<<

Tanium™ Protect User Guide

Version 2.0.2

November 19, 2019 The information in this document is subject to change without notice. Further, the information provided in this document is provided “as is” and is believed to be accurate, but is presented without any warranty of any kind, express or implied, except as provided in Tanium’s customer sales terms and conditions. Unless so otherwise provided, Tanium assumes no liability whatsoever, and in no event shall Tanium or its suppliers be liable for any indirect, special, consequential, or incidental damages, including without limitation, lost profits or loss or damage to data arising out of the use or inability to use this document, even if Tanium Inc. has been advised of the possibility of such damages.

Any IP addresses used in this document are not intended to be actual addresses. Any examples, command display output, network topology diagrams, and other figures included in this document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.

Please visit https://docs.tanium.com for the most current Tanium product documentation.

Tanium is a trademark of Tanium, Inc. in the U.S. and other countries. Third-party trademarks mentioned are the property of their respective owners.

© 2019 Tanium Inc. All rights reserved.

© 2019 Tanium Inc. All Rights Reserved Page 2 Table of contents

Protect overview 9

Policy 9

Rule 9

Computer group 9

Enforcement 9

Getting started 11

Requirements 12

Tanium dependencies 12

Tanium Module 12

Installation prerequisites 12

Required credentials 12

System requirements 12

Anti-malware policy 13

System Center Endpoint Protection (SCEP) 13

Windows Defender 13

AppLocker policy 13

BitLocker policy 13

Device Control - Windows policy 13

EMET policy 13

Firewall Management - Windows policy 13

Firewall Management - policy 14

Remediation - Windows policy 14

Remediation - Linux policy 14

© 2019 Tanium Inc. All Rights Reserved Page 3 Remediation - Mac policy 14

SRP management policy 14

Host and network security requirements 14

Security exclusions 14

Ports 15

User role requirements 15

Installing Protect 19

Before you begin 19

Import solution 19

Set service account 19

Change Endpoint Status Report 20

Set defaults for AppLocker 21

Add exceptions to default AppLocker rules 23

Upload Anti-malware 23

Microsoft System Center Endpoint Protection (SCEP) Installation 25

Managed Anti-Malware Definitions Download URLs 25

Manage Windows device classes and devices 26

Device Classes 26

Devices 27

Configure endpoint encryption settings 27

Deploy Protect tools 28

What to do next 28

Creating policies 29

Create an Anti-malware policy 30

Create an AppLocker policy 32

© 2019 Tanium Inc. All Rights Reserved Page 4 Create an AppLocker policy 34

Import an AppLocker rule 36

Create a BitLocker policy 38

Before you begin 38

Create the policy 38

Create a Windows device control policy 40

Create a Windows device control policy to administer removable storage 44

Create a Windows device control policy to administer all devices 44

Create an EMET policy 47

Create a Windows firewall management policy 50

Create a new Windows firewall rule 50

Import firewall rules from a Windows TSV file 52

Import firewall rules from Tanium Endpoints 53

Create a Linux firewall management policy 54

Create a new Linux firewall rule 54

Import Linux firewall rules from Tanium endpoints 56

Create an SRP Management policy 57

Create an SRP process rule using a path 57

Create an SRP process rule using a hash 57

Search for firewall and SRP management rules 58

Create a remediation policy 58

Import policies 59

Export policies 60

Working with policy enforcement 61

Enforce policies 61

© 2019 Tanium Inc. All Rights Reserved Page 5 Remove a policy enforcement 62

View policies 62

Prioritize policies 62

View policy details 63

Selecting Protect computer groups 65

Running reports 69

Using best practices with policies and rules 73

Anti-malware policies 73

AppLocker policies 73

Example workflow using default Whitelist Rule Template 73

EMET rules 74

EMET reporting settings 75

Default action settings for EMET 75

Firewall rules 76

SRP management rules 76

Policy limitations 76

Uninstalling Protect and removing Protect policies 77

How to uninstall Protect 77

How to disable and remove Protect policies 77

Find all endpoints online 78

Deploy removal packages 78

Troubleshooting 79

Collect logs 79

View usage statistics 79

Enable System Center Endpoint Protection (SCEP) Installation 79

© 2019 Tanium Inc. All Rights Reserved Page 6 Uninstall Protect 81

Disable and remove Protect policies 82

Reference: Anti-malware settings 83

