STIGQter STIGQter: STIG Summary: Tanium 7.0 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 27 July 2018:

A Tanium connector must be configured to send log data to an external audit log reduction-capable system and provide alerts.

DISA Rule

SV-93409r1_rule

Vulnerability Number

V-78703

Group Title

SRG-APP-000358

Rule Version

TANS-SV-000029

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Using a web browser on a system that has connectivity to Tanium, access the Tanium web UI and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Connect".

Click "Create Connection".

In the Source and Destination section, select "Audit Log" as the Event Source from the drop-down menu.

In the Destination section, select "Socket Receiver" from the drop-down menu.

Enter "Destination Name", "Host", "Network Protocol", and "Port".

Consult documentation located at https://docs.tanium.com/connect/connect/index.html for reference on configuring other applicable SIEM connections.

Check Contents

Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI) and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Connect".

Review the configured Tanium Sources listed.

If an "Audit Log" Source does not exist, this is a finding.

Select the "Audit Log" source.

Select the audit connection found in the lower half of the screen.

Verify the "Destination Type" is a SIEM tool.

If the "Destination Type" is not a SIEM tool, this is a finding.

Vulnerability Number

V-78703

Documentable

False

Rule Version

TANS-SV-000029

Severity Override Guidance

Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI) and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Connect".

Review the configured Tanium Sources listed.

If an "Audit Log" Source does not exist, this is a finding.

Select the "Audit Log" source.

Select the audit connection found in the lower half of the screen.

Verify the "Destination Type" is a SIEM tool.

If the "Destination Type" is not a SIEM tool, this is a finding.

Check Content Reference

M

Target Key

3215

Comments