STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tanium 7.3 Security Technical Implementation Guide

V-234048

CAT II (Medium)

The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.

Rule ID

SV-234048r961131_rule

STIG

Tanium 7.3 Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001084CCI-002142

Discussion

By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational responsibility of the System Administrator for the Windows Operation System Active Directory. Satisfies: SRG-APP-000233, SRG-APP-000317

Check Content

Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console, then click on "Configuration".

Click the down arrow to view Apps.

Find "LDAP Sync".

Verify a sync exists under "Enabled Servers".

If no sync exists, this is a finding.

If sync exists under "Disabled Servers", this is a finding.

Fix Text

Using a web browser on a system that has connectivity to the Tanium Application, access the Tanium Application web user interface (UI) and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console, then click on "Configuration".

Click the down arrow to view Apps.

Find "LDAP Sync".

Click "Add Server".

Complete the settings using guidance from https://docs.tanium.com/platform_user/platform_user/console_using_ldap.html.

Click "Show Preview to Continue".

Review the users and groups to be imported.

Save the configuration.