SV-93317r1_rule
V-78611
SRG-APP-000033
TANS-CN-000007
CAT II
10
When using Active Directory synchronization, as is required by this STIG, User Roles assignments are assigned by the AD Sync connector. AD security groups correlate, one to one, to Tanium User Roles.
To change a Tanium user's User Role, their Active Directory account needs to be moved to the AD security group that correlates with the applicable User Role.
Access the Active Directory server.
Locate the account(s) that have been determined to have the incorrect User Roles in Tanium.
Review the Tanium-related AD Security Groups to which the user account(s) belong that directly correlate to the incorrect Tanium User Roles.
Remove the user account(s) from the incorrect Tanium User Roles, ensuring the user account(s) are still members of the Tanium-related AD Security Groups for which they have been documented to be authorized.
Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI) and log on with CAC.
Click on the navigation button (hamburger menu) on the top left of the console.
Click on "Administration".
Select the "Users" tab.
Verify each user against the Tanium approved users list, and review the assigned roles for each user against the "User Role" column.
If any user exists in Tanium but is not on the Tanium-approved users list and/or if any user exists in Tanium at a more elevated User Role than that documented on the list, this is a finding.
V-78611
False
TANS-CN-000007
Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI) and log on with CAC.
Click on the navigation button (hamburger menu) on the top left of the console.
Click on "Administration".
Select the "Users" tab.
Verify each user against the Tanium approved users list, and review the assigned roles for each user against the "User Role" column.
If any user exists in Tanium but is not on the Tanium-approved users list and/or if any user exists in Tanium at a more elevated User Role than that documented on the list, this is a finding.
M
3215