Configuring Patch

If you did not install Patch with the Apply All Tanium recommended configurations, you must enable and configure certain features.

(Tanium Core Platform 7.4.5 or later only) You can set the Patch action group to target the No Computers filter group by enabling restricted targeting before adding Patch to your Tanium licenseimporting Patch. This option enables you to control tools deployment through scheduled actions that are created during the import and that target the Tanium Patch action group. For example, you might want to test tools on a subset of endpoints before deploying the tools to all endpoints. In this case, you can manually deploy the tools to an action group that you configured to target only the subset. To configure an action group, see Tanium Console User Guide: Managing action groups. To enable or disable restricted targeting, see Tanium Console User Guide: Dependencies, default settings, and tools deployment.

When you import Patch with automatic configuration, the following default settings are configured:

The following default settings are configured for Patch:

Setting Default value
Action group
  • Restricted targeting disabled (default): Patch Supported Systems computer group
  • Restricted targeting enabled: No Computers computer group
Service account

The service account is set to the account that you used to import the module.

Configuring a unique service account for each Tanium solution is an extra security measure to consider in consultation with the security team of your organization. See Configure service account.

Platform settings

The following platform settings are configured for optimal delivery of larger payloads:

  • ClientCacheLimitInMB = 2048
  • HotCachePercentage = 80
Patch computer groups

Computer groups that Patch requires are imported:

  • All Amazon
  • All CentOS 6
  • All CentOS 7
  • All Centos 8
  • All Oracle 6
  • All Oracle 7
  • All Oracle 8
  • All Red Hat 6
  • All Red Hat 7
  • All Red Hat 8
  • All OpenSLES 11
  • All OpenSLES 12
  • All OpenSLES 15
  • All SUSE
  • All Mac
  • All macOS 10.14
  • All macOS 10.15
  • All macOS 11
  • All macOS 11.0
  • All macOS 11.1
  • All macOS 11.2
  • All macOS 11.3
  • All macOS 11.4
  • All macOS 11.5
  • All macOS 11.6
  • All macOS 11.7
  • All macOS 12
  • All Windows
  • All Windows Servers
  • Patch Supported Systems
Patch scans
  • Tanium Scan for Windows is configured and synchronized.

  • Default scan configurations are created for each operating system and enforced by the recommended computer group.

Tanium Scan does not include any Red Hat repositories because authentication for cdn.redhat.com must first be configured. For more information, see (Red Hat endpoints) Configure TDownloader to use certificate authentication.

Patch lists
  • A [Patch Baseline Deployment] - Windows default baseline deployment patch list is created for Windows endpoints.
  • Default reporting patch lists are created for each supported operating system.
Patch block lists
  • The [Global Block List] - Windows block list is created and targets the All Windows computer group. This block list excludes Security Only patches on Windows systems. For more information, see Microsoft update and servicing details.
  • Default block lists are created for each supported operating system, but are not targeted.
Patch deployment templates

Default deployment templates are created for each supported operating system.

Patch maintenance windows
  • A [Patch Tuesday] - Windows default maintenance window is created for Patch Tuesday and is not enforced on any computer groups.
  • Default maintenance windows are created for each supported operating system to block patch installations and reboots without first enabling another maintenance window. These maintenance windows are not enforced to any computer groups.

Configure platform settings

You can configure the Tanium platform for optimal delivery of larger payloads, which are typically associated with patching activity.

  1. From the Main menu, go to Administration > Configuration > Platform Settings.
  2. To increase the client cache size, click Create Setting, provide the following information, and click Save.
    Setting Type: Client
    Name: ClientCacheLimitInMB
    Value Type: Numeric
    Value 2048
  3. To increase the hot cache percentage, click Create Setting, provide the following information, and click Save.
    Setting TypeClient
    Name: HotCachePercentage
    Value Type: Numeric
    Value 80

Changes to platform settings can take up to five hours to propagate to clients.

Install and configure Configure Tanium End-User Notifications

With the Tanium End-User Notifications solution, you can create a notification message with your deployment to notify the user that the system is going to restart, and give the user the option to postpone the restart.

(macOS) Patch installations do not occur until the user clicks Restart Now or the restart is forced at the deadline for patches that require a reboot. This functionality helps end users avoid waiting a long time for an OS upgrade after a manual reboot. Instead, end users can be more aware of larger updates and decide when to restart endpoints.

For more information, see Tanium End-User Notifications User Guide: End-User Notifications overview.