Client Interface 83

Exclusions 83

MAPS 85

Network Inspection System 85

Quarantine 86

Real-time Protection 86

Remediation 90

Reporting 91

Scan 92

Signature Updates 97

System Center Endpoint Protect 100

Threats 100

Windows Defender 101

Reference: Enforcement errors 104

Reference: Encryption management 110

Endpoint requirements 110

Configuration requirements 110

Create a Postgres database to store the recovery keys 110

Configure the endpoint encryption settings 111

Install the End-User Notifications service and initialize endpoints 111

Install and configure Direct Connect 111

Create and enforce the encryption management policy 111

© 2019 Tanium Inc. All Rights Reserved Page 7 Endpoint workflow 112

Prepare the drive for encryption 112

Configure the PIN or password 112

Encryption occurs 112

Behavior at subsequent starts / reboots 113

User forgets the PIN or password 113

Suspending and resuming BitLocker 113

Removing BitLocker encryption from an endpoint 114

© 2019 Tanium Inc. All Rights Reserved Page 8 Protect overview

Protect delivers proactive protection to block malicious attacks on endpoints using native and third-party controls at the speed and scale of Tanium across your environment.

Policy

Configuration for a specific application containing settings for particular policy type. Protect supports Anti-malware, AppLocker, Enhanced Mitigation Experience Toolkit (EMET), Firewall, and Software Restriction policies. Policies are targeted at computer groups.

Rule

Specific security controls contained within a policy.

Computer group

Defined in the Administration section of Tanium™ Console. You can target enforcement of policies to one or more computer groups for which you have management rights.

Enforcement

An enforcement occurs when a policy is successfully applied to a computer group. Following are definitions of the three possible enforcement states:

Enforced

A policy has been successfully enforced. All rules and configurations of the policy are in effect on the targeted endpoint.

Partially enforced

A higher priority policy of the same type is overriding this policy. See the enforcement state reason for more information.

Unenforced

© 2019 Tanium Inc. All Rights Reserved Page 9 The policy is not in effect on the targeted endpoint. See the enforcement state reason for more information.

This documentation may provide access to or information about content, products (including hardware and software), and services provided by third parties (“Third Party Items”). With respect to such Third Party Items, Tanium Inc. and its affiliates (i) are not responsible for such items, and expressly disclaim all warranties and liability of any kind related to such Third Party Items and (ii) will not be responsible for any loss, costs, or damages incurred due to your access to or use of such Third Party Items unless expressly set forth otherwise in an applicable agreement between you and Tanium.

Further, this documentation does not require or contemplate the use of or combination with Tanium products with any particular Third Party Items and neither Tanium nor its affiliates shall have any responsibility for any infringement of intellectual property rights caused by any such combination. You, and not Tanium, are responsible for determining that any combination of Third Party Items with Tanium products is appropriate and will not cause infringement of any third party intellectual property rights.

© 2019 Tanium Inc. All Rights Reserved Page 10 Getting started

1. Install Tanium Protect. For more information, see Installing Protect on page 19. 2. Create policies and rules. For more information, see Creating policies on page 29. 3. Enforce policies and prioritize them. For more information, see Working with policy enforcement on page 61. 4. Target computer groups. For more information, see Selecting Protect computer groups on page 65. 5. Run reports. For more information, see Running reports on page 69.

© 2019 Tanium Inc. All Rights Reserved Page 11 Requirements

Tanium dependencies

In addition to a license for the Protect module, make sure that your environment meets the following requirements.

Component Requirement

Platform Version 7.2 or later

Tanium™ Client 7.2.314.3211 or later

Tanium™ Direct Version 1.1.0 or later. Required only when you use BitLocker policies. Connect

Tanium™ End-User Version 1.5.0 or later. Required only when you use BitLocker policies. Notifications

Tanium Module Server

Protect is installed and runs as a service on the Tanium™ Module Server host computer. The impact on the Module Server is minimal and depends on usage. For more information, contact your TAM.

