V-253821 | High | Multifactor authentication must be enabled on the Tanium Server for network access with privileged accounts. | The Tanium application must be configured to use multifactor authentication. Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased.... |
V-253875 | High | The Tanium Application, SQL, and Module servers must all be configured to communicate using TLS 1.2 Strict Only. | Disabling feedback to senders when there is a failure in protocol validation format prevents adversaries from obtaining information that would otherwise be unavailable. |
V-253876 | High | The SchUseStrongCrypto registry value must be set. | Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered.
This... |
V-253877 | High | The SSLCipherSuite registry value must be set. | Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered.
This... |
V-253845 | Medium | The Tanium cryptographic signing capabilities must be enabled on the Tanium Server. | All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor... |
V-253823 | Medium | The publicly accessible Tanium application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application. | Display of a standardized and approved use notification before granting access to the publicly accessible application ensures privacy and security notification verbiage used is consistent with... |
V-253847 | Medium | All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory. | Typically, the Tanium Server stores the Package Source Files that it downloads from the internet and server shares or files uploaded through the Tanium Console in a subdirectory of the server's... |
V-253846 | Medium | The Tanium Server must be configured to allow only signed content to be imported. | Changes to any software components can have significant effects on the overall security of the application. Verifying software components have been digitally signed using a certificate that is... |
V-253841 | Medium | The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints. | The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high level of security and reduce the possibility of error for critical operations.
When... |
V-253840 | Medium | Tanium public keys of content providers must be validated against documented trusted content providers. | A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information... |
V-253843 | Medium | Tanium Threat Response must be configured to receive IOC streams only from trusted sources. | Using trusted and recognized IOC sources may detect compromise and prevent systems from becoming compromised. An IOC stream is a series or stream of intel that is imported from a vendor based on a... |
V-253787 | Medium | The Tanium application must manage bandwidth throttles to limit the effects of information flooding types of denial-of-service (DoS) attacks. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity.
In the... |
V-253849 | Medium | Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications. | In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of a Tanium Server. The communication requirements for these Clients are... |
V-253848 | Medium | Firewall rules must be configured on the Tanium Server for client-to-server communications. | In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. Without proper firewall... |
V-253785 | Medium | The Tanium Server and Client applications must have logging enabled. | Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality,... |
V-253782 | Medium | The Tanium application must be configured for LDAP user/group synchronization to map the authenticated identity to the individual user or group account for PKI-based authentication. | Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis. |
V-253783 | Medium | The Tanium application must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users). | Lack of authentication and identification enables nonorganizational users to gain access to the application or possibly other information systems and provides an opportunity for intruders to... |
V-253780 | Medium | The application must, at a minimum, offload interconnected systems in real time and offload standalone systems weekly. | Information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Offloading is a common process in information systems with limited audit storage capacity. |
V-253781 | Medium | Tanium Client processes must be excluded from On-Access scan. | Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software may place on an operating environment. Antivirus, intrusion prevention... |
V-253784 | Medium | The Tanium application must separate user functionality (including user interface services) from information system management functionality. | Application management functionality includes functions necessary for administration and requires privileged user access. Allowing nonprivileged users to access application management... |
V-253830 | Medium | Tanium must notify system administrators and the information system security officer (ISSO) for account removal actions. | When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for identifying the application processes. Sending notification of account... |
V-253831 | Medium | The Tanium application must prohibit user installation, modification, or deletion of software without explicit privileged status. | Allowing regular users to install, modify, or delete software, without explicit privileges, creates the risk that the application performs in a manner inconsistent with its design. Explicit... |
V-253832 | Medium | The Tanium database(s) must be installed on a separate system. | Failure to protect organizational information from data mining may result in a compromise of information.
Data storage objects include, for example, databases, database records, and database... |
V-253833 | Medium | The Tanium application database must be dedicated to only the Tanium application. | Failure to protect organizational information from data mining may result in a compromise of information.