Disable Windows Update restart prompts

The Windows Update Agent automatically prompts users to restart their machine when an update is installed from any user or source. The following Windows Local/Group Policies should be configured to allow Tanium End-User Notifications to control endpoint restarts.

  1. In the Windows Local Group Policy Editor, go to Computer Configuration > Administrative Templates > Windows Components > Windows Update.
  2. Enable the No auto-restart for scheduled Automatic Updates installations parameter.
  3. Disable the Re-prompt for restart with scheduled installations parameter.

Install and configure Configure Tanium Endpoint Configuration

Manage solution configurations with Tanium Endpoint Configuration

Tanium Endpoint Configuration delivers configuration information and required tools for Tanium Solutions to endpoints. Endpoint Configuration consolidates the configuration actions that traditionally accompany additional Tanium functionality and eliminates the potential for timing errors that occur between when a solution configuration is made and the time that configuration reaches an endpoint. Managing configuration in this way greatly reduces the time to install, configure, and use Tanium functionality, and improves the flexibility to target specific configurations to groups of endpoints.

Endpoint Configuration is installed as a part of Tanium Client Management. For more information, see the Tanium Client Management User Guide: Installing Client Management.

Additionally you can use Endpoint Configuration to manage configuration approval. For example, configuration changes are not deployed to endpoints until a user with approval permission approves the configuration changes in Endpoint Configuration. For more information about the roles and permissions that are required to approve configuration changes for Patch, see User role requirements.

To use Endpoint Configuration to manage approvals, you must enable configuration approvals.

  1. From the Main menu, go to Administration > Shared Services > Endpoint Configuration to open the Endpoint Configuration Overview page.
  2. Click Settings and click the Global tab.
  3. Select Enable configuration approvals, and click Save.

For more information about Endpoint Configuration, see Tanium Endpoint Configuration User Guide.

If you enabled configuration approvals, the following configuration changes must be approved in Endpoint Configuration before they deploy to endpoints:

  • Creating, updating, or deleting patch lists
  • Adding or removing enforcements
  • Removing all enforcements
  • Updating scan configuration priorities
  • Creating deployments
  • Stopping deployments
  • Adding targets to deployments
  • User-initiated actions, such as initializing endpoints, uploading custom field files, enabling Linux

Configure Patch

Configure service account

The service account is a user that runs several background processes for Patch. This user requires the Tanium Administrator or Patch Service Account role. If you installed Tanium Client Management, Endpoint Configuration is installed, and by default, configuration changes initiated by the module service account (such as tool deployment) require approval. You can bypass approval for module-generated configuration changes by applying the Endpoint Configuration Bypass Approval permission to this role and adding the relevant content sets. For more information, see Tanium Endpoint Configuration User Guide: User role requirements. For more information about Patch permissions, see User role requirements.

If you imported Patch with default settings, the service account is set to the account that you used to perform the import. Configuring a unique service account for each Tanium solution is an extra security measure to consider in consultation with the security team of your organization.

  1. On the Patch Overview page, click Settings and then click Service Account if needed.
  2. Provide a user name and password, and then click Save.

Organize computer groups

One way to apply patches and view deployment results is by computer group. Create relevant computer groups to organize your endpoints. Some options include:

  • Endpoint type, such as servers or employee workstations
  • Endpoint location, such as by country or time zone
  • Endpoint priority, such as business-critical machines
  • Endpoint configuration needs, such as VDI machines

Manual computer groups are not supported in Patch. For more information, see Tanium Core Platform User Guide: Managing computer groups.

Organize computer groups by operating system generation for useful visibility and scan configuration targeting.

Computer group Filter Purpose
All Windows1 Is Windows equals True
  • Visibility
  • Scan configuration targeting

