STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tanium 7.0 Security Technical Implementation Guide

V-241040

CAT II (Medium)

File integrity monitoring of critical executables that Tanium uses must be configured.

Rule ID

SV-241040r961452_rule

STIG

Tanium 7.0 Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-001811

Discussion

Tanium inherently watches files and their respective hash values for change but while Tanium can do file integrity checks of critical executables, it is important to conduct File Integrity Monitoring (FIM) via an outside service such as Host Based Security System (HBSS) or similar security suites with FIM capability. These technologies provide independent monitoring of critical Tanium and system binaries.

Check Content

If the site is using Tanium Integrity Monitor, Tanium Integrity Monitor should be used to monitor the file integrity of Tanium critical files.

If Tanium Integrity Monitor is not installed, a third-party file integrity monitoring tool must be used to monitor Tanium critical executables, defined files within the Tanium Server directory path.

If the file integrity of Tanium critical executables is not monitored, this is a finding.

Fix Text

Implement a file integrity monitoring system to monitor the Tanium critical executable files.