Comply requirements

Review the requirements before you install and use Comply.

Tanium dependencies

In addition to a license for Comply, make sure that your environment meets the following requirements.

ComponentRequirement
Tanium Core Platform
  • 7.2.314.2831 or later
  • 7.3.314.3668 or later
  • 7.4.1.1939 or later
Taniumâ„¢ ClientSee Tanium Client User Guide: Requirements for the supported Tanium Client versions for each operating system.
Computer groups (Tanium Core Platform 7.4.2 or later only) When you first log into the Tanium Console after installing the Tanium Server, the server automatically imports the computer groups that Comply requires:
  • All Computers
  • All Windows 10
  • All Windows Server 2012 R2
  • All Windows Server 2016
  • All Windows Server 2019
  • All Red Hat 7
  • All Red Hat 8
  • All Ubuntu 18
  • All Ubuntu 19
  • All CentOS 7
  • All CentOS 8
  • All macOS 10.14
  • All macOS 10.15

Endpoints

Supported operating systems

The following endpoint operating systems are supported with Comply.

Operating systemOS version
Microsoft Windows ServerMicrosoft Windows Server 2008 and later
Microsoft Windows WorkstationMicrosoft Windows 7 and later
macOSOS X 10.11 El Capitan and later
Linux
Debian 6 and later
Red Hat Enterprise Linux (RHEL) 5.x and later
CentOS 5.x and later
Ubuntu 12.04 and later
AIX1IBM AIX 6.1 TL7SP10 and later2
IBM AIX 7.1 TL1SP10 and later2
IBM AIX 7.2
Solaris1Oracle Solaris 10 SPARC3
Oracle Solaris 10 x863
Oracle Solaris 11 SPARC3
Oracle Solaris 11 x863

1 Only Configuration Compliance reports are supported on AIX and Solaris endpoints.

2 64-bit only.

3 Requires SUNWgccruntime. You must use the CIS-CAT engine to run a compliance report that uses CIS benchmarks. You can use the Tanium Scan Engine (powered by JovalCM) to run a compliance report that uses the DISA SCAP Solaris benchmarks.

Scan engines

Scan engines are used to evaluate OVAL or SCAP content and generate configuration compliance and vulnerability reports. At least one scan engine is required to use Comply.

Comply 2.3 and later includes Tanium Scan Engine (powered by JovalCM) and Amazon Coretto Java Runtime Environment (JRE). If you want to use this scan engine and JRE (or the existing JREs on endpoints), you do not need to upload any engines.

If you want to use a different scan engine or JRE, you can upload them to Comply. Tanium Scan Engine (which is included by default), CIS-CAT, and SCC scan engines are currently supported by Comply.

The supported versions of the scan engines are listed in the Import Engine window. Typically the most recent version plus the two previous versions are supported.

CIS-CAT and Tanium Scan Engine also require PowerShell and do not work if PowerShell is in the ConstrainedLanguage language mode.

Operating systemOperating system versionSupported JRE distributions and versionsCan deploy using Comply?
  Microsoft Windows ServerMicrosoft Windows Server 2008Java version 8 distributions provided by Oracle.Yes
Microsoft Windows Server 2012 and later
  • JRE provided with Comply
  • Java version 8 distributions provided by either Oracle or Amazon.
Yes
Microsoft Windows WorkstationMicrosoft Windows 7 and later
  • JRE provided with Comply
  • Java version 8 distributions provided by either Oracle or Amazon.
Yes
macOSOS X 10.11 El Capitan and later
  • JRE provided with Comply
  • Java version 8 distributions provided by either Oracle or Amazon.
Yes
LinuxDebian 5, 6, 7Java version 7 or 8 (preferred) distributions provided by OracleYes4
Debian 8 and later
  • JRE provided with Comply
  • Java version 8 distributions provided by either Oracle or Amazon.
Yes
Red Hat Enterprise Linux (RHEL) 5.xJava version 7 or 8 (preferred) distributions provided by OracleYes4
Red Hat Enterprise Linux (RHEL) 6.x and later
  • JRE provided with Comply
  • Java version 8 distributions provided by either Oracle or Amazon.
Yes
CentOS 5.xJava version 7 or 8 (preferred) distributions provided by OracleYes4
CentOS 6.x and later
  • JRE provided with Comply
  • Java version 8 distributions provided by either Oracle or Amazon.
Yes
Ubuntu 12.04 - 13.xJava version 7 or 8 distributions provided by OracleYes4
Ubuntu 14.x and later
  • JRE provided with Comply
  • Java version 8 distributions provided by either Oracle or Amazon.
Yes
AIX1IBM AIX 6.1 TL7SP10 and later2IBM JRE version 7.x or 8 (preferred)Yes3
IBM AIX 7.1 TL1SP10 and later2IBM JRE version 7.x or 8 (preferred)Yes3
OpenJDK JRE version 7 or 8 with the HotSpot JVM.Yes4
IBM AIX 7.2IBM JRE version 7.x or 8 (preferred)Yes3
OpenJDK JRE version 7 or 8 with the HotSpot JVM. Yes4
Solaris5Oracle Solaris 10 SPARCOracle JRE 7 or 8 (preferred)No
Oracle Solaris 10 x862Oracle JRE 7 or 8 (preferred)Yes6
Oracle Solaris 11 SPARCOracle JRE 7 or 8 (preferred)No
Oracle Solaris 11 x862Oracle JRE 7 or 8 (preferred)Yes6

1The IBM JRE is usually already installed on AIX endpoints. Supported versions can be used with Comply scans.

