STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Tanium 7.x Security Technical Implementation Guide

V-253866

CAT II (Medium)

The Tanium Threat Response Local Directory Source must be configured to restrict access to only authorized maintainers of threat intel.

Rule ID

SV-253866r997288_rule

STIG

Tanium 7.x Security Technical Implementation Guide

Version

V2R3

CCIs

CCI-001414

Discussion

Using trusted and recognized indicator of compromise (IOC) sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of intel that is imported from a vendor based on a subscription service or manually downloaded and placed in a folder. Threat Response can be configured to retrieve the IOC content on a regularly scheduled basis. The items in an IOC stream can be manipulated separately after they are imported.

Check Content

Consult with the Tanium system administrator to determine if the Tanium Threat Response module is being used. If it is not, his finding is not applicable.

If the Local Directory Source type is being used, determine where they get their IOC stream.

1. Access the Tanium Module Server interactively.

2. Log on to the server with an account that has administrative privileges.

3. Open an Explorer window.

4. Navigate to Program Files >> Tanium >> Tanium Module Server >> services >> threat-response-files.

5. Right-click the folder and choose "Properties".

6. Select the "Security" tab.

7. Click the "Advanced" button.

If the accounts listed in the "Security" tab do not match the list of accounts in the Tanium documentation, this is a finding.

Fix Text

1. Access the Tanium Module Server interactively.

2. Log on to the server with an account that has administrative privileges.

3. Open an Explorer window.

4. Navigate to Program Files >> Tanium >> Tanium Module Server >> services >> threat-response-files.

5. Right-click the folder and choose "Properties".

6. Select the "Security" tab.

7. Click the "Advanced" button.

If the accounts listed in the "Security" tab do not match the list of accounts, with the exception of SYSTEM, remove the additionally listed accounts.

If the accounts listed in the "Security" tab are missing accounts from the documentation, with the exception of SYSTEM, add the additionally listed accounts with a minimum of READ permission.