UCF STIG Viewer Logo

Tanium endpoint files must be protected from file encryption actions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-66993 TANS-CL-000012 SV-81483r1_rule Medium
Description
Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. That is to say that Antivirus, Encryption, or other security and management stack software may disallow the Client from working as expected. https://kb.tanium.com/Security_Software_Exceptions
STIG Date
Tanium 6.5 Security Technical Implementation Guide 2016-09-29

Details

Check Text ( C-67629r1_chk )
Consult with the Tanium System Administrator to determine the file encryption software used on the Tanium clients.

Review the settings for the file encryption software.

Validate exclusions exist which exclude the Tanium program files from being encrypted by the file encryption software.

If exclusions do not exist, this is a finding.
Fix Text (F-73093r1_fix)
Implement excluding policies within the file encryption software solution to exclude the file level encryption of the Tanium program files.