264-bit only.

3Only IBM JRE 8 64-bit is supported for deployment through Comply. You must repackage the JRE before it can be deployed through Comply. For details, see Repackage the IBM JRE for deployment to AIX endpoints.

4Only version 8 is supported for deployment through Comply. Check the OpenJDK release site for supported service pack levels for a particular OpenJDK JRE release: AdoptOpenJDK: Latest release.

5The Oracle JRE is usually already installed on Solaris endpoints. Supported versions can be used with Comply scans.

6Only version 8 is supported for deployment through Comply.

For more information, see Working with scan engines and JREs.

Host and network security requirements

Specific ports and processes are needed to run Comply.

Security exclusions

If security software is in use in the environment to monitor and block unknown host system processes, your security administrator must create exclusions to allow the Tanium processes to run without interference.

Table 1:   Comply security exclusions
Target DeviceProcess
Module Server<Module Server>\services\comply-service\node.exe
<Module Server>\services\comply-service\node_modules\ovalindex\ovalindex.exe
Windows endpoints<Tanium Client>\Tools\Comply\TaniumExecWrapper.exe
<Tanium Client>\Tools\Comply\jre\bin\java.exe
<Tanium Client>\Tools\Comply\7za.exe
Linux/macOS/AIX endpoints <Tanium Client>/Tools/Comply/TaniumExecWrapper
<Tanium Client>/Tools/Comply/jre/bin/java
<Tanium Client>/Tools/Comply/7za
<Tanium Client>/Tools/Comply/xsltproc
Tanium Scan Engine<Tanium Client>/Tools/Comply/joval/Joval4Tanium.jar
<Tanium Client>/Tools/Comply/joval/Joval-Utilities.jar
CIS-CAT engine<Tanium Client>/Tools/Comply/cis-cat/CIS-CAT.jar
<Tanium Client>/Tools/Comply/cis-cat/CIS-CAT.sh (Linux only)
<Tanium Client>/Tools/Comply/cis-cat/CIS-CAT.BAT (Windows only)
SCC engine - Windows endpoints<Tanium Client>\Tools\Comply\scc\cscc.exe
<Tanium Client>\Tools\Comply\scc\cscc32.exe
<Tanium Client>\Tools\Comply\scc\cscc64.exe
<Tanium Client>\Tools\Comply\scc\scc.exe
<Tanium Client>\Tools\Comply\scc\scc32.exe
<Tanium Client>\Tools\Comply\scc\scc64.exe
SCC engine - Linux/macOS endpoints<Tanium Client>/Tools/Comply/scc/cscc
<Tanium Client>/Tools/Comply/scc/cscc.bin
<Tanium Client>/Tools/Comply/scc/scc
<Tanium Client>/Tools/Comply/scc/scc.bin

For remote vulnerability reports, see Tanium Discover User Guide: Host and network security requirements for Nmap security exclusions.

For best results, add a recursive security exclusion for the Tanium Client directory:

  • Windows endpoints: <Tanium Client>

    This path is usually C:\Program Files (x86)\Tanium\Tanium Client.

  • Linux endpoints: /opt/Tanium/TaniumClient

If a recursive exclusion is not possible, ensure that your exclusion for the TaniumExecWrapper process includes child processes. The path to this process is listed for each operating system in the preceding table. Some engines use child processes to run scans, and those child processes must be allowed for Comply to function.

Consult your Technical Account Manager (TAM) to confirm that the appropriate security exclusions are in place in your environment.

User role requirements

Table 2:   Comply user role permissions
PrivilegeComply AdministratorComply Deployment AdministratorComply Report Content AdministratorComply Report AdministratorComply Report ReviewerComply Custom Check Writer
Show Comply
View the Comply workbench

1

1

1

1

1

1
Comply Admin
Comply Report Read
Review report results.

1



1


Comply Report Write
Manage reports.

1





Comply Report Content Read
Read benchmarks, custom checks, custom ID mappings, custom profiles, and vulnerability sources.

1

1

1

1

1

Comply Report Content Write
Manage benchmarks, vulnerability sources, custom ID mappings, and custom profiles.

1





Comply Deployment Read
11
Comply Deployment Write
Manage deployments and engines.

1





Comply Custom Check Write
Manage custom checks.

1





1 Denotes an implicit permission that is provided by a privilege with a higher permission level. For example, a write permission provides an implicit read permission.





Table 3:   Provided Comply Advanced user role permissions for Tanium 7.1.314.3071 or later
PermissionContent Set for PermissionComply AdministratorComply Deployment AdministratorComply Report Content AdministratorComply Report AdministratorComply Report ReviewerComply Custom Check Writer
Ask Dynamic Questions 
Read SensorReserved
Read SensorComply Deployment
Read SensorComply Reporting
Read ActionComply Deployment
Read ActionComply Reporting
Write ActionComply Deployment
Write ActionComply Reporting
Write Action For Saved QuestionComply Reporting
Execute PluginComply
Write PackageComply Deployment
Write PackageComply Reporting
Read Saved QuestionComply Reporting
Write Saved QuestionComply Deployment
Write Saved QuestionComply Reporting