All Windows Servers1 Windows OS Type equals Windows Server
  • Visibility
  • Scan configuration targeting
All Windows Servers - Physical Windows OS Type contains windows and Is Virtual equals no Scan configuration targeting
All Windows Servers - Virtual Windows OS Type contains windows and Is Virtual equals yes Scan configuration targeting
All Windows Workstations Windows OS Type equals Windows Workstation Scan configuration targeting
All Windows Workstations - Physical Windows OS Type contains windows workstation and Is Virtual equals no Scan configuration targeting
All Windows Workstations - Virtual Windows OS Type contains windows workstation and Is Virtual equals yes Scan configuration targeting
All CentOS 61 Operating System Generation equals CentOS 6
  • Visibility
  • Scan configuration targeting
All CentOS 71 Operating System Generation equals CentOS 7
  • Visibility
  • Scan configuration targeting
All CentOS 81 Operating System Generation equals CentOS 8
  • Visibility
  • Scan configuration targeting
All Red Hat 61 Operating System Generation equals Red Hat Enterprise Linux 6
  • Visibility
  • Scan configuration targeting
All Red Hat 71 Operating System Generation equals Red Hat Enterprise Linux 7
  • Visibility
  • Scan configuration targeting
All Red Hat 81 Operating System Generation equals Red Hat Enterprise Linux 8
  • Visibility
  • Scan configuration targeting
All Oracle 61 Operating System Generation equals Oracle Linux Server 6
  • Visibility
  • Scan configuration targeting
All Oracle 71 Operating System Generation equals Oracle Linux Server 7
  • Visibility
  • Scan configuration targeting
All Oracle 81 Operating System Generation equals Oracle Linux Server 8
  • Visibility
  • Scan configuration targeting
All Amazon1 Operating System Generation equals Amazon Linux
  • Visibility
  • Scan configuration targeting
All Amazon Linux 1 Operating System Generation equals Amazon Linux 1
  • Visibility
  • Scan configuration targeting
All Amazon Linux 2 Operating System Generation equals Amazon Linux 2
  • Visibility
  • Scan configuration targeting
All SUSE1 Operating System contains SUSE
  • Visibility
  • Scan configuration targeting
All SLES 111 Operating System Generation contains SUSE Linux Enterprise Server 11
  • Visibility
  • Scan configuration targeting
All SLES 121 Operating System Generation contains SUSE Linux Enterprise Server 12
  • Visibility
  • Scan configuration targeting
All SLES 151 Operating System Generation contains SUSE Linux Enterprise Server 15
  • Visibility
  • Scan configuration targeting

All Mac

Is Mac equals True
  • Visibility
  • Scan configuration targeting
All macOS 10.14 Operating System Generation equals macOS 10.14
  • Visibility
  • Scan configuration targeting
All macOS 10.15 Operating System Generation equals macOS 10.15
  • Visibility
  • Scan configuration targeting
All macOS 11 Operating System Generation contains macOS 11
  • Visibility
  • Scan configuration targeting
All macOS 11.0 Operating System Generation contains macOS 11.0
  • Visibility
  • Scan configuration targeting
All macOS 11.1 Operating System Generation contains macOS 11.1
  • Visibility
  • Scan configuration targeting
All macOS 11.2 Operating System Generation contains macOS 11.2
  • Visibility
  • Scan configuration targeting
All macOS 11.3 Operating System Generation contains macOS 11.3
  • Visibility
  • Scan configuration targeting
All macOS 11.4 Operating System Generation contains macOS 11.4
  • Visibility
  • Scan configuration targeting
All macOS 11.5 Operating System Generation contains macOS 11.5
  • Visibility
  • Scan configuration targeting
All macOS 11.6 Operating System Generation contains macOS 11.6
  • Visibility
  • Scan configuration targeting
All macOS 11.7 Operating System Generation contains macOS 11.7
  • Visibility
  • Scan configuration targeting
All macOS 12 Operating System Generation contains macOS 12
  • Visibility
  • Scan configuration targeting
Tanium Scan Supported Windows Windows OS Major Version > 6.0 and Tanium Client Version >= 7.2.314.3211
  • Visibility
  • Scan configuration targeting
All Supported Linux1 Operating System Generation matches "(Amazon Linux(1|2)|(Oracle Linux Server (6|7))|(Red Hat Enterprise Linux.*(6|7))|(CentOS (6|7))"
  • Visibility
  • Scan configuration targeting
Patch Supported Systems1 Patch - Supported Scan Types matches ".*(Repo|Tanium|CAB|Online).*"
  • Visibility
  • Patch action group
1 Patch creates this computer group if you select the Apply All Tanium recommended configurations option during installation on Tanium Core Platform 7.4.2 or later.This computer group is created by default.

Add computer groups to Patch action group

Importing the Patch module automatically creates an action group to target specific endpoints. Select the computer groups to include in the Patch action group. By default, Patch targets No Computers.

Deselect No Computers and ensure that all operating systems that are supported by Patch are included in the Patch action group.

