STIGQter STIGQter: STIG Summary: Tanium 7.3 Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 20 Feb 2019: The Tanium Detect Local Directory Source must be configured to restrict access to only authorized maintainers of Intel.

DISA Rule

SV-102303r1_rule

Vulnerability Number

V-92201

Group Title

SRG-APP-000039

Rule Version

TANS-SV-000049

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Consult with the Tanium System Administrator to determine if the "Detect" module is being used, if not then this is Not Applicable.

Access the Tanium Module Server interactively.

Log on to their server with an account that has administrative privileges.

Open an Explorer window.

Navigate to Program Files >> Tanium >> Tanium Module Server >> services >> detect3-files

Right-click on the folder and choose "Properties".

Select the "Security" tab.

Click on the "Advanced" button.

If the accounts listed in the "Security" tab do not match the list of accounts, with the exception of SYSTEM, remove the additionally listed accounts.

If the accounts listed in the "Security" tab are missing accounts from the documentation, with the exception of SYSTEM, add the additionally listed accounts with a minimum of READ permissions.

Check Contents

Consult with the Tanium System Administrator to determine if the Tanium Detect module is being used, if not then this finding is Not Applicable.

If being used then determine where they get their IOC Stream.

Access the Tanium Module Server interactively.

Log on to the server with an account that has administrative privileges.

Open an Explorer window.

Navigate to Program Files >> Tanium >> Tanium Module Server >> services >> detect3-files

Right-click on the folder and choose "Properties".

Select the "Security" tab.

Click on the "Advanced" button.

If the accounts listed in the "Security" tab do not match the list of accounts found in the Tanium documentation, this is a finding.

Vulnerability Number

V-92201

Documentable

False

Rule Version

TANS-SV-000049

Severity Override Guidance

Consult with the Tanium System Administrator to determine if the Tanium Detect module is being used, if not then this finding is Not Applicable.

If being used then determine where they get their IOC Stream.

Access the Tanium Module Server interactively.

Log on to the server with an account that has administrative privileges.

Open an Explorer window.

Navigate to Program Files >> Tanium >> Tanium Module Server >> services >> detect3-files

Right-click on the folder and choose "Properties".

Select the "Security" tab.

Click on the "Advanced" button.

If the accounts listed in the "Security" tab do not match the list of accounts found in the Tanium documentation, this is a finding.

Check Content Reference

M

Target Key

3505

Comments