Configuring Integrity Monitor
If you did not install Client Management with the Apply All Tanium recommended configurations option, you must enable and configure certain features.
When you import Integrity Monitor with automatic configuration, the following default settings are configured:
The following default settings are configured:
Setting | Default value |
---|---|
Action group |
|
Service account |
The service account is set to the account that you used to import the module. Configuring a unique service account for each Tanium solution is an extra security measure to consider in consultation with the security team of your organization. See Configure the Integrity Monitor service account. |
Monitor creation |
A monitor is created for each supported operating system (Windows, Linux, Solaris, and AIX). The Windows monitor is targeted only to Windows Server computer groups: All Windows Server 2008 R2, All Windows Server 2012, All Windows Server 2012 R2, All Windows Server 2016, All Windows Server 2019, and All Windows Server 2022. All other monitors are targeted to the associated All <Operating System> computer group: All Linux If one or more of the targeted operating systems are not used in your environment, delete the associated monitors. |
Monitor deployments | The monitors are deployed to endpoints. |
Watchlist |
A watchlist is created for each supported operating system based on the Critical System Files template for the operating system. The Windows watchlist is targeted only to Windows Server computer groups: All Windows Server 2008 R2, All Windows Server 2012, All Windows Server 2012 R2, All Windows Server 2016, All Windows Server 2019, and All Windows Server 2022. All other watchlists are targeted to the associated All <Operating System> computer group: All Linux If one or more of the targeted operating systems are not used in your environment, delete the associated watchlists. |
Watchlist deployments | The watchlists are deployed to endpoints. |
Prepare Endpoints
(Windows) Configure permission recording
To monitor changes in file permissions, you must configure the Audit File System permission under Local Security Policy on the endpoint.
Endpoints that do not have this permission configured return Recorder - Error: File permission auditing is disabled when you ask a question using the Client Extensions - Status sensor, and they appear in the Endpoint Health panel on the Integrity Monitor Overview page.
To configure the Audit File System permission, complete the following steps. (These steps apply to Windows 10 and might vary for different versions of Windows.)
- From the Control Panel, open Administrative Tools > Local Security Policy.
- Go to Security Settings > Advanced Audit Policy Configuration > System Audit Policies - Local Group Policy Object > Object Access.
- Double-click Audit File System.
- Select Configure the following audit events: and then select Success.
- Click OK.
When you enable the Permission change type for a path in a watchlist, Integrity Monitor automatically configures the appropriate System Access Control List (SACL) audit settings for every file and folder in that path for that watchlist.
Remove legacy Client Recorder Extension
If Client Recorder Extension version 1.x exists on a targeted endpoint, you must remove it before you install Client Recorder Extension version 2.x tools. To target endpoints where Client Recorder Extension version 1.x exists, ask the question: Recorder - Legacy Installed. If the Supported Endpoints column displays Yes, you must remove Client Recorder Extension version 1.x from the endpoint before you install Client Recorder Extension 2.x tools. To remove Client Recorder Extension version 1.x, deploy the Recorder - Remove Legacy Recorder [Operating System] package to targeted endpoints.
Install and configure
Configure Tanium Endpoint Configuration
Manage solution configurations with Tanium Endpoint Configuration
Tanium Endpoint Configuration delivers configuration information and required tools for Tanium Solutions to endpoints. Endpoint Configuration consolidates the configuration actions that traditionally accompany additional Tanium functionality and eliminates the potential for timing errors that occur between when a solution configuration is made and the time that configuration reaches an endpoint. Managing configuration in this way greatly reduces the time to install, configure, and use Tanium functionality, and improves the flexibility to target specific configurations to groups of endpoints.
For information about installing Endpoint Configuration, see Tanium Endpoint Configuration User Guide: Installing Endpoint Configuration.
Optionally, you can use Endpoint Configuration to require approval of configuration changes. When configuration approvals are enabled, Endpoint Configuration does not deploy a configuration change to endpoints until a user with approval permission approves the change. For information about the roles and permissions that are required to approve configuration changes for Client Management, see User role requirements. For more information about enabling and using configuration approvals in Endpoint Configuration, see Tanium Endpoint Configuration User Guide: Managing approvals.
and select Global.
For more information about Endpoint Configuration, see Tanium Endpoint Configuration User Guide.
If you enabled configuration approvals, the following configuration changes must be approved in Endpoint Configuration before they deploy to endpoints:
- Deploying monitors
- Deploying watchlists
- Deploying rules
Configure Integrity Monitor
Configure the Integrity Monitor service account
You must create and configure an Integrity Monitor service account to run several background processes, to configure Endpoint Configuration packages, and integrate with Trends and ServiceNow.
If you imported Client Management with default settings, the service account is set to the account that you used to perform the import. Configuring a unique service account for each Tanium solution is an extra security measure to consider in consultation with the security team of your organization.
