| Target | CPE Name |
|---|---|
| Tanium 7.3 | cpe:/a:tanium:tanium:7.3 (View CVEs) |
This Tanium 7.3 Security Technical Implementation Guide (STIG) is intended to provide security guidelines for the protection of the Tanium Application and its components, including but not limited to the Tanium Application, Tanium Console, Tanium Module Server, Tanium Clients, and Tanium SQL Database. Tanium 7.3 is a scalable Endpoint Security and Management system. Its foundation is the Tanium Core. Tanium Core includes basic asset inventory, control and utilization monitoring capabilities, and connectors for integrating with third-party systems. Tanium uses a linear peer-to-peer architecture specifically designed for fault tolerance, transient endpoints, and the global Wide Area Network (WAN) segments. It is not a typical peer-to-peer application; only other Tanium endpoints can communicate over the peer-to-peer architecture. The clients communicate with each other over a specific Transmission Control Protocol (TCP) port.
Not provided.
Parties within the DoD and Federal Government’s computing environments can obtain the applicable STIG from the Information Assurance Support Environment (IASE) website. This site contains the latest copies of any STIGs, SRGs, and other related security information. The address for the IASE site is http://iase.disa.mil/.
Not provided.
DoDI 8500.01
Not provided.
Not provided.
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA maintenance release schedule.
disa.stig_spt@mail.mil
Not provided.
Not provided.
Updated to FINAL - 3/25/19 updated status to FINAL - 4/25/19 Updated URLs - 7/12/19 Updated resources per DISA - 1/27/21 null
| URL | Description |
|---|
| Reference URL | Description |
|---|