  1. From the Main menu, go to Administration > Actions > Action Groups.
  2. Click Patch.
  3. Select the computer groups that you want to include in the action group and Click Save.
    If you select multiple computer groups, choose an operator (AND or OR) to combine the groups.

(Tanium Core Platform 7.4.5 or later only) You can set the Patch action group to target the No Computers filter group by enabling restricted targeting before adding Patch to your Tanium licenseimporting Patch. This option enables you to control tools deployment through scheduled actions that are created during the import and that target the Tanium Patch action group. For example, you might want to test tools on a subset of endpoints before deploying the tools to all endpoints. In this case, you can manually deploy the tools to an action group that you configured to target only the subset. To configure an action group, see Tanium Console User Guide: Managing action groups. To enable or disable restricted targeting, see Tanium Console User Guide: Dependencies, default settings, and tools deployment.

Set up Patch users

You can use the following set of predefined user roles to set up Patch users.

To review specific permissions for each role, see User role requirements.

For more information about assigning user roles, see Tanium Core Platform User Guide: Manage role assignments for a user.

Patch Administrator

Assign the Patch Administrator role to users who manage the configuration and deployment of Patch functionality to endpoints.
This role can perform the following tasks:

  • Configure all Patch settings
  • Manage block lists, deployments, maintenance windows, patch lists, repositories, and scan configurations
  • View the Patch statistics logs
  • View all configurations, graphs, and reporting data in Patch

Patch Configuration Author

Assign the Patch Configuration Author role to users who manage Patch configurations.
This role can perform the following tasks:

  • Manage block lists, maintenance windows, patch lists, and repository snapshots
  • View deployments and repositories
  • View Patch settings
  • View all configurations, graphs, and reporting data in Patch

Patch Deployment Author

Assign the Patch Deployment Author role to users who manage Patch deployments.
This role can perform the following tasks:

  • Manage deployments
  • View block lists, maintenance windows, and patch lists
  • View Patch settings
  • View all configurations, graphs, and reporting data in Patch

Patch Endpoint Configuration Approver

Assign the Patch Endpoint Configuration Approver role to a user who approves or rejects Patch configuration items in Tanium Endpoint Configuration.
This role approves, rejects, or dismisses changes that target endpoints where Patch is installed.

Patch Operator

Assign the Patch Operator role to users who manage the configuration and deployment of Patch functionality to endpoints.
This role can perform the following tasks:

  • Manage block lists, deployments, maintenance windows, patchlists, repositories, and scan configurations
  • View all configurations, graphs, and reporting data in Patch

Patch Read Only User

Assign the Patch Read Only User role to users who need visibility into Patch data.
This role can view all configurations, graphs, and reporting data in Patch.

Patch Service Account

Assign the Patch Service Account role to the account that configures system settings for Patch.
This role can perform several background processes for Patch.

Patch Super User

Assign the Patch Super User role to users who manage the configuration and deployment of Patch functionality to endpoints.
This role can perform the following tasks:

  • Manage block lists, deployments, maintenance windows, patchlists, repositories, and scan configurations
  • View all configurations, graphs, and reporting data in Patch

Enable and configure Configure Windows features

Before you can use certain Patch features for Windows endpoints, you must enable or configure them:

Enable and configure Tanium Scan for Windows

For more information about Tanium Scan for Windows, see Tanium Scan.

  1. From the Patch menu, go to Scan Management.
  2. Click Tanium Scan for Windows and then click Edit.
  3. Select Enable Tanium Scan for Windows and select a scan source.
  4. Click Synchronize Now to perform the required initial synchronization.
  5. If you want to synchronize after Microsoft releases many significant patches, select Enable Schedule Synchronization.
  6. Use the arrows to select products to include in scans.

    Synchronize all products, regardless of which products are present in the environment. Selectively choosing products can cause gaps in critical or important patches.

  7. Use the arrows to select update classifications to include in scans.

    Select Critical Updates, Security Updates, Service Packs, and Update Rollups.

  8. Click Submit.

    Click Synchronize Now after you make any changes.

Configure Tanium Scan for Windows

  1. From the Patch menu, go to Scan Management.
  2. Click Tanium Scan for Windows and then click Edit.
  3. If you want to synchronize after Microsoft releases many significant patches, select Enable Schedule Synchronization.
  4. Use the arrows to select products to include in scans.

    Synchronize all products, regardless of which products are present in the environment. Selectively choosing products can cause gaps in critical or important patches.

  5. Use the arrows to select update classifications to include in scans.

    Select Critical Updates, Security Updates, Service Packs, and Update Rollups.

