Requirements

This page summarizes requirements you must understand before deploying the Tanium Client to endpoints.

Host system requirements

The following table summarizes basic requirements for endpoint host systems where you install the Tanium Client. Hardware resource requirements vary based on the actions that you deploy to the endpoints; consult your technical account manager (TAM) for guidance.

We strongly recommend that all Windows endpoints have the following root certificate authority (CA) certificates because they are required to verify the integrity of the Tanium Client binaries:

  • DigiCert Assured ID Root CA (thumbprint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43)
  • DigiCert High Assurance EV Root CA (thumbprint 5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25)
  • DigiCert SHA2 Assured ID CA (thumbprint E12D2E8D47B64F469F518802DFBD99C0D86D3C6A)
  • DigiCert SHA2 Assured ID Code Signing CA (thumbprint 92C1588E85AF2201CE7915E8538B492F605B80C6)

Table 1:   Supported OS versions for Tanium Client hosts
Operating system OS Version Tanium Client Version
Microsoft Windows Server
  • Windows Server 2019 *
  • Windows Server 2016 *
  • Windows Server 2012, 2012 R2
  • Windows Server 2008, 2008 R2

* Nano Server not supported.

7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
6.0.314.1540
Windows Server 2003, 2003R2 6.0.314.1540
Microsoft Windows Workstation
  • Windows 10
  • Windows 8
  • Windows 7
  • Windows Vista
7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
6.0.314.1540
Windows XP (including Embedded) 6.0.314.1540
macOS
(Intel processor only)
macOS 10.15 Catalina*

* If you enable the app notarization requirement (a security process that Apple introduced in macOS 10.15), you must install Tanium Client 7.2.314.3608 or later.

7.2.314.3608
7.2.314.3518
  • macOS 10.14 Mojave*
  • macOS 10.13 High Sierra
  • macOS 10.12 Sierra
  • OS X 10.11 El Capitan

* See the Tanium™ Support Knowledge Base for the Minimum Tanium product versions required to support endpoints that run macOS 10.14 Mojave.

7.2.314.3608
7.2.314.3518
7.2.314.3476
7.2.314.3236
6.0.314.1579
OS X 10.10 Yosemite 7.2.314.3518
7.2.314.3476
7.2.314.3236
6.0.314.1579
Linux
Amazon Linux 2 LTS (2017.12) 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
Amazon Linux 1 AMI (2016.09, 2017.12, 2018.03) 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
6.0.314.1579
Debian 9.x, 8.x 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
Debian 7.x, 6.x 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
6.0.314.1579
Oracle Enterprise Linux 7.x, 6.x 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
6.0.314.1579
Oracle Enterprise Linux 5.x 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3236
  • Red Hat Enterprise Linux (RHEL) 8.x
  • CentOS 8.x
7.2.314.3584
  • Red Hat Enterprise Linux (RHEL) 7.x, 6.x
  • CentOS 7.x, 6.x
7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
6.0.314.1579
  • Red Hat Enterprise Linux (RHEL) 5.x
  • CentOS 5.x
7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3236
6.0.314.1579
  • SUSE Linux Enterprise Server (SLES) 12
  • openSUSE 12.x
7.2.314.3584
7.2.314.3518
7.2.314.3211
6.0.314.1579
  • SUSE Linux Enterprise Server (SLES) 11.3, 11.4
  • openSUSE 11.3, 11.4
7.2.314.3584
7.2.314.3518
7.2.314.3211
6.0.314.1579
  • SUSE Linux Enterprise Server (SLES) 11.0, 11.1, 11.2
  • openSUSE 11.0, 11.1, 11.2
6.0.314.1442
Ubuntu 18.04 LTS 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
Ubuntu 16.04 LTS 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
6.0.314.1579
Ubuntu 14.04 LTS 7.2.314.3584
7.2.314.3518
7.2.314.3476
7.2.314.3211
6.0.314.1579
Ubuntu 10.04 LTS 6.0.314.1579
AIX
  • IBM AIX 7.2
  • IBM AIX 7.1 TL1SP10 and higher *
  • IBM AIX 6.1 TL7SP10 and higher *

* 64-bit only. Tanium Client 6.0 requires xlC.rte 12.1.0.1 or later, and Tanium Client 7.2 requires xlC.rte 13.1.3.1 or later.

