UCF STIG Viewer Logo

The Tanium Module server must be installed on a separate system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-67089 TANS-SV-000023 SV-81579r1_rule Medium
Description
Unauthorized access to the Tanium Server is protected by disabling the Module Server service on the Tanium Server and by configuring the Module Server on a separate system. When X509 smartcard certificates (CAC or PIV tokens) are used for access to the Tanium Server, the Tanium Module server must be on a separate system. In order to restrict access to the Tanium Server resulting from an attack on the Module Server, it is recommended that the Tanium Module Server be installed on a separate system or VM from the Tanium Server. Adding to this recommendation, if the Tanium Server is configured to accept X509 Smartcard certificates (also referred to as CAC or PIV tokens) in lieu of username/password logon, the requirement becomes explicit and the Tanium Module Server must be installed on a separate system or VM.
STIG Date
Tanium 6.5 Security Technical Implementation Guide 2016-09-29

Details

Check Text ( C-67725r1_chk )
Note: If the server being validated is the Module server, this check is Not Applicable.

Access the Tanium Server interactively.

Log on with an account with administrative privileges to the server.

Click “Start” and access Server Manager.

Select Local Server.

Click "Tools".

Select "Services".

If the Tanium Module Server service is "Running", this is a finding.
Fix Text (F-73189r1_fix)
Access the Tanium Server interactively.

Log on with an account with administrative privileges to the server.

Click “Start” and access Server Manager.

Select Local Server.

Click "Tools"

Select "Services".

Disable the Tanium Module Server service.