  6. Click Submit.

    Click Synchronize Now after you make any changes.

Configure WSUS Scan

  1. Add the WSUS Server URL.
    1. On the Patch Overview page, click Settings and then click Configuration Settings if needed.
    2. In the WSUS Server Configuration section, enter the URL and click Submit. A regular expression for the URL is generated and added.
    3. Click View Allowed URLs, or go to Administration > Management > Allowed URLs to view the entry that was added.
  2. On the WSUS server, change the following settings:
    1. Set the intranet URL for detecting updates and the statistics server to: http://<WSUS server URL>:<port>.
    2. Disable the Configure Automatic Updates setting.

Enable direct patch downloads from Microsoft

For Windows scan configurations, you can enable direct patch downloads from Microsoft to isolated remote endpoints. This option reduces the impact on network resources. If the direct download fails, the endpoint downloads patches from the Tanium Server.

Cautions and considerations

Endpoints must be in a list of virtual private network (VPN) subnets or allowed Zone Servers that you configure. Configure VPN ranges only where clients have a direct path to the Microsoft URLs that are listed in Internet URLs . The following configurations are recommended:

  • Define the IP address ranges that are used by endpoints that connect to Tanium over a split-tunnel VPN. Use for split-tunnel VPN ranges with a separate route to download patches from the Internet. Isolated endpoints within the defined ranges attempt to download patches directly from Microsoft.
  • Define the public IP addresses or Internet-resolvable fully qualified domain names of Internet-facing Zone Servers. Isolated Tanium Clients that are connected to these Zone Servers attempt to download patches directly from Microsoft.

Do not specify the following VPNs or Zone Servers:

  • Split-tunnel VPNs where endpoints still send traffic bound for Microsoft URLs through the internal corporate network
  • Full-tunnel VPNs
  • Zone Servers that are used in an internal security zone

Clients that use WSUS scan configurations leverage the location that is defined by WSUS. Unless the WSUS server is configured to download patches from Microsoft instead of storing them locally, do not enable direct downloads for a WSUS Scan configuration. For more information about how to specify where updates are stored, see Microsoft article Update storage options.

  1. On the Patch Overview page, click Settings and then click Configuration Settings if needed.
  2. In the Patch Direct Downloads section, specify network information:
    1. Select VPN Networks, Zone Servers, or both.
    2. Add one or more networks or servers, or, if previously created, choose from the list.
  3. Click Save.

Tracking direct download status

Review current and past patch downloads directly from Microsoft over the Internet.

  1. In Interact, ask the Get Patch - Direct Downloads Statuses from all machines question.
  2. Choose the time period in hours; for example, downloads in the last three hours.
  3. Choose whether to include in-progress downloads in the results.
  4. Choose whether to include failed downloads in the results.
  5. Click Ask Question.

The results grid shows a row for each download attempt and its status.

Enable and configure Linux features

Before you can use certain Patch features for Linux endpoints, you must enable and configure them:

Migration of OS-based Linux configurations to RPM-based Linux configurations

After you enable support for RPM-based Linux distributions, Patch migrates any existing OS-based Linux configurations (scan configurations, patch lists, block lists, maintenance windows, and deployment templates) for Red Hat, CentOS, Oracle, and Amazon to use RPM-based Linux distributions.

Targeting for migrated configurations continue to be filtered to the existing OS-based Linux configurations, so that the same endpoints remain targeted after migration. Migration does not add targeting for unenforced objects, nor does it create a configuration that supports multiple operating systems. You must create a configuration that supports multiple operating systems after migration.

Patch does not select a default deployment template for the new Linux platform. If you want to define a default deployment template, you define it after the automated portion of the migration completes.

Linux Endpoint Behavior Changes

Linux endpoint behavior depends on your current configuration:

  • If this is a new Patch module installation, Patch enables RPM Linux by default.

  • If this is an existing Patch module installation, where Patch for Linux endpoints has never been enabled, Linux configurations remain disabled until you enable RPM Linux.

  • If this is an existing Patch module installation, where Patch for Linux endpoints has been enabled, your OS-based Linux configurations remain the same until you enable RPM Linux.

After you migrate to RPM Linux, Patch no longer separates operating system selections for Linux. Instead, it creates a single category for all Linux operating systems. Scan configurations can have repositories for multiple Linux operating systems. You can add targets to repositories to ensure they are only used with the proper OS/version targets included in the scan configuration targets. If an endpoint does not meet the criteria for any repositories in a scan configuration, Patch continues to the next targeted scan configuration.