Installation prerequisites

The Tanium Module server must be running when you install Protect. Required credentials

Before installing Protect, you need to have a service account with Tanium Administrator credentials.

To initialize Protect, you must have a valid Tanium account with Action Author permissions. Protect uses this account to perform internal maintenance tasks.

System requirements

Following are the requirements for each policy and rule type in Protect:

© 2019 Tanium Inc. All Rights Reserved Page 12 Anti-malware policy SYSTEM CENTER ENDPOINT PROTECTION (SCEP)

l

l 2008 R2, 2012 or 2012 R2

WINDOWS DEFENDER

l Windows 8 or 10

l Windows Server 2016 AppLocker policy

l Windows 7 Enterprise, Ultimate, or Embedded

l Windows 8 Enterprise, 8.1 Enterprise, or 10 Enterprise

l R2 or later BitLocker policy

l Windows 7 Enterprise or Ultimate

IMPORTANT: Windows 7 endpoints must have a TPM chip to use BitLocker.

l Windows 8 Enterprise or Pro

l Education, Pro Education, Enterprise, or Pro Device Control - Windows policy

l Windows 7 or later

l or later EMET policy

l or later

l Windows Server 2008 or later Firewall Management - Windows policy

l Windows Vista or later

l Windows Server 2008 or later

© 2019 Tanium Inc. All Rights Reserved Page 13 Firewall Management - Linux policy

l CentOS 6 and 7

l Red Hat Enterprise Linux (RHEL) 6 and 7

l Ubuntu 16 Remediation - Windows policy

l Windows 7 or later

l Windows Server 2008 R2 or later Remediation - Linux policy

l CentOS 6 and 7

l RHEL 6 and 7

l Ubuntu 16 Remediation - Mac policy

l Mac OS X 10.8 Mountain Lion SRP management policy

l Windows Vista or later

l Windows Server 2008 or later

Host and network security requirements

Specific processes are needed to run Protect. Security exclusions

If security software is in use in the environment to monitor and block unknown host system processes, your security administrator must create exclusions to allow the Tanium processes to run without interference.

Table 1: Protect security exclusions Target Device Process

Module Server \services\protect- service\7za.exe

\services\protect- service\node.exe

© 2019 Tanium Inc. All Rights Reserved Page 14 Target Device Process

Windows x86 endpoints \Tools\StdUtils\7za.exe \Tools\Protect\LocalPolicyTool.exe (for Anti-Malware, AppLocker, and SRP policies)

\Tools\LocalPolicyTool.exe (for Windows device control policies) \Tools\Protect\devcon32.exe

Windows x64 endpoints \Tools\StdUtils\7za.ex \Tools\Protect\LocalPolicyTool.exe (for Anti-Malware, AppLocker, and SRP policies)

\Tools\LocalPolicyTool.exe (for Windows device control policies) \Tools\Protect\devcon64.exe

Ports

The following ports are required for Protect communication.

Component Port Direction Purpose

Module Server 17475 Inbound Required only when you use BitLocker policies. Allows communication between the module server and endpoints for Direct Connect.

Module Server 17476 Loopback Required only when you use BitLocker policies. Allows notifications on endpoints from the End-User Notifications service.

User role requirements

The following user roles are supported in Protect. The four predefined roles are Protect Administrator, Protect Recovery Key Viewer, Protect User, and Protect Read Only user.

© 2019 Tanium Inc. All Rights Reserved Page 15 Table 2: Protect User Role Privileges for Tanium 7.1.314.3071 or later Privilege Protect Protect Protect Protect Administrator Recovery User Read Key Only Viewer User

Show Protect1 2 2 2 2

View the Protect workbench.

Protect Read 2 2 2

View policies, enforcements, reports, and results for Protect questions asked in Interact. Export policies.

Protect Write

Create and edit policies, enforcements, and reports. Import and re-prioritize policies.

Protect Settings Write

Change the global settings for the Protect module.

Protect Recovery Keys Read

View encryption recovery keys.

