STIGQter STIGQter: STIG Summary: Tanium 7.0 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 27 July 2018: The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.

DISA Rule

SV-93295r1_rule

Vulnerability Number

V-78589

Group Title

SRG-APP-000328

Rule Version

TANS-CL-000007

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Using a web browser on a system that has connectivity to Tanium, access the Tanium web UI and log on with CAC.

From the Dashboard, under "Client Service Hardening", click on "Set Client Directory Permissions".

The results will show a "Count" of clients' compliant and non-compliant hardening for the "Tanium Client Directory Permissions".

Non-compliant clients will have a count other than "0" for "Not Restricted" or "Error: No Permissions".

Select each of the "Not Restricted" or "Error: No Permissions" statuses.

Select "Deploy Action".

In the "Deploy Action" dialog box change the package to "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" as the package.

Configure the schedule to repeat at least every hour for the requested action.

Under "Targeting Criteria", in the Action Group select "All Computers" from the drop-down.

Click on "Show preview to continue". Non-compliant systems will be displayed in the bottom.

Click on "Deploy Action".

Verify settings.

Click on "Show Client Status Details".

Check Contents

Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI) and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Administration".

Select the "Scheduled Actions" tab.

Look for a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory".

If a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" does not exist, this is a finding.

If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding.

If the scheduled action exists and has been approved but does not disable the visibility of the client in Add-Remove Programs, this is a finding.

If the action is not configured to repeat at least every hour, this is a finding.

Vulnerability Number

V-78589

Documentable

False

Rule Version

TANS-CL-000007

Severity Override Guidance

Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI) and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Administration".

Select the "Scheduled Actions" tab.

Look for a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory".

If a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" does not exist, this is a finding.

If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding.

If the scheduled action exists and has been approved but does not disable the visibility of the client in Add-Remove Programs, this is a finding.

If the action is not configured to repeat at least every hour, this is a finding.

Check Content Reference

M

Target Key

3215

Comments