Enable Patch for RPM-based Linux configurations

Before you begin, ensure that you meet the prerequisites listed in Tanium dependencies.

If this is a new Patch module installation, no action is required.

If this is an upgraded Patch module installation, complete the following steps:

  1. On the Patch Overview page, click Settings .
  2. In the Operating Systems tab, select RPM Linux and click Save.

    After you enable this option, you cannot disable it.

  3. Review the Migration of Linux Configurations message and click Acknowledge and Begin Migration.

  4. On the confirmation window, click Yes.

  5. (Optional) Click Set Default Template to set a default deployment template for RPM Linux.

  6. (Optional) Add any custom repositories.

    You can also edit existing repositories by clicking Edit .

    1. From the Patch menu, go to Scan Management and then click Repositories.

    2. Click Add Repository, provide the requested information, and then click Submit.

      Enable GPG Check and Repo GPG Check to confirm authenticity by verifying GPG signatures.

      Red Hat operating systems do not support the Repo GPG Check. If you specify that option in a Red Hat repository configuration, Tanium scans will not run.

  7. (Optional) Create snapshots of repositories. For more information, see Manage Linux repository snapshots.

(Red Hat endpoints) Configure TDownloader to use certificate authentication

To use Tanium Scan with Red Hat's patch content on Red Hat Linux endpoints, you must configure Tanium Downloader (TDownloader) to use certificate authentication for downloads from Red Hat's content delivery network (CDN) or an internal Red Hat Satellite server. Obtain a valid client certificate and private key from the Red Hat Customer Portal or from the Satellite server. For more information about preparing a Red Hat client authentication certificate for use with Tanium, see Tanium Community: Create a Red Hat certificate for Tanium downloads (login required) and Reference: TDownloader (login required). After you have acquired the client authentication certificate, complete the appropriate steps to configure the Tanium Server. For Tanium as a Service, Contact Tanium Support to configure TDownloader to use certificate authentication for downloads from the Red Hat Satellite server.

As you configure TDownloader, you might be required to provide separate authentication certificates and URLs for different Red Hat products. For example, you might have an authentication certificate associated with Red Hat Server products that you configure for use with https://cdn.redhat.com. However, you might also need a separate authentication certificate for Extended Life Cycle Support add-on for RHEL, and you need to configure it for use with https://cdn.redhat.com/content/els. In this scenario, you can repeat these steps for each of the products that require an authentication certificate.

In an active-active high availability (HA) cluster, you must configure both Tanium Servers to use Tanium Scan with Red Hat's patch content on Red Hat Linux endpoints.

Configure TDownloader on Tanium Server (Appliance)

If you are using an internal repository secured by a self-signed or an internal CA-signed certificate, Contact Tanium Support to configure the Tanium Servers to trust this certificate.

  1. Upload the SSL client private key and client certificate to your Tanium Appliance. Use SFTP with the tancopy account and copy the files to the /incoming folder.
  2. Using the TanOS menu, verify that the Tanium Server can reach cdn.redhat.com or the Red Hat Satellite server by name:
    1. Enter 3 to go to the Tanium Support menu.
    2. Enter 4 to go to the Run Network Diagnostics menu.
    3. Enter 1 to select the Ping Remote System option.
  3. On each Tanium Server, add the CA root certificate for the Red Hat CDN:
    1. Enter 2 to go to the Tanium Operations menu.
    2. Enter 2 to go to the Tanium Configuration Settings menu.
    3. Enter 13 to go to the Control RedHat CA Cert menu.
    4. Enter 1 to select the redhat-uep.pem option.
    5. Enter 2 to install the redhat-uep.pem certificate.
  4. On each Tanium Server, add the Red Hat Entitlement client certificate and key:
    1. Enter 2 to go to the Tanium Operations menu.
    2. Enter 2 to go to the Tanium Configuration Settings menu.
    3. Enter 4 to select the Add Tanium Server TDL Auth Cert option.
    4. Enter the URL (https://cdn.redhat.com or the Red Hat Satellite server), client certificate file name, and the SSL client private key file name at each prompt.
    5. At the #Line Content display, enter R to return to the previous menu.

For more information, see Tanium Appliance Deployment Guide: Manage authentication certificates for Tanium Patch connections with Red Hat.