1 To install Protect, you must have the reserved role of Administrator.

2 Denotes a provided permission.

© 2019 Tanium Inc. All Rights Reserved Page 16 Table 3: Provided Protect Micro Admin and Advanced User Role Permissions for Tanium 7.1.314.3071 or later Permission Role Type Content Protect Protect Protect Set for Administrator User Read Permission Only User

Read User Micro Admin

Ask Dynamic Advanced Questions

Approve Advanced Protect Action

Approve Advanced Protect Anti- Action malware Definitions

Execute Advanced Protect Plugin

Read Action Advanced Protect

Read Action Advanced Protect Anti- malware Definitions

Read Advanced Protect Package

Read Advanced Protect Anti- Package malware Definitions

Read Sensor Advanced Reserved

Read Sensor Advanced Protect

Write Action Advanced Protect

© 2019 Tanium Inc. All Rights Reserved Page 17 Permission Role Type Content Protect Protect Protect Set for Administrator User Read Permission Only User

Write Action Advanced Protect Anti- malware Definitions

Write Advanced Protect Package

Write Advanced Protect Anti- Package malware Definitions

Write Saved Advanced Protect Question

Table 4: Optional role for Protect Role Enables

A micro admin role that grants the Read Access to select Individual Computers when you System Status permission enforce a policy.

For more information, see Tanium Platform User Guide: Create a Micro Admin Role.

© 2019 Tanium Inc. All Rights Reserved Page 18 Installing Protect

Before you begin

l Read the release notes.

l Review the Requirements on page 12.

Import solution

1. Log into the Tanium Console using an account with Administrator privileges. 2. From the Main menu, click Tanium Solutions. 3. Click Import X.X (where X.X is the current module version number) under Protect.

Note: Tanium Protect is a Tanium licensed solution. If it does not appear on the Tanium Modules page, contact your Technical Account Manager (TAM).

4. If you are prompted, click Proceed with Import. Enter your credentials.

After the Tanium Protect installation and configuration process completes, you see the message Import completed successfully, and Protect appears in the main menu.

Set service account

A Protect service account user must be created and then configured within Protect to run several background processes, such as creating the actions to distribute the Protect - Tools package. This user must have the following role and access configured:

l Administrator or Content Administrator role

1. From the Protect Home page, in the Configure Protect section, click the Set Up Service Credentials step and click Set up service account . 2. Enter the Tanium credentials and click Save.

Note: You can also set or update the service account from the Protect settings. From the Protect Home page, click Settings , and update the service account settings in the Service Account section. Click Save.

For more information about Protect privileges, see User role requirements.

© 2019 Tanium Inc. All Rights Reserved Page 19 Change Endpoint Status Report Settings

Click Settings on the top right of the Protect Home page and go to General to change the following settings that govern how you can use Protect to interact with endpoints:

Question Completion Percentage

This setting specifies what percentage of endpoints must respond to the question before the question is considered complete. If questions take a long time to complete in your Tanium environment, you might want to lower the percentage in this setting. By default, Question Completion Percentage is set to 85%.

Reissue Action Interval

This setting specifies how often Protect enforcement actions are reissued. By default, enforcement actions are reissued every hour. The minimum allowed value for this field is 10 minutes.

Aggregate Results Reissue Action Interval

This setting specifies how often you want report data gathered on endpoints. By default, aggregate results actions are reissued every hour. The minimum allowed value for this field is 10 minutes.

Distribute Over Time

This setting controls whether endpoints apply enforcements the moment they receive the action (Immediate) or at unique moments within the saved action interval (Diffused). Diffusing enforcements over time can help prevent a surge in network traffic in exchange for a slower time to compliance. The default setting for Distribute Over Time is 0 where all enforcements are deployed at once.

Endpoint Status Checking Profile

This setting governs the interval at which updates are retrieved from endpoints. By default, Endpoint Status Checking Profile is set to Production mode. Aggressive mode consumes the majority of Tanium Client resources to provide extremely rapid status updates and, thereby, degrades the responsiveness of other Tanium modules. For best results, do not configure Protect to run in Aggressive mode in production environments.

Automatically Install EMET Prerequisites

© 2019 Tanium Inc. All Rights Reserved Page 20 This setting determines whether prerequisite EMET software is automatically installed if it is not detected on your system. This setting is enabled by default.

Note: For best results, consult with your TAM before modifying any Protect settings.

Set defaults for AppLocker

