Configuring Appliance security

Manage inbound SSH access rules

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-2 (Appliance Configuration > Security > Manage SSH).

  3. From this menu, you can add or delete rules that restrict SSH access to hosts from specified subnets only.
    • Enter A and follow the prompts to add a new rule.
    • Enter the line number of an existing rule and follow the prompts to delete the rule.

Configure SSH banner text

You can add custom SSH banner text to TanOS.

  1. Use SFTP to copy a file named banner_ssh.txt to the /incoming folder.
  2. Sign in to the TanOS console as a user with the tanadmin role.
  3. Enter A-A (Appliance Configuration > Security).

  4. Enter 3 to add the banner file. ClosedView screen

View SSH fingerprints

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A (Appliance Configuration > Security).

  3. Enter 4 to view the SSH fingerprints. ClosedView screen

Manage inbound HTTPS access rules

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-6 (Appliance Configuration > Security > Manage HTTPS).

  3. From this menu, you can add or delete rules that restrict HTTPS access to hosts from specified subnets only.
    • Enter A and follow the prompts to add a new rule.
    • Enter the line number of an existing rule and follow the prompts to delete the rule.

Configure LDAPS or StartTLS

If you have requirements to use the LDAPS or StartTLS protocol for the LDAP sync connection to the back-end LDAP server, you must import the LDAP server root certificate authority (CA) certificate and then enable the LDAPS/StartTLS configuration. You can import multiple root CA certificates if necessary. The certificates must be in PEM format. On the appliance, you have the option to paste the contents of the LDAP server root CA certificate or import the file. You do not have to do both.

The LDAP server root CA certificate must be able to validate the LDAP server certificate. The subject field of the LDAP server certificate must match the host field in the LDAP configuration.

In a clustered environment, upload the LDAP server CA certificate to both Tanium Servers.

Paste the LDAP server root CA contents

To add multiple CA certificate files, put all certificates in one file and paste them in them in together.

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-A (Appliance Configuration > Security > LDAP CA Certificate Management).

  3. Enter 1 and follow the prompts to paste the contents of the LDAP server root CA certificate file. ClosedView screen
  4. Restart the Tanium Server service. See Start, stop, and restart Tanium services.

Import the LDAP server root CA certificate files

To add multiple CA certificate files, put all certificates in one file and use the Add Certificate option to paste them in together. See Paste the LDAP server root CA contents.

  1. Use SFTP to copy the file to the /incoming directory of the Tanium Server appliance.
  2. Sign in to the TanOS console as a user with the tanadmin role.
  3. Enter A-A-A (Appliance Configuration > Security > LDAP CA Certificate Management).

  4. Enter 2 and follow the prompts to import the LDAP server root CA certificate file.
    • For the file ID, enter a short, unique string that you can use to reference the certificate.
  5. Restart the Tanium Server service. See Start, stop, and restart Tanium services.

Enable/Disable the LDAPS or StartTLS configuration

You can toggle the LDAPS or StartTLS configuration on and off. When disabled, the connection is unencrypted LDAP.

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-A (Appliance Configuration > Security > LDAP CA Certificate Management).

  3. Enter 3 to enable or disable the LDAPS configuration.

Enable/Disable TLS certificate validation

If necessary during troubleshooting, you can disable TLS certificate validation to help you determine if there is a problem with the certificate. After troubleshooting, re-enable certificate validation.

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-A (Appliance Configuration > Security > LDAP CA Certificate Management).

  3. Enter 4 and then E to enable or D to disable TLS certificate validation for connections with the LDAP server, and follow the prompt to restart the Tanium Server service. ClosedView screen

View and manage LDAPS certificates

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-A (Appliance Configuration > Security > LDAP CA Certificate Management).

  3. Enter 5 to list the LDAPS certificates that have been imported. ClosedView screen
  4. Enter the number of a certificate to view its details, delete it, or copy it to a secondary Tanium Server. ClosedView screen

Copy the LDAPS configuration and certificates to another Tanium Server in a Cluster

  1. Sign in to a Tanium Server appliance as a user with the tanadmin role.
  2. Enter A-A-A (Appliance Configuration > Security > LDAP CA Certificate Management).

  3. Enter S to go to the Sync Configuration to Peer TS screen, and follow the prompts to copy the configuration to the other Tanium Server appliance.

The LDAPS configuration and certificates are copied automatically when you add a new Tanium Server to the array.