Configure TDownloader on Tanium Server (Windows)

  1. Copy the SSL client private key, client certificate, and satellite server certificate to your Tanium Server.
  2. Ensure that the Tanium Server can reach cdn.redhat.com or the Red Hat Satellite server by name.
    Example:
    ping cdn.redhat.com
  3. On each Tanium Server, configure TDownloader to use certificate authentication for downloads to the Red Hat Satellite server.
    Example:
    cmd-prompt>TDownloader.exe add-auth-cert --url https://cdn.redhat.com --cert C:\client-certificate.pem --key C:\client-key.pem
    where:
    • https://cdn.redhat.com is the URL prefix for the satellite server download URLs
    • C:\client-certficate.pem is the client certificate
    • C:\client-key.pem is the client certificate private key
  4. Check the TDownloader config to see that your certificate has been configured.
    cmd-prompt>TDownloader.exe config list
    Keys:
      - Auth:
    - Auth.0:
    - Auth.0.Certificate: -----BEGIN CERTIFICATE----- MIIFPTCCBCWgAwIBAgIIbY/mIdQbgMowDQYJKoZIhvcNAQEFBQAwgYwxCzAJBgNV BAYTAlVTMRcwFQYDVQQIDA5Ob3J0aCBDYXJvbGluYTEQMA4GA1UEBwwHUmFsZWln aDEQMA4GA1UECgwHS2F0ZWxsbzEUMBIGA1UECwwLU29tZU9yZ1VuaXQxKjAoBgNV BAMMIXJoZWxwYXRjaHNhdGVsbGl0ZTAxLnByb2RxYS5sb2NhbDAeFw0xODA0MjAw NDAwMDBaFw0xOTA0MjAwMzU5NTlaMEYxGTAXBgNVBAoMEHRhbml1bV9wYXRjaF9k ZXYxKTAnBgNVBAMTIDBjYjk4NjcyZjBhNTQ0MDJhNzIzYmNjOGI5ODFjYTg3MIIB IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtXPySC20fPzMreenmX+4mUhS s/cdArQZOeeKliCdXI7Q/ZW0ZrhsgmMZTL+BNbZKUp72e0L3GF3yj0wx/8LWRLVC S9AaZdbXmJRK7B5mwpQaLtfuE93bJIkmBbzKA49jiwFdDE0J6v+wj0NgBZ3hr0NH V2O1hAwar2xkzz9fCTwyAR6d2I9Dpcfua8nH0ybO5kR8v1Epp70vw9/uMmGM3PCe YFX81ll3wxStbHj/DznUzQ/vFE0SZxLXh9LyWy9Nq+obLaFeDxJ0DT7iXotwVqWs Qow/upQ60vuYpAT57JM5tkrP+rKcct+TVVJNS/QmJC3yOwZWf8rIISRH4cb+GQID AQABo4IB5jCCAeIwEQYJYIZIAYb4QgEBBAQDAgWgMAsGA1UdDwQEAwIEsDCBwQYD VR0jBIG5MIG2gBRNdbtnITo9NxbcUdarkRIJv464dqGBkqSBjzCBjDELMAkGA1UE BhMCVVMxFzAVBgNVBAgMDk5vcnRoIENhcm9saW5hMRAwDgYDVQQHDAdSYWxlaWdo MRAwDgYDVQQKDAdLYXRlbGxvMRQwEgYDVQQLDAtTb21lT3JnVW5pdDEqMCgGA1UE AwwhcmhlbHBhdGNoc2F0ZWxsaXRlMDEucHJvZHFhLmxvY2FsggkAx2ndp2OhmcYw HQYDVR0OBBYEFHX7IDsUYNAZdI5dBxckm5a8y60aMBMGA1UdJQQMMAoGCCsGAQUF BwMCMBIGCSsGAQQBkggJBgQFDAMzLjMwFAYJKwYBBAGSCAkIBAcMBUJhc2ljMIGd BgkrBgEEAZIICQcEgY8EgYx42i2MMQrDMBAE9zFukyYgfyJdHmDO8oIEis7cXYz9 e8ck1UwxjNM2GsbXj1bYsFQP6BpVuzRk7cEeSP8kYYRL3EK1OZ51NrED6f5ASK+f 97RK5DIt3KAO7mHiGIyN4rwGw/wVsVxwAp4aKvUSzZXb1epTaC96MJ25BX5rmucc vyYlbSe9CpomkcWhADANBgkqhkiG9w0BAQUFAAOCAQEAubxqAqH/IQqIODQwaX9x NrIuJp3qWIUFjxZ1Vby4lEg2xmwfBtvNKminJBWNwOMZjq40xrEz0C2sxqkr/npv cbI4MMdQX1rdxMwsntgUZK8ApRR/pPwyxqAoa8IjahVBHNdFoA4+BBjcLcvzA1PB PReiXo0GS2gQQAb8U7d/jBTG1gm3ZpJFBxv7NBM9tEey3DwzP5LWPnZZmstRrlfx 7sb5J/2zLvWuMG+dMJ5jkgUKTuNdccdBP9PEVrAKiDuoLCl4UqnP0YzMJd+e9Ktx FC1QCICFUQLhZ/QVAhh8hIw0jSxIcGN+KVJF52BGdzUxvoidfqtMsjc/8NSTRk+T /g== -----END CERTIFICATE-----
    - Auth.0.PrivateKey: (protected) - Auth.0.URL: https://rhelpatchsatellite01.prodqa.local - LogVerbosityLevel: 41 - ProxyPassword: - ProxyPort: - ProxyServer: - ProxyType: NONE - ProxyUserid: - TrustedCertPath: C:\Program Files\Tanium\Tanium Server\Certs\installedcacert.crt - TrustedHostList: localhost,tanium.local,win-2012-r2
  5. To configure TDownloader to work with the Red Hat CDN, use a text editor to append the PEM-encoded certificate for cdn.redhat.com to the end of the certificate file as referenced by the TrustedCertPath value from the previous step (Example: C:\Program Files\Tanium\Tanium Server\Certs\installedcacert.crt).
    ClosedExpand this section to view the certificate.

