln IDs
-
- V-254848
- Rule IDs
-
- SV-254848r986547_rule
Checks: C-58461r866083_chk
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "C" to go to the "User Administration" menu. 3. Enter "M" to go to the "Multi-Factor Global Settings" menu. 4. If the status shows "Multi-Factor: Optional", this is a finding.
Fix: F-58405r866084_fix
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "C" to go to the "User Administration" menu. 3. Enter "M" to go to the "Multi-Factor Global Settings" menu. 4. Enter "M" to "Require Multi-Factor Authentication". 5. Enter "E" to "Enable Require Multi-factor Authentication".
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- TANS-OS-000385
- Vuln IDs
-
- V-254849
- Rule IDs
-
- SV-254849r971535_rule
Checks: C-58462r866086_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "X" for "Advanced Security," and then press "Enter". If the FIPS 140-2 setting is currently disabled or persistently disabled, this is a finding.
Fix: F-58406r866087_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "X" for "Advanced Security," and then press "Enter". 6. Press "1" for "FIPS 140-2 mode (disabled/enabled)". 7. Type "yes" to confirm enabling FIPS 140-2 Mode and then press "Enter". 8. Press "Enter" at the confirmation prompt that instructs the user to reboot the appliance. 9. Type "RR" and press "Enter" to return to the root menu. 10. Press "B" for "Appliance Maintenance," and then press "Enter". 11. Press "B" for "Reboot/Shutdown," and then press "Enter". 12. Press "1" for "Reboot the appliance," and then press "Enter". 13. Type "Yes", and then press "Enter" to reboot the appliance and complete the configuration.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-001095
- Version
- TANS-OS-000455
- Vuln IDs
-
- V-254851
- Rule IDs
-
- SV-254851r958528_rule
Checks: C-58464r866092_chk
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "A" to go to the "Appliance Configuration" menu. 3. Enter "A" to go to the "Security" menu. 4. Enter "X" to go to the "Advanced Security" menu. 5. If you see "DOS protection: disabled" in the middle of the screen, this is a finding.
Fix: F-58408r866093_fix
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "A" to go to the "Appliance Configuration" menu. 3. Enter "A" to go to the "Security" menu. 4. Enter " to go to the "Advanced Security" menu. 5. Enter "6" to enable DoS protection. The screen updates with an enabled status.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- TANS-OS-000465
- Vuln IDs
-
- V-254852
- Rule IDs
-
- SV-254852r970703_rule
Checks: C-58465r866095_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "X" for "Advanced Security," and then press "Enter". If the "Menu Timeout" setting is "-" for "Current" or "Persistent", this is a finding. If the "Menu Timeout" is greater than "600" (seconds) for either "Current" or "Persistent", this is a finding.
Fix: F-58409r866096_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "X" for "Advanced Security," and then press "Enter". 6. Press "5" for "Set Menu Timeout," and then press "Enter". 7. Enter a timeout value no greater than "600" seconds, and then press "Enter". The timeout is not applied until a new login session is started. 8. Type "RR" and press "Enter" to return to the root menu. 9. Press "Z" for "Log out," and then press Enter. The session will disconnect and the menu timeout will be active at next sign in.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- TANS-OS-000515
- Vuln IDs
-
- V-254853
- Rule IDs
-
- SV-254853r958552_rule
Checks: C-58466r866098_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "X" for "Advanced Security," and then press "Enter". If the FIPS 140-2 setting is currently disabled or persistently disabled, this is a finding.
Fix: F-58410r866099_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "X" for "Advanced Security," and then press "Enter". 6. Press "1" for "FIPS 140-2 mode (disabled/enabled). 7. Type "yes" to confirm enabling FIPS 140-2 Mode, and then press "Enter". 8. Press "Enter" at the confirmation prompt that instructs the user to reboot the appliance. 9. Type "RR" and press "Enter" to return to the root menu. 10. Press "B" for "Appliance Maintenance," and then press "Enter". 11. Press "B" for "Reboot/Shutdown," and then press "Enter". 12. Press "1" for "Reboot the appliance," and then press "Enter". 13. Type "Yes" and press "Enter" to reboot the appliance and complete the configuration.