To copy only an individual certificate, follow the steps in View and manage LDAPS certificates.

Configure security policy rules

The TanOS user access security policy has the following factory settings.

Setting Factory default Description
Password Lifetime Minimum: 0 days

Maximum: 90 days

The minimum sets the minimum number of days between password changes. A value of 0 indicates the password can be changed at any time.

The maximum sets the age at which a current password expires.

Password History 4 most recent The number of most recent passwords to disallow reuse. A setting of 0 allows reuse of any previous passwords.

This setting does not apply to the tanadmin account.

Password Minimum Length 10 characters The minimum number of characters allowed in a password. Valid range is 6 -10 characters.
Password Minimum Characters Changed 0 (disabled) The minimum number of characters in the new password that must not be present in the previous password. 5 is a common practice. STIG requires a minimum of 8. A setting of 0 allows reuse of any character.

This setting does not apply to the tanadmin account.

Login Failure Delay 0 seconds The time, in seconds, between a failed sign in attempt and the next time the prompt is returned to prompt the user for the password.
Expired Passwords Effect Force Password Change Determine the effect on a user account when a password expires. Two options:
  • Disable the user account
  • Force password change on next sign in
Account Lockout Time 900 seconds after 3 failures The number of seconds to lock an account after three consecutive unsuccessful sign in attempts. Valid range is 0-604800 seconds.
Maximum Concurrent Logins 10 The number of concurrent sign in sessions for a user account. A setting of 0 disables remote access.

To modify security policy settings:

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-P (Appliance Configuration > Security > Appliance Configuration Security Policy).

  3. Use the menu to view and edit password, sign in, and lockout rules.

After you modify password policy settings, it is expected that password prompts in TanOS menus provide users with guidance on the updated requirements.

Enable FIPS 140-3 mode

Enabling FIPS mode causes the appliance to use a FIPS-validated cryptographic module for all cryptographic operations. It also ensures that services like SSH use only cryptographic algorithms that FIPS 140-3 allows.

In Tanium Core Platform 7.4.5.1200 and later, enabling FIPS mode in TanOS also puts the Tanium Platform in FIPS mode.

Changing the FIPS mode affects the available ciphers and keys used while connecting to the appliance over SSH. After you change the FIPS mode, the appliance reboots immediately, and you might not be able to use SSH to access the TanOS console until you regenerate SSH keys. Before you change the FIPS mode, make sure you can access the appliance another way, such as through iDRAC or the VM console.

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X (Appliance Configuration > Security > Advanced Security).

  3. Enter 1 and follow the prompts to enable FIPS 140-3 mode and reboot for the changes to take effect. ClosedView screen

    To confirm that FIPS 140-3 mode is enabled after rebooting the appliance, return to the Advanced Security menu (A-A-X). ClosedView screen

    If necessary, regenerate SSH keys for users who access the TanOS console using SSH. See Manage SSH keys.

Use AIDE reporting

Advanced Intrusion Detection Environment (AIDE) is a host-based intrusion detection system (HIDS) for checking the integrity of files. The AIDE solution runs an initialization scan over a set of files and directories in the system and generates a reference snapshot of the environment state. Subsequent scans can be run, and the differences between initial and current scans are reported as differences to be investigated.

The set of files and directories over which the scans are run can be customized in a configuration file. If needed, contact Tanium Support for assistance.

AIDE reports will be very noisy following TanOS upgrades, Tanium role installations, and Tanium solution module or content pack imports or reimports. To mitigate the noise and allow you to track real intrusions, the following workflow is recommended:
  1. Before you perform an upgrade or installation, run an AIDE check report.
  2. Then perform the upgrade or installation.
  3. After the upgrade or installation, run AIDE initialization to reset the AIDE reference. A fresh AIDE report is run automatically at the end of the initialization process.

Enable AIDE

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X-2 (Appliance Configuration > Security > Advanced Security > AIDE).

  3. Enter 1 to initialize AIDE, enable a weekly check report, and run a test check report.

    Note that after initialization, the AIDE menu shows status, schedule, and recent report information. ClosedView screen

Run an AIDE check report

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X-2 (Appliance Configuration > Security > Advanced Security > AIDE).

  3. Enter 2 to run an AIDE check report.

    Note that after the report has been run, the report status is updated. ClosedView screen

Disable the weekly AIDE check report

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X-2 (Appliance Configuration > Security > Advanced Security > AIDE).