Manage Linux repository snapshots

Repository snapshots have the following requirements:

  • Minimum Patch version:
    • For deployments to Red Hat and CentOS Linux endpoints, Patch 2.4.1.
    • For deployments to Oracle Linux endpoints, Patch 2.4.3.
    • For deployments to SUSE endpoints, Patch 3.2.160.
  • The Patch process must be running on all Linux endpoints. For more information, see Patch process is not running on Linux or macOS endpoints.
  • Patch must be enabled for Linux endpoints. For more information, see Enable Patch for RPM-based Linux configurations.
  • You must use the Tanium Scan for Linux scan method. For more information, see Tanium Scan.
  • You must create a scan configuration with the Use deployment snapshots for deployment option enabled. For more information, see Create a scan configuration.
  1. From the Patch menu, go to Scan Management and then click Repositories.
  2. To create a snapshot, select a repository and then click Create Snapshot. Name the snapshot and click Confirm.
  3. To rename a snapshot, expand a repository and then click Rename Snapshot . Provide a new name and click Confirm.
  4. To permanently remove unneeded snapshots, click Delete Snapshot .
  5. To remove failed snapshots across all repositories; for example, those for which the environment was not properly set up, click Delete Failed Snapshots.

Export a Linux repository

You can facilitate the migration of patch content by exporting repositories. The exported file includes all settings and definitions, except for repository snapshots. This is particularly useful in progressive deployment models where patches must be moved from a testing environment to a production environment.

  1. From the Patch menu, go to Scan Management, and then click Repositories.

  2. Select a repository and then click Export.

The JSON file is available in your downloads folder.

Import a Linux repository

You can import an exported repository into a new environment.

You cannot import a repository with the same name as an existing repository.

  1. From the Patch menu, go to Scan Management, and then click Repositories.

  2. Click Import Repository and then click Choose File.
  3. Browse to the list in .JSON extension and then click Import.

Enable macOS features

Before you use Patch features for macOS endpoints, you must first make sure to enable macOS in the Patch settings.

To enable macOS, complete the following steps:

  1. On the Patch Overview page, click Settings .
  2. In the Operating Systems tab, select macOS and click Save.

    After you enable this option, you cannot disable it.

Be sure to that your Patch action groups and End User Notification action groups include all necessary versions of macOS. For more information, see Add computer groups to Patch action group and Tanium End-User Notifications User Guide: Configure End-User Notifications action group.

Initialize Patch endpoints

Patch installs a set of tools on each endpoint that you have targeted. Initializing or reinitializing Patch is a common troubleshooting step.

  1. On the Patch Overview page, click Help and then click Support if needed.
  2. Click Initialize Endpoints to start the Patch service and begin distributing these tools to your endpoints.