This user must be a Tanium Administrator.
The Integrity Monitor Administrator role does not grant all the required privileges for the service account user.
Grant the service account user access to the same computer groups as the Client Management action group for access to any endpoints that are targeted by watchlists and monitors. Otherwise, any time you add a computer group to a watchlist or monitor, you must also assign that computer group to the service account to avoid issues monitoring the endpoints in that computer group.
- From the Integrity Monitor Overview page, click Settings
.
- Click the Service Account tab.
- Enter the User Name and Password for the service account user and click Save.
(Optional) Configure Automatic Deployment on Upgrade
Select Automatic Deployment on Upgrade to automatically deploy monitors, watchlists, and rules after an upgrade. Deployment of each monitor, watchlist, or rule uses the management rights of the last user to deploy the item, but does not use any of that user's persona rights, even if the user changed to a persona to deploy.
Review any tools, watchlists, and monitors deployed to endpoints before you select this option, especially if changes were made since the last deployment.
- From the Integrity Monitor Overview page, click Settings
.
- Click the General Settings tab.
- Select Automatically deploy monitors, watchlists, and rules when upgrading the module and click Save.
(Optional) Configure the Client Management action group
Importing the Client Management module automatically creates an action group to target specific endpoints. If you did not use automatic configuration or you enabled restricted targeting when you imported Client Management, the action group targets No Computers.
If you used automatic configuration and restricted targeting was disabled when you imported Client Management, configuring the Client Management action group is optional.
Select the computer groups to include in the Client Management action group.
- From the Main menu, go to Administration > Actions > Action Groups.
- Click Tanium Client Management.
- Select the computer groups that you want to include in the action group and click Save.
If you select multiple computer groups, choose an operator (AND or OR) to combine the groups.
Organize computer groups
You deploy watchlists and monitors by computer group. Target monitors as broadly as possible, and create more specific groups if you need different settings or intervals for scanning some endpoints. Create specific groups for watchlists, targeted more narrowly to watch only the necessary paths on the necessary endpoints.
When possible, avoid targeting different monitors to computer groups that contain some of the same endpoints. One monitor is deployed to each endpoint. You can prioritize monitors when computer groups overlap, but it is better to create non-overlapping computer groups to use with monitors for a more predictable deployment.
Create relevant computer groups to organize your endpoints for monitor and watchlist targeting. Some options include:
- Applications in use on an endpoint
- Endpoint type, such as servers with a specific function
- Endpoint compliance requirements, such as endpoints that must comply with Payment Card Industry Data Security Standard (PCI DSS) or the Sarbanes-Oxley Act (SOX)
- Endpoint location, such as by country or time zone
- Endpoint priority, such as business-critical machines
- Endpoint configuration needs, such as VDI machines
For more information, see Tanium Core Platform User Guide: Managing computer groups.
Set up Client Management users
You can use the following set of predefined user roles to set up Client Management users.
To review specific permissions for each role, see User role requirements.
For more information about assigning user roles, see Tanium Core Platform User Guide: Manage role assignments for a user.
Client Management Administrator
Assign the Client Management Administrator role to users who manage all configuration and deployment of Client Management functionality to endpoints.
This role can perform the following tasks:
- Configure all Client Management settings, templates, and labels
- Execute scheduled tasks in the Client Management service using the schedule plugin
- Run and apply rules to events
- View, create, edit, and deploy monitors, rules, and watchlists
- Create, edit, and schedule integrations with IT workflows
- Delete labels and event labels
Client Management Operator
Assign the Client Management Operator role to users who manage most configuration and deployment of Client Management functionality to endpoints.
This role can perform the following tasks:
- Configure Client Management settings, templates, and labels
- Run and apply rules to events
- View, create, edit, and deploy monitors, rules, and watchlists
- Create, edit, and schedule integrations with IT workflows
- Delete labels and event labels
Client Management Author
Assign the Client Management Author role to users who manage monitors, rules, and labels in Client Management.
This role can perform the following tasks:
View, create, and edit monitors, rules, and labels
View Integrity Monitor events and settings
Client Management User
Assign the Client Management User role to users who manage event labels and rules in Client Management.
This role can perform the following tasks:
View, create, and edit event labels and rules
View Integrity Monitor monitors, events, labels, and settings
Client Management Read Only User
Assign the Client Management Read Only User role to users who need visibility into Client Management data.
This role can view Client Management Read Only User events, event labels, labels, monitors, rules, and settings.
Client Management Service Account
Assign the Client Management Service Account role to the account that configures system settings for Client Management.
The Integrity Monitor Service Account runs several background processes, which include gathering endpoint statistics, sending labels to Connect, and evaluating rules.
Client Management Endpoint Configuration Approver
Assign the Client Management Author role to a user who approves or rejects Client Management configuration items in Tanium Endpoint Configuration.
Last updated: 9/20/2023 1:48 PM | Feedback