Reveal requirements

Review the requirements before you install and use Reveal.

Tanium dependencies

In addition to a license for the Reveal product module, make sure that your environment also meets the following requirements.

Component Requirement
Platform 7.2.314.2831 or later
Tanium Client 6.0.314.1540 or later recommended
Tanium Module Tanium™ Threat Response 1.3.2 or later, or Tanium™ Trace or later
Tanium™ Index 2.4.0 or later.
A supported version of Tanium™ Index is included with the listed Tanium™ Threat Response dependency.

Reveal deploys the Tanium Index tools if necessary and starts the indexing process. Additionally, Reveal deploys a default Index configuration. Ensure that any file types or directories that you expect Reveal to scan are not excluded from hashing.

Tanium Module Server

Reveal is installed and runs as a service on the Tanium Module Server. The impact on the Module Server is minimal and depends on usage.


Up to 2 GB of free disk space is required on each endpoint.

Table 1:   Supported operating systems
Operating system OS version
Microsoft Windows Server
  • Windows Server 2019 *
  • Windows Server 2016 *
  • Windows Server 2012, 2012 R2
  • Windows Server 2008, 2008 R2

* Nano Server not supported.

Microsoft Windows Workstation
  • Windows 10
  • Windows 8
  • Windows 7
  • Windows Vista
(Intel processor only)
  • macOS 10.14 Mojave
  • macOS 10.13 High Sierra
  • macOS 10.12 Sierra
  • OS X 10.11 El Capitan
  • OS X 10.10 Yosemite
  • OS X 10.9 Mavericks
  • OS X 10.8 Mountain Lion
Amazon Linux 2 LTS (2017.12)
Debian 9.x, 8.x
Oracle Enterprise Linux 7.x, 6.x, 5.x
  • Red Hat Enterprise Linux (RHEL) 7.x, 6.x, 5.x
  • CentOS 7.x, 6.x, 5.x
Ubuntu 18.04 LTS
Ubuntu 16.04 LTS

Host and network security requirements

Specific ports and processes are needed to run Reveal.


The following ports are required for Reveal communication.

Component Port Direction Purpose
Module Server 17444 Inbound Live connections from internal endpoints.
17449 Outbound (Optional) Tanium zone hub connection to Tanium zone proxy.
Zone Server 17444 Inbound (Optional) Live connections from external endpoints
17449 Inbound (Optional) Tanium zone hub connection to Tanium zone proxy. This port only needs to be accessible from the internal network to the DMZ.

Security exclusions

If security software is in use in the environment to monitor and block unknown host system processes, your security administrator must create exclusions to allow the Tanium processes to run without interference.

Table 2:   Reveal security exclusions
Target Device Process
Module Server <Tanium Module Server>\services\reveal-service\node.exe
Windows endpoints <Tanium Client>\Tools\EPI\TaniumExecWrapper.exe
<Tanium Client>\Tools\EPI\TaniumEndpointIndex.exe
<Tanium Client>\Tools\Reveal\TaniumReveal.exe
<Tanium Client>\Tools\Trace\TaniumTraceWebsocketClient.exe
<Tanium Client>\Python27\TPython.exe(7.2.x clients)
<Tanium Client>\Python38\TPython.exe(7.4.x clients)
<Tanium Client>\Python38\*.dll(7.2.x clients)
Linux/macOS endpoints <Tanium Client>/Tools/EPI/TaniumExecWrapper
<Tanium Client>/Tools/EPI/TaniumEndpointIndex
<Tanium Client>/Tools/Reveal/TaniumReveal
<Tanium Client>/Tools/Trace/TaniumTraceWebsocketClient
<Tanium Client>/python27/python(7.2.x clients)
<Tanium Client>/python38/python(7.4.x clients)

User role requirements

Use role-based access control (RBAC) permissions to restrict access to Reveal functions.

Table 3:   Tanium Reveal User Role Privileges
Permission Reveal Administrator Reveal Read Only User Reveal Service Account Reveal User

Show Reveal

Access to the Reveal workbench

Reveal Affected Files

Enables viewing of affected files

Reveal Quick Search

Enables viewing of quick search results

Reveal Rules Deploy

Enables the deployment of rules to endpoints

Reveal Rules Deploy Status

Access to the Reveal workbench

1 1

Reveal Rules Read

Enables the viewing and listing of rules

1 1

Reveal Rules Write

Enables the editing of rules

Reveal Rule Sets Read

Enables the viewing and listing of rule sets

1 1

Reveal Rule Sets Write

Enables the editing of rule sets

Reveal Service User

Enables a user to perform work as the service account user

Reveal Service User Read

Allows viewing details of the service account user


Reveal Service User Write

Enables modifications to the service user account

Reveal Snippets

Enables viewing of snippets of affected files.

Reveal Use API

Perform Reveal operations using the API

1 1 1 1

Reveal Validations Deploy

Enables the deployment of validations to endpoints

Reveal Validations Deploy Status

Enables viewing of the status of validation deployments

1 1

Reveal Validations Read

Enables viewing and listing of validations

1 1

Reveal Validations Write

Enables the editing of validations

1 Denotes a provided permission.

For more information and descriptions of content sets and permissions, see the Tanium Core Platform User Guide: Users and user groups.

The Trace Live Connections Write permission is required for any user to make direct connections to endpoints to investigate rule matches.

Provide the Bypass Action Approval Advanced Role to the Trace Analysis Content Set so that Trace users can make Live Connections to endpoints without having to go through action approval and still require approval on all other actions.