STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tanium 7.x Application on TanOS Security Technical Implementation Guide

V-254932

CAT II (Medium)

The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.

Rule ID

SV-254932r961317_rule

STIG

Tanium 7.x Application on TanOS Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-002165

Discussion

By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function as designed will be protected from malicious attack and unintentional modifications by end users.

Check Content

1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication.

2. Click "Administration" on the top navigation banner.

3. Under Actions, select "Scheduled Actions".

4. Look for a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory".

If a scheduled action titled "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" does not exist, this is a finding.

If the scheduled action exists, select it and if it is not approved (the "Approve" button at the top of the section will be displayed if not approved), this is a finding.

If the scheduled action exists and has been approved but does not disable the visibility of the client in Add-Remove Programs, this is a finding.

If the action is not configured to repeat at least every hour, this is a finding.

If the scheduled action is not targeted at an "All Computers" Action Group, this is a finding.

Fix Text

1. Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with multi-factor authentication. 

2. Click "Modules" on the top navigation banner. 

3. Click "Interact". 

4. In the "Categories" section, select "Client Service Hardening".

5. In the "Dashboard" section, select "Set Client Directory Permissions".

The results will show a "Count" of clients' compliant and noncompliant hardening for the "Tanium Client Directory Permissions".

Noncompliant clients will have a count other than "0" for "Not Restricted" or "Error: No Permissions".

6. Select each of the "Not Restricted" or "Error: No Permissions." Statuses.

7. Select "Deploy Action".

8. In the "Deploy Action" dialog box, change the package to "Client Service Hardening - Set SYSTEM only permissions on the Tanium Client directory" as the package.

9. Configure the schedule to repeat at least every hour for the requested action.

10. Under "Targeting Criteria", in the Action Group, select "All Computers" from the drop-down.

11. Click "Show preview to continue". Noncompliant systems will be displayed in the bottom.

12. Click "Deploy Action".

13. Verify settings.

14. Click "Show Client Status Details".