Data storage objects include, for example, databases, database records, and database... |
V-253834 | Medium | The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database. | After the Tanium Server has been installed and the Tanium databases created, only the Tanium Server needs to access the SQL Server database. |
V-253835 | Medium | The Tanium Server installer's account database permissions must be reduced to an appropriate level. | Creating the "tanium" and "tanium_archive" databases through the Tanium Server installer program or using the database to create SQL scripts requires Sysadmin-level permissions. Once the databases... |
V-253836 | Medium | Firewall rules must be configured on the Tanium Server for server-to-database communications. | The Tanium Server can use either a SQL Server relational database management system (RDBMS) installed locally to the same device as the Tanium Server application or a remote dedicated or shared... |
V-253837 | Medium | The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity. | When multifactor authentication is enabled, the Tanium Console will initiate a session lock based on the ActivClient or other smartcard software.
By initiating the session lock, the console will... |
V-253838 | Medium | Tanium Trusted Content providers must be documented. | A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information... |
V-253839 | Medium | Content providers must provide their public key to the Tanium administrator to import for validating signed content. | A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information... |
V-253842 | Medium | The Tanium documentation identifying recognized and trusted indicator of compromise (IOC) streams must be maintained. | Using trusted and recognized IOC sources may detect compromise and prevent systems from becoming compromised. An IOC stream is a series or stream of IOCs that are imported from a vendor based on a... |
V-253786 | Medium | The Tanium application must restrict the ability of individuals to use information systems to launch organization-defined denial-of-service (DoS) attacks against other information systems. | The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high level of security and reduce the possibility of error for critical operations and... |
V-253822 | Medium | Firewall rules must be configured on the Tanium Server for Console-to-Server communications. | An HTML5-based application, the Tanium Console runs from any device with a browser that supports HTML5. For security, the HTTP and SOAP communication to the Tanium Server is SSL encrypted, so the... |
V-253820 | Medium | Documentation identifying Tanium console users and their respective Computer Group rights must be maintained. | System access should be reviewed periodically to verify all Tanium users are assigned the appropriate computer groups, with the least privileged access possible to perform assigned tasks. Users... |
V-253827 | Medium | Tanium must notify the system administrator and information system security officer (ISSO) of account enabling actions. | Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to enable... |
V-253826 | Medium | Tanium must notify system administrators and the information system security officer (ISSO) when accounts are modified. | When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes. Sending notification of... |
V-253825 | Medium | Tanium must notify system administrator and information system security officer (ISSO) when accounts are created. | Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to... |
V-253824 | Medium | The Tanium application must alert the information system security officer and system administrator (at a minimum) in the event of an audit processing failure. | It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an... |
V-253829 | Medium | Tanium must notify system administrators and the information system security officer (ISSO) for account disabling actions. | When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes. Sending notification of... |
V-253828 | Medium | Multifactor authentication must be enabled and enforced on the Tanium Server for all access and all accounts. | To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system.
Organizational... |
V-253788 | Medium | The Tanium application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries. | Any application providing too much information in error messages risks compromising the data and security of the application and system. The structure and content of error messages must be... |
V-253789 | Medium | The Tanium application must reveal error messages only to the information system security officer (ISSO), information system security manager (ISSM), and system administrator (SA). | Only authorized personnel must be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the application.... |
V-253844 | Medium | The Tanium applications must be configured to filter audit records for events of interest based on organization-defined criteria. | The ability to specify the event criteria that are of interest enables those reviewing the logs to quickly isolate and identify these events without having to review entries that are of little or... |
V-253799 | Medium | The Tanium application must electronically verify Personal Identity Verification (PIV) credentials. | The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access.
DoD has mandated the use of the CAC to support identity management and personal authentication... |
V-253798 | Medium | The Tanium application must accept Personal Identity Verification (PIV) credentials. | The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access.
DoD has mandated the use of the CAC to support identity management and personal authentication... |
V-253791 | Medium | The Tanium application must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements. | To ensure applications have a sufficient storage capacity in which to write the audit logs, applications must be able to allocate audit record storage capacity.
The task of allocating audit... |
V-253790 | Medium | The Tanium application must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP). | Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the system components may remain vulnerable to the exploits presented by undetected... |
V-253793 | Medium | The Tanium application must provide an immediate warning to the system administrator and information system security officer (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity. | If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for storage capacity expansion. |
V-253792 | Medium | The Tanium application must offload audit records onto a different system or media than the system being audited. | Information stored in one location is vulnerable to accidental or incidental deletion or alteration.