- RMF Control
- SI-6
- Severity
- M
- CCI
- CCI-001294
- Version
- TANS-OS-000535
- Vuln IDs
-
- V-254854
- Rule IDs
-
- SV-254854r958558_rule
Checks: C-58467r870378_chk
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and press then "Enter". 4. Press "1" for "Check current status," and then press "Enter". If the syslog status page states, "No existing TanOS syslog forwarding configuration found", this is a finding. If the syslog status page states, "Syslog forwarding configuration" and the SIEM administrator verifies SIEM is receiving the events correctly and generating notifications for failed security verification tests, this is not a finding.
Fix: F-58411r866102_fix
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "5" for "Configure syslog forwarding," and then press "Enter". 5. Enter the destination host (IP address or hostname) provided by the SIEM administrator, and press "Enter". 6. Enter the destination port number, and then press "Enter". 7. If TLS is required for this syslog destination, enter "Yes", otherwise enter "No", and then press "Enter". 8. Enter the destination protocol, "udp" or "tcp", and then press "Enter". 9. Work with the SIEM administrator to validate events are being received, and to configure notifications for failure events.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- TANS-OS-000605
- Vuln IDs
-
- V-254855
- Rule IDs
-
- SV-254855r958586_rule
Checks: C-58468r870370_chk
1. Access the TanOS interactively. If the Standard Mandatory DOD Notice and Consent Banner is not displayed at logon, this is a finding.
Fix: F-58412r870371_fix
1. Use SFTP to copy a file named "banner_ssh.txt" containing the Standard Mandatory DOD Notice and Consent Banner to the /incoming folder. 2. Access the TanOS interactively. 3. Enter "A" to go to the "Appliance Configuration" menu. 4. Enter "A" to go to the "Security" menu. 5. Enter "3" to add the banner file.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-OS-000710
- Vuln IDs
-
- V-254856
- Rule IDs
-
- SV-254856r986552_rule
Checks: C-58469r986551_chk
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and press then "Enter". 4. Press "1" for "Check current status," and then press "Enter". If the syslog status page states, "No existing TanOS syslog forwarding configuration found", this is a finding. If the syslog status page states, "Syslog forwarding configuration" and the SIEM administrator verifies SIEM is receiving the events correctly and generating notifications for account creation events, this is not a finding.
Fix: F-58413r866108_fix
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "5" for "Configure syslog forwarding," and then press "Enter". 5. Enter the destination host (IP address or hostname) provided by the SIEM administrator, and then press "Enter". 6. Enter the destination port number, and then press "Enter". 7. If TLS is required for this syslog destination, enter "Yes", otherwise enter "No", and then press "Enter". 8. Enter the destination protocol, "udp" or "tcp", and press "Enter". 9. Work with the SIEM administrator to validate events are being received, and to configure notifications for account creation events.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-OS-000715
- Vuln IDs
-
- V-254857
- Rule IDs
-
- SV-254857r986554_rule
Checks: C-58470r986553_chk
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "1" for "Check current status," and then press "Enter". If the syslog status page states, "No existing TanOS syslog forwarding configuration found", this is a finding. If the syslog status page states, "Syslog forwarding configuration", and the SIEM administrator verifies SIEM is receiving the events correctly and generating notifications for account modification events, this is not a finding.
Fix: F-58414r866111_fix
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "5" for "Configure syslog forwarding," and then press "Enter". 5. Enter the destination host (IP address or hostname) provided by the SIEM administrator, and then press "Enter". 6. Enter the destination port number, and then press "Enter". 7. If TLS is required for this syslog destination, enter "Yes", otherwise enter "No", and then press "Enter". 8. Enter the destination protocol, "udp" or "tcp", and then press "Enter". 9. Work with the SIEM administrator to validate events are being received, and to configure notifications for account modification events.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-OS-000725
- Vuln IDs
-
- V-254858
- Rule IDs
-
- SV-254858r986555_rule
Checks: C-58471r866113_chk
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "1" for "Check current status," and then press "Enter". If the syslog status page states "No existing TanOS syslog forwarding configuration found" this is a finding. If the syslog status page states "Syslog forwarding configuration" and the SIEM administrator verifies SIEM is receiving the events correctly and generating notifications for account removal events, this is not a finding.
