Enforce security policies to harden your environment and prevent unwanted activity.

Get started quickly with Protect
  • Getting started with Protect

    Block malicious attacks on endpoints using native operating system and third-party controls at the speed and scale of Tanium

Learn about Protect
  • Overview

    Understand terminology, scanning and deployment options, and how Protect integrates with other Tanium products

  • Requirements

    Review the system requirements for clients and servers, required configurations, and user role configurations

Create and enforce policies
Other resources