UCF STIG Viewer Logo

Tanium endpoint files must be protected from file encryption actions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234044 TANS-CL-000012 SV-234044r612749_rule Medium
Description
Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. That is to say that Antivirus, Encryption, or other security and management stack software may disallow the Client from working as expected. https://docs.tanium.com/platform_install/platform_install/reference_host_system_security_exceptions.html.
STIG Date
Tanium 7.3 Security Technical Implementation Guide 2021-12-20

Details

Check Text ( C-37229r610632_chk )
Consult with the Tanium System Administrator to determine the file-based encryption software used on the Tanium clients.

Review the settings for the file-based encryption software.

Validate exclusions exist which exclude the Tanium program files from being encrypted by the file-based encryption software.

If exclusions do not exist, this is a finding.
Fix Text (F-37194r610633_fix)
Implement excluding policies within the file-based encryption software solution to exclude the file level encryption of the Tanium client program files.