Fix: F-58415r866114_fix
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "5" for "Configure syslog forwarding," and press then "Enter". 5. Enter the destination host (IP address or hostname) provided by the SIEM administrator, and then press "Enter". 6. Enter the destination port number and press "Enter". 7. If TLS is required for this syslog destination, enter "Yes", otherwise enter "No", and then press "Enter". 8. Enter the destination protocol, "udp" or "tcp", and press "Enter". 9. Work with the SIEM administrator to validate events are being received, and to configure notifications for account removal/deletion events.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- TANS-OS-000735
- Vuln IDs
-
- V-254859
- Rule IDs
-
- SV-254859r958636_rule
Checks: C-58472r866116_chk
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "A" to go to the "Appliance Configuration" menu. 3. Enter "A" to go to the "Security" menu. 4. Enter "X" to go to the "Advanced Security" menu. 5. Enter "5" to go to "Set Menu Timeout". 6. See the current setting for timeout, if this does not match the organizationally defined standard, this is a finding.
Fix: F-58416r866117_fix
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "A" to go to the "Appliance Configuration" menu. 3. Enter "A" to go to the "" menu. 4. Enter "X" to go to the "Advanced Security" menu. 5. Enter "5" to go to "Set Menu Timeout". 6. Enter the correct Timeout in seconds, and then press "Enter" to set the setting.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-000015
- Version
- TANS-OS-000860
- Vuln IDs
-
- V-254860
- Rule IDs
-
- SV-254860r986557_rule
Checks: C-58473r986556_chk
1. Access the Tanium Operating System (TanOS) interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "1" for "Check current status," and then press "Enter". If the syslog status page states, "No existing TanOS syslog forwarding configuration found", this is a finding. If the syslog status page states, "Syslog forwarding configuration" and the SIEM administrator verifies SIEM is receiving the events correctly and generating notifications for account enable events, this is not a finding.
Fix: F-58417r866120_fix
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "5" for "Configure syslog forwarding," and then press "Enter". 5. Enter the destination host (IP address or hostname) provided by the SIEM administrator, and then press "Enter". 6. Enter the destination port number and then press "Enter". 7. If TLS is required for this syslog destination, enter "Yes", otherwise enter "No", and then press "Enter". 8. Enter the destination protocol, "udp" or "tcp", and then press "Enter". 9. Work with the SIEM administrator to validate events are being received, and to configure notifications for account removal/deletion events.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- TANS-OS-000985
- Vuln IDs
-
- V-254861
- Rule IDs
-
- SV-254861r958736_rule
Checks: C-58474r866122_chk
1. Log in to Tanium interactively as a TanAdmin user. 2. Type "A" for "Appliance Configuration Menu". 3. Type "A" for Security. 4. Type "P" for Security Policy. 5. The section for "Account lockout:" should read "0 seconds after 3 failures". If the section reads anything else, this is a finding.
Fix: F-58418r866123_fix
1. Log in to Tanium interactively as a TanAdmin user. 2. Type "A" for "Appliance Configuration Menu". 3. Type "A" for "Security". 4. Type "P" for "Security Policy". 5. Type "Account Lockout Time". 6. Set the account lockout time to "0". Note: The time range for the three failures to occur is 15 minutes by default and cannot be configured otherwise.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000169
- Version
- TANS-OS-001030
- Vuln IDs
-
- V-254862
- Rule IDs
-
- SV-254862r958754_rule
Checks: C-58475r866125_chk
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "1" for "Check current status," and then press "Enter". If the syslog status page states "No existing TanOS syslog forwarding configuration found" this is a finding. If the syslog status page states "Syslog forwarding configuration" and the SIEM administrator verifies that the destination SIEM is receiving the events correctly, this is not a finding.
