STIGQter STIGQter: STIG Summary: Tanium 7.3 Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 20 Feb 2019: The Tanium enterprise audit log reduction option must be configured to provide alerts based off Tanium audit data.

DISA Rule

SV-102203r1_rule

Vulnerability Number

V-92101

Group Title

SRG-APP-000360

Rule Version

TANS-CN-000023

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI).

Log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Connect".

Click "Create Connection".

In the Source and Destination Section, select "Audit Log" as the Event Source from the drop-down menu.

In the "Destination" section, select "Socket Receiver" from the drop-down menu.

Enter "Destination Name".

Enter "Host".

Enter "Network Protocol".

Enter "Port".

Consult documentation located at https://docs.tanium.com/connect/connect/index.html for reference on configuring other applicable SIEM connections.

Work with the SIEM administrator to configure alerts based on audit failures.

Check Contents

Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI).

Log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Connect".

Review the configured Tanium Sources listed.

If an "Audit Log" source does not exist, this is a finding.

Select the "Audit Log" source.

Select the audit connection found in the lower half of the screen.

Verify the "Destination Type" is a SIEM tool.

If the "Destination Type" is not a SIEM tool, this is a finding.

Vulnerability Number

V-92101

Documentable

False

Rule Version

TANS-CN-000023

Severity Override Guidance

Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI).

Log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Connect".

Review the configured Tanium Sources listed.

If an "Audit Log" source does not exist, this is a finding.

Select the "Audit Log" source.

Select the audit connection found in the lower half of the screen.

Verify the "Destination Type" is a SIEM tool.

If the "Destination Type" is not a SIEM tool, this is a finding.

Check Content Reference

M

Target Key

3505

Comments