Getting started

For Tanium as a Service, module installation and upgrades are handled by the service.

Perform the following tasks to get started with Enforce.

Configure action group

By default, the action group is set to All Computers. You can update the action group if needed in the Administration section of Tanium Console. See Tanium Platform User Guide: Managing Computer Groups.

Enforce tools

All policies and sensors require Enforce tools to be deployed to the endpoint. Enforce tools are automatically deployed to all endpoints in the action group.

Upload Anti-malware

In the Enforce > Settings page, select the Anti-Malware tab. Review these settings to determine if you should modify them.

If Enforce has a problem with an anti-malware definition, an Error displays next to the definition under Anti-Malware Definitions Status in the Health section of the Enforce Overview page. View the error reason from Settings > Anti-Malware.

Microsoft System Center Endpoint Protection (SCEP) Installation

Anti-malware policies require that either SCEP or Windows Defender is installed on endpoints. When SCEP installation is enabled, enforcing an Anti-malware policy automatically installs SCEP on endpoints that do not support Windows Defender.

You can choose one of the following:

  • Disable SCEP Installation: This is the default state in Protect. Leave disabled if you are creating Anti-malware SCEP rules and already have SCEP installed on your endpoints.
  • Enable SCEP Installation: Use this option to automatically install SCEP on endpoints that do not support Windows Defender. Once enabled, click Choose Installer or Update Installer to upload an installer file.
  • The Microsoft System Center Configuration Manager includes the SCEP client installation file. For more help locating the SCEP installer, contact your TAM.

Please refer to Microsoft Technet: Endpoint Protection for more information about SCEP.

Next steps

Create Policies

Configure Windows administrative policies for computer groups. See Creating policies.


After policies are configured, create enforcements to apply them to endpoints. See Enforcing policies.