  3. Enter 3 to disable the weekly AIDE check report.

    Note that after the disable report operation has been run, the scheduled report status is updated. ClosedView screen

Enable the weekly AIDE check report

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X-2 (Appliance Configuration > Security > Advanced Security > AIDE).

  3. Enter 4 to enable the weekly AIDE check report.

    Note that after the enable report operation has been run, the scheduled report status is updated.

Export the weekly AIDE check report

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X-2 (Appliance Configuration > Security > Advanced Security > AIDE).

  3. Enter 5 to export the weekly AIDE check report to the /outgoing directory. ClosedView screen
  4. Use SFTP to copy the report from /outgoing to your management computer.

Toggle SELinux mode

Security-Enhanced Linux (SELinux) is a set of kernel modifications and user-space tools that make a Linux-based OS more secure.

By default, the SELinux setting is set to enforcing.

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X (Appliance Configuration > Security > Advanced Security).

  3. Enter 4 to toggle the SELinux setting—permissive or enforcing. A reboot is not required.

Set menu timeout

The menu timeout is the amount of time that the TanOS menu system waits for user input. Enable this feature to cancel user sessions after a period of inactivity. The timeout applies to SSH sessions, but not to Tanium Console sessions. This setting takes effect when a user signs in to the appliance. By default, menus do not time out.

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X (Appliance Configuration > Security > Advanced Security).

  3. Enter 5 to set a menu timeout, in seconds. If you want to disable menu timeouts, set the value to 0. ClosedView screen

Toggle Denial of Service protection

Use this setting to add extra protection against Denial of Service (DoS) attacks. By default, this setting is disabled.

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-A-X (Appliance Configuration > Security > Advanced Security).

  3. Enter 6 to enable DoS protection. The screen updates with an enabled status. ClosedView screen

Manage the RAID controller security key

Export the RAID controller security key (physical Tanium Appliance only)

The RAID controller security key is used by the controller to lock and unlock access to encryption-capable physical disks. You can export the key and store it in a safe location. During recovery from controller failure, you will need to provide the key. When you run a Health Check, you might see messages alerting you to export the RAID controller security key.

Boot Check: Pass (EFI Boot)
Active partition: pass (VolGroup1-root)

>>> Hardware health (will take 1-12 seconds) <<<
hardware type: pass (TV-220)
RAID controller RAID.Integrated.1-1 Security Key: pass
disk encryption: pass


>>> RAID Controller Security Key <<<

RAID Security key check: fail (key has NOT been exported)  <-------- 

>>> Tanium Application file Permissions <<<

executed checks: 48
failed checks: 4
new health status setting: warning
  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-X-5 (Appliance Configuration > Advanced Configuration > Export RAID Controller Security Key).

  3. Follow the prompts to export the RAID controller security key to the /outgoing directory. ClosedView screen
  4. Use SFTP to copy the file from the /outgoing directory to your local computer.

Change the RAID controller security key (physical Tanium Appliance only)

You can change the RAID controller key in the event of a failure, but you need to have the existing key decrypted to do so.

This is a lengthy process and can take 10 minutes or more to complete.

Before you begin

The passphrase that is associated with the existing key must be decrypted by Tanium. Contact Tanium Support for assistance.

Change the key with the decrypted previous key

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-X-4 (Appliance Configuration > Advanced Configuration > Change RAID Controller Security Key).

  3. Type Yes to proceed, enter your decrypted previous key, and then type in a new key that meets the password policy requirements. ClosedView screen
  4. Export the new RAID controller security key and download the key immediately from the /outgoing folder through SFTP.

    For export steps, see Export the RAID controller security key (physical Tanium Appliance only).

Manage the grub key (physical Tanium Appliance or virtual Tanium Appliance only)

Export the grub key

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-X (Appliance Configuration > Advanced Configuration).

  3. Enter 6 and follow the prompts to export the grub key to the /outgoing folder. ClosedView screen
  4. Use SFTP to copy the file from the /outgoing directory to your local computer.

Change the grub key password

If necessary, you can regenerate the grub key and password.

  1. Sign in to the TanOS console as a user with the tanadmin role.
  2. Enter A-X (Appliance Configuration > Advanced Configuration).

  3. Enter 7 and follow the prompts to generate a new grub key and export it to the /outgoing folder. ClosedView screen

    For export steps, see Export the grub key.

  4. Use SFTP to copy the file from the /outgoing directory to your local computer.