Offloading is a common process in information systems with limited audit storage capacity. |
V-253795 | Medium | The Tanium application must prohibit user installation of software without explicit privileged status. | Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges... |
V-253794 | Medium | The Tanium application must provide an immediate real-time alert to the system administrator and information system security officer, at a minimum, of all audit failure events requiring real-time alerts. | It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an... |
V-253797 | Medium | The application must employ a deny-all, permit-by-exception (allowlist) policy to allow the execution of authorized software programs. | Using an allowlist provides a configuration management method for allowing the execution of only authorized software. Using only authorized software decreases risk by limiting the number of... |
V-253796 | Medium | The application must enforce access restrictions associated with changes to application configuration. | Failure to provide logical access restrictions associated with changes to application configuration may have significant effects on the overall security of the system.
When dealing with access... |
V-253816 | Medium | The Tanium Application Server must be configured to only use LDAP for account management functions. | Enterprise environments make application account management challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error.
To... |
V-253817 | Medium | Tanium Computer Groups must be used to restrict console users from effecting changes to unauthorized computers. | Computer Groups allow a site running Tanium to assign responsibility of specific Computer Groups to specific Tanium console users. By doing so, a desktop administrator, for example, will not have... |
V-253814 | Medium | The Tanium application must retain the session lock until the user reestablishes access using established identification and authentication procedures. | Unattended systems are susceptible to unauthorized use and should be locked when unattended. This protects critical and sensitive data from exposure to unauthorized personnel with physical access... |
V-253815 | Medium | The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions. | By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational... |
V-253812 | Medium | Tanium Client directory and subsequent files must be excluded from On-Access scan. | Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software may place on an operating environment. Antivirus, intrusion prevention... |
V-253813 | Medium | Tanium endpoint files must be excluded from host-based intrusion prevention system (HIPS) intervention. | Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software may place on an operating environment. Antivirus, intrusion prevention... |
V-253810 | Medium | The ability to uninstall the Tanium Client service must be disabled on all managed clients. | By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uninstalled, the Tanium Server is unable to manage the client and must... |
V-253811 | Medium | The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients. | By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function as designed will be protected from malicious attack and unintentional... |
V-253818 | Medium | Documentation identifying Tanium console users, their respective User Groups, Computer Groups, and Roles must be maintained. | System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate functional role, with the least privileged access possible to perform assigned tasks... |
V-253819 | Medium | The Tanium application must be configured to use Tanium User Groups in a manner consistent with the model outlined in the environment's system documentation. | It is important for information system owners to document authorized User Groups for the Tanium application to avoid unauthorized access to systems. Misaligned implementation of User Groups grants... |
V-253779 | Medium | The Tanium application must be configured to send audit records from multiple components within the system to a central location for review and analysis. | Successful incident response and auditing relies on timely, accurate system information and analysis to allow the organization to identify and respond to potential incidents in a proficient... |
V-253809 | Medium | Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients. | The reliability of the Tanium client's ability to operate depends on controlling access to the Tanium client service. By restricting access to SYSTEM access only, the non-Tanium system... |
V-253808 | Medium | Firewall rules must be configured on the Tanium endpoints for client-to-server communications. | In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. Without proper firewall... |
V-253801 | Medium | The Tanium application must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs). | Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations... |
V-253800 | Medium | The Tanium application must accept Personal Identity Verification (PIV) credentials from other federal agencies. | Access may be denied to authorized users if federal agency PIV credentials are not accepted.
PIV credentials are issued by federal agencies and conform to FIPS Publication 201 and supporting... |
V-253803 | Medium | Tanium Server processes must be excluded from On-Access scan. | Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software may place on an operating environment. Antivirus, intrusion prevention... |
V-253802 | Medium | Tanium must alert the ISSO, ISSM, and other individuals designated by the local organization when the following Indicators of Compromise (IOCs) or potential compromise are detected: real-time intrusion detection; threats identified by authoritative sources (e.g., CTOs); and Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B. | When a security event occurs, the application that has detected the event must immediately notify the appropriate support personnel so they can respond appropriately.
Alerts may be generated... |
V-253805 | Medium | The Tanium endpoint must have the Tanium Server's pki.db in its installation. | Without cryptographic integrity protections in the Tanium Client, information could be altered by unauthorized users without detection.