Fix: F-58419r866126_fix
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "5" for "Configure syslog forwarding," and then press "Enter". 5. Enter the destination host (IP address or hostname) provided by the SIEM administrator, and then press "Enter". 6. Enter the destination port number and press "Enter". 7. If TLS is required for this syslog destination, enter "Yes", otherwise enter "No", and then press "Enter". 8. Enter the destination protocol, "udp" or "tcp", and then press "Enter". 9. Work with the SIEM administrator to validate events are being received.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001855
- Version
- TANS-OS-001035
- Vuln IDs
-
- V-254863
- Rule IDs
-
- SV-254863r971542_rule
Checks: C-58476r866128_chk
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "5" for "SNMP Configuration," and then press "Enter". If the State is "Disabled" this is a finding. If the state is "Enabled", work with the SNMP monitoring system administrator to ensure warnings are sent when TanOS storage reaches 75 percent of capacity. If they are not being sent, and this is a finding.
Fix: F-58420r866129_fix
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "5" for "SNMP Configuration," and then press "Enter". 4. Press "S" for "Set Password and Start the SNMP Service," and then press "Enter". 5. Enter the desired SNMP password and press "Enter". 6. Press "Enter" to continue and return to the SNMP configuration menu and verify the state is now "Enabled". Work with the SNMP monitoring system administrator to enable warning alerts for low free space.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-001858
- Version
- TANS-OS-001040
- Vuln IDs
-
- V-254864
- Rule IDs
-
- SV-254864r958758_rule
Checks: C-58477r866131_chk
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "1" for "Check current status," and then press "Enter". If the syslog status page states "No existing TanOS syslog forwarding configuration found" this is a finding. If the syslog status page states "Syslog forwarding configuration" and the SIEM administrator verifies SIEM is receiving the events correctly and generating notifications for audit failure events, this is not a finding.
Fix: F-58421r866132_fix
1. Access the TanOS interactively. 2. Press "A" for "Appliance Configuration Menu," and then press "Enter". 3. Press "4" for "Syslog Configuration," and then press "Enter". 4. Press "5" for "Configure syslog forwarding," and then press "Enter". 5. Enter the destination host (IP address or hostname) provided by the SIEM administrator, and then press "Enter". 6. Enter the destination port number and press "Enter". 7. If TLS is required for this syslog destination, enter "Yes", otherwise enter "No", and press "Enter". 8. Enter the destination protocol, "udp" or "tcp", and press "Enter". 9. Work with the SIEM administrator to validate events are being received, and to configure notifications for audit failure events.
- RMF Control
- Severity
- M
- CCI
- CCI-004923
- Version
- TANS-OS-001095
- Vuln IDs
-
- V-254865
- Rule IDs
-
- SV-254865r986559_rule
Checks: C-58478r866134_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "3" for "NTP Configuration," and then press "Enter". If there is no address listed for "Currently configured ntp servers:", this is a finding. If the "Current NTP Status" does not list a status of "Synchronized to NTP Server (<address>) at stratum #" and "Time correct to within # ms", this is a finding.
Fix: F-58422r986558_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "3" for "NTP Configuration," and then press "Enter". 5. Type "Yes" to "Remove the current NTP servers and enter new information?" and then press "Enter". 6. Type the first NTP server address, and then press "Enter". 7. Type "Yes" to provide a second NTP Server, and then press "Enter". 8. Type the second NTP server address and then press "Enter". 9. Press "Enter" to return to the "Appliance Configuration" menu.
- RMF Control
- Severity
- M
- CCI
- CCI-004926
- Version
- TANS-OS-001100
- Vuln IDs
-
- V-254866
- Rule IDs
-
- SV-254866r986560_rule
Checks: C-58479r866137_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "3" for "NTP Configuration," and then press "Enter". If there is no address listed for "Currently configured ntp servers:", this is a finding. If the "Current NTP Status" does not list a status of "Synchronized to NTP Server (<address>) at stratum #" and "Time correct to within # ms", this is a finding.