7.2.314.3584
7.2.314.3518
6.0.314.1437
Solaris
  • Oracle Solaris 11 SPARC *
  • Oracle Solaris 11 x86 *
  • Oracle Solaris 10 U8 SPARC or higher *
  • Oracle Solaris 10 U8 x86 or higher *

* Requires SUNWgccruntime.

7.2.314.3584
7.2.314.3518
6.0.314.1321

Admin account

On Windows, the Tanium Client is installed as a service that runs in the context of the Local System account.

On AIX, Linux, macOS, and Solaris, the Tanium Client is installed as a system service. On Linux, the service must run with a User ID (UID) of 0.

Network connectivity and firewall

Tanium components use TCP/IP to communicate over IPv4 networks and IPv6 networks. Tanium Core Platform 7.2 and earlier supports only IPv4. If you need IPv6 support in version 7.3 or later, consult your TAM. You must work with your network administrator to ensure that the Tanium components are provisioned with IP addresses and that DNS can be used to resolve hostnames.

Work with your network security administrator to ensure that the ports that the Tanium Client uses are not blocked. Tanium Clients send and receive data from the Tanium Server and other Tanium Clients over TCP port 17472. Clients dynamically communicate with peers based on proximity and latency. Peer chains form to match an enterprise topology automatically. For example, endpoints in California form one chain, while endpoints in Germany form a separate chain. With this dynamic configuration in mind, you must allow bi-directional TCP communication on port 17472 between clients on the same local area network, but not necessarily between all clients on the internal network.

Host system security exclusions

Some environments use security software to monitor and block unknown host system processes. Work with your network and security team to whitelist Tanium processes. Define exclusions to allow the Tanium™ platform components to operate smoothly and at optimal performance. Typically, this means configuring the security software to exempt the Tanium™ Client installation directories from real-time inspection as well as setting a policy to ignore I/O from the Tanium binaries.

If you use Microsoft Group Policy Objects (GPO) or other central management tools to manage host firewalls, you might need to create rules to allow inbound and output TCP traffic across port 17472 on any managed endpoints.

If running McAfee Host Intrusion Prevention System (HIPS), mark the Tanium Client as both Trusted for Firewall and Trusted for IPS, per McAfee KB71704.

The Tanium Client uses the Windows Update offline scan file, Wsusscn2.cab, to assess computers for installed or missing operating system and application security patches. If your endpoint security solutions scan archive files, refer to the Microsoft KB for information on how to configure those tools to interact appropriately with the Wsusscn2.cab file.

Table 2 lists Tanium Client folders that should be excluded from on-access or real-time scans by antivirus or other host-based security applications. Default values are shown. Include subfolders of these locations when you create the exception rules. If you have changed the defaults, create rules based on the actual locations.

Some Tanium solution modules have their own requirements for the Tanium Client. For details, see Tanium Core Platform Deployment Reference Guide: Host system security exclusions.

Table 2:   Tanium Client installation paths
OS Installation Folder
Windows 32-bit \Program Files\Tanium\Tanium Client\
Windows 64-bit \Program Files (x86)\Tanium\Tanium Client\
macOS /Library/Tanium/TaniumClient
Linux, Solaris, AIX /opt/Tanium/TaniumClient

The following system processes must be allowed (not blocked, quarantined, or otherwise processed):

  • The <Tanium Client>\Tools\StdUtils folder or all the files that it contains (Windows, macOS, Linux)
  • distribute-tools.sh (macOS, Linux)
  • TaniumClient (macOS, Linux, Solaris, AIX)
  • taniumclient (macOS, Linux, Solaris, AIX)
  • TaniumClient.exe (Windows)
  • TaniumExecWrapper (macOS, Linux)

Last updated: 11/13/2019 8:40 AM | Feedback