Tanium 7.x Application on TanOS STIG Version Comparison
Tanium 7.x Application on TanOS Security Technical Implementation Guide
Comparison
There are 31 differences between versions v1 r1 (Nov. 18, 2022) (the "left" version) and v2 r2 (April 2, 2025) (the "right" version).
Check TANS-AP-000145 was removed from the benchmark in the "right" version. The text below reflects the old wording.
This check's original form is available here.
Text Differences
Title
The Tanium Threat Response Local Directory Source must be configured to restrict access to only authorized maintainers of Threat Intel.
Check Content
Consult with the Tanium System Administrator to determine if the Tanium Threat Response module is being used. If not, this finding is Not Applicable. If the Local Directory Source type is being used, then determine where they get their IOC Stream. 1. Access the Tanium Module Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Open an Explorer window. 4. Navigate to Program Files >> Tanium >> Tanium Module Server >> Services >> Threat-Response-Files. 5. Right-click on the folder and choose "Properties". 6. Select the "Security" tab. 7. Click "Advanced". If the accounts listed in the Security tab do not match the list of accounts found in the Tanium documentation, this is a finding.
Discussion
Using trusted and recognized IOC sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of intel imported from a vendor based on a subscription service or manually downloaded and placed in a folder. Threat Response can be configured to retrieve the IOC content on a regularly scheduled basis. The items in an IOC stream can be separately manipulated after they are imported.
Fix
1. Access the Tanium Module Server interactively. 2. Log on to the server with an account that has administrative privileges. 3. Open an Explorer window. 4. Navigate to Program Files >> Tanium >> Tanium Module Server >> Services >> Threat-Response-Files. 5. Right-click on the folder and choose "Properties". 6. Select the "Security" tab. 7. Click "Advanced". If the accounts listed in the Security tab do not match the list of accounts, with the exception of SYSTEM, remove the additionally listed accounts. If the accounts listed in the "Security" tab are missing accounts from the documentation, with the exception of SYSTEM, add the additionally listed accounts with a minimum of READ permissions.