Cryptographic mechanisms used for protecting the integrity... |
V-253804 | Medium | The Tanium application must authenticate endpoint devices (servers) before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. | Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate... |
V-253807 | Medium | The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server. | All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor... |
V-253806 | Medium | Access to Tanium logs on each endpoint must be restricted by permissions. | For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tanium log files and their directory must be restricted.
Tanium is... |
V-253874 | Medium | The Tanium application service must be protected from being stopped by a nonprivileged user. | Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded... |
V-253870 | Medium | Tanium Comply must be configured to receive Open Vulnerability and Assessment Language (OVAL) feeds only from trusted sources. | OVAL XML documents are provided from several possible sources such as the Community Intercomparison Suite (CIS) open-source repository and vendor/third-party paid repositories. These documents are... |
V-253871 | Medium | The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a denial-of-service (DoS) condition at the server. | DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity.
This... |
V-253872 | Medium | Tanium Server files must be excluded from host-based intrusion prevention intervention. | Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software may place on an operating environment. Antivirus, intrusion prevention... |
V-253873 | Medium | The Tanium application must set an inactive timeout for sessions. | Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By... |
V-253869 | Medium | Tanium Comply must be configured to receive Security Content Automation Protocol (SCAP) content only from trusted sources. | SCAP XML documents validated by the National Institute of Standards and Technology (NIST) are provided from several possible sources such as DISA, NIST, and other nongovernment entities. These... |
V-253868 | Medium | The Tanium documentation identifying recognized and trusted Open Vulnerability and Assessment Language (OVAL) feeds must be maintained. | OVAL XML documents are provided from several possible sources such as the Community Intercomparison Suite (CIS) open-source repository and vendor/third-party paid repositories. These documents are... |
V-253867 | Medium | The Tanium documentation identifying recognized and trusted Security Content Automation Protocol (SCAP) sources must be maintained. | SCAP XML documents validated by the National Institute of Standards and Technology (NIST) are provided from several possible sources such as DISA, NIST, and nongovernment entities. These documents... |
V-253866 | Medium | The Tanium Threat Response Local Directory Source must be configured to restrict access to only authorized maintainers of threat intel. | Using trusted and recognized indicator of compromise (IOC) sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of intel that is imported from a... |
V-253865 | Medium | The Tanium documentation identifying recognized and trusted folders for Threat Response Local Directory Source must be maintained. | Using trusted and recognized indicator of compromise (IOC) sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of IOCs that are imported from a... |
V-253864 | Medium | The Tanium "max_soap_sessions_per_user" setting must be explicitly enabled to limit the number of simultaneous sessions. | Application management includes the ability to control the number of users and user sessions that utilize an application. Limiting the number of allowed users and sessions per user is helpful in... |
V-253863 | Medium | The Tanium "max_soap_sessions_total" setting must be explicitly enabled to limit the number of simultaneous sessions. | Application management includes the ability to control the number of users and user sessions that utilize an application. Limiting the number of allowed users and sessions per user is helpful in... |
V-253862 | Medium | The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server. | Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application must implement cryptographic modules adhering to the higher standards... |
V-253861 | Medium | Tanium Server directory and subsequent files must be excluded from On-Access scan. | Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software may place on an operating environment. Antivirus, intrusion prevention... |
V-253860 | Medium | The Tanium Server certificate must be signed by a DoD certificate authority (CA). | The Tanium Server has the option to use a "self-signed" certificate or a trusted CA signed certificate for SSL connections. During evaluations of Tanium in lab settings, customers often conclude... |
V-253852 | Medium | The Tanium Server directory must be restricted with appropriate permissions. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-253853 | Medium | The Tanium Server http directory and subdirectories must be restricted with appropriate permissions. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-253850 | Medium | The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM Category Assurance List (CAL) and vulnerability assessments. | To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or... |
V-253851 | Medium | The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication. | Restricting this setting limits the user's ability to change their password. Passwords must be changed at specific policy-based intervals; however, if the application allows the user to... |
V-253856 | Medium | Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server. | The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477.... |
V-253857 | Medium | Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications. | The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477.... |
V-253854 | Medium | The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account and the [Tanium Admins] group. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-253855 | Medium | The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-253858 | Medium | Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications. | If using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to the Tanium Server on the core network, the Tanium Zone Server Hub, typically... |
V-253859 | Medium | The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server. | Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application must implement cryptographic modules adhering to the higher standards... |