Fix: F-58423r866138_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "3" for "NTP Configuration," and then press "Enter". 5. Type "Yes" to "Remove the current NTP servers and enter new information?" and then press "Enter". 6. Type the first NTP server address and then press "Enter". 7. Type "Yes" to provide a second NTP Server, and then press "Enter". 8. Type the second NTP server address and then press "Enter". 8. Press "Enter" to return to the "Appliance Configuration" menu.
- RMF Control
- Severity
- M
- CCI
- CCI-004928
- Version
- TANS-OS-001105
- Vuln IDs
-
- V-254867
- Rule IDs
-
- SV-254867r987876_rule
Checks: C-58480r866140_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "3" for "NTP Configuration," and then press "Enter". If there is no address or only a single address listed for "Currently configured ntp servers:", this is a finding. If the "Currently configured ntp servers:" list is not the organizationally mandated list of geographically distributed time servers, this is a finding.
Fix: F-58424r986561_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "3" for "NTP Configuration," and then press "Enter". 5. Type "Yes" to "Remove the current NTP servers and enter new information?" and press "Enter". 6. Type the first NTP server address and press "Enter". 7. Type "Yes" to provide a second NTP Server, and then press "Enter". 8. Type the second NTP server address, and then press "Enter". 9. Press "Enter" to return to the "Appliance Configuration" menu.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002467
- Version
- TANS-OS-001325
- Vuln IDs
-
- V-254868
- Rule IDs
-
- SV-254868r958864_rule
Checks: C-58481r866143_chk
1. Work with a systems administrator to determine a designated Name Server that performs data integrity checks. 2. Sign in to the TanOS console as a user with the tanadmin role. 3. Enter "A" to go to the "Appliance Configuration" menu. 4. Enter "1" to go to the "Hostname/DNS Configuration" menu. 5. Enter "2", if the ip address shown is not the designated Name Server determined in step 1. This is a finding.
Fix: F-58425r866144_fix
1. Work with a systems administrator to determine a designated Name Server that performs data integrity checks. 2. Sign in to the TanOS console as a user with the tanadmin role. 3. Enter "A" to go to the "Appliance Configuration" menu. 4. Enter "1" to go to the "Hostname/DNS Configuration" menu. 5. Enter "2" and follow the prompts to modify the DNS server configuration.
- RMF Control
- SC-21
- Severity
- M
- CCI
- CCI-002468
- Version
- TANS-OS-001330
- Vuln IDs
-
- V-254869
- Rule IDs
-
- SV-254869r958866_rule
Checks: C-58482r866146_chk
1. Work with a systems administrator to determine a designated Name Server that performs data origin authentic ion checks. 2. Sign in to the TanOS console as a user with the tanadmin role. 3. Enter "A" to go to the "Appliance Configuration" menu. 4. Enter "1" to go to the "Hostname/DNS Configuration" menu. 5. Enter "2", if the ip address shown is not the designated Name Server determined in step 1. This is a finding.
Fix: F-58426r866147_fix
1. Work with a systems administrator to determine a designated Name Server that performs data origin authentic ion checks. 2. Sign in to the TanOS console as a user with the tanadmin role. 3. Enter "A" to go to the "Appliance Configuration" menu. 4. Enter "1" to go to the "Hostname/DNS Configuration" menu. 5. Enter "2" and follow the prompts to modify the DNS server configuration.
- RMF Control
- SC-5
- Severity
- M
- CCI
- CCI-002385
- Version
- TANS-OS-001420
- Vuln IDs
-
- V-254870
- Rule IDs
-
- SV-254870r958902_rule
Checks: C-58483r866149_chk
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "A" to go to the "Appliance Configuration" menu. 3. Enter "A" to go to the "Security" menu. 4. Enter "X" to go to the "Advanced Security" menu. 5. If you see "DOS protection: disabled" in the middle of the screen, this is a finding.
Fix: F-58427r866150_fix
1. Sign in to the TanOS console as a user with the tanadmin role. 2. Enter "A" to go to the "Appliance Configuration" menu. 3. Enter "A" to go to the "Security" menu. 4. Enter "X" to go to the "Advanced Security" menu. 5. Enter "6" to enable DoS protection. The screen updates with an enabled status.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002605
- Version
- TANS-OS-001515
- Vuln IDs
-
- V-254871
- Rule IDs
-
- SV-254871r958940_rule
Checks: C-58484r866152_chk
1. Access the Tanium Server interactively. 2. Check the version number of the installed TanOS release displayed at the bottom of the main menu. 3. Compare to the latest available release on https://kb.tanium.com/Category:TanOS. 4. If the installed release is not the current release, review the release notes for the current release and any other releases newer than the current version to check for security-relevant updates and when they were released. If there are security-relevant updates that have not been installed within the directed time period, this is a finding.
Fix: F-58428r866153_fix
1. Download the target TanOS upgrade file from Tanium. 2. Transfer the upgrade to the SFTP incoming folder on the TanOS appliance. 3. Access the Tanium Server interactively. 4. Press "B" for "Appliance Maintenance Menu," and then press "Enter". 5. Press "3" for "Upgrade TanOS," and then press "Enter". 5b. If this TanOS server is part of an appliance array, type "yes" and then press "Enter" to choose to upgrade all appliances in the array. 6. Press "1" (or the appropriate number if there are multiple upgrade files to select from) to choose the upgrade file to install. 7. Review the upgrade version confirmation and type "Yes" and then press "Enter" to begin the upgrade.
- RMF Control
- SI-2
- Severity
- M
- CCI
- CCI-002607
- Version
- TANS-OS-001520
- Vuln IDs
-
- V-254872
- Rule IDs
-
- SV-254872r958942_rule
Checks: C-58485r866155_chk
1. Access the Tanium Server interactively. 2. Check the version number of the installed TanOS release displayed at the bottom of the main menu. 3. Compare to the latest available release on https://kb.tanium.com/Category:TanOS. 4. If the installed release is not the current release, review the release notes for the current release and any other releases newer than the current version to check for security-relevant updates and when they were released. If there are security-relevant updates that have not been installed within the directed time period, this is a finding.
Fix: F-58429r866156_fix
1. Download the target TanOS upgrade file from Tanium. 2. Transfer the upgrade to the SFTP incoming folder on the TanOS appliance. 3. Access the Tanium Server interactively. 4. Press "B" for "Appliance Maintenance Menu," and then press "Enter". 5. Press "3" for "Upgrade TanOS," and then press "Enter". 5b. If this TanOS server is part of an appliance array, type "yes" and then press "Enter" to choose to upgrade all appliances in the array. 6. Press "1" (or the appropriate number if there are multiple upgrade files to select from) to choose the upgrade file to install. 7. Review the upgrade version confirmation and type "Yes" and then press "Enter" to begin the upgrade.
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000185
- Version
- TANS-OS-001760
- Vuln IDs
-
- V-254873
- Rule IDs
-
- SV-254873r959036_rule
Checks: C-58486r866158_chk
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "X" for "Advanced Security," and then press "Enter". If the FIPS 140-2 setting is currently disabled or persistently disabled, this is a finding.
Fix: F-58430r866159_fix
1. Access the Tanium Server interactively. 2. Log on to the TanOS server with the tanadmin role. 3. Press "A" for "Appliance Configuration Menu," and then press "Enter". 4. Press "A" for "Security," and then press "Enter". 5. Press "X" for "Advanced Security," and then press "Enter". 6. Press "1" for "FIPS 140-2 mode (disabled/enabled)". 7. Type "yes" to confirm enabling FIPS 140-2 Mode, and then press "Enter". 8. Press "Enter" at the confirmation prompt that instructs the user to reboot the appliance. 9. Type "RR" and press "Enter" to return to the root menu. 10. Press "B" for "Appliance Maintenance," and then press "Enter". 11. Press "B" for "Reboot/Shutdown," and then press "Enter". 12. Press "1" for "Reboot the appliance," and then press "Enter". 13. Type "Yes" and then press "Enter" to reboot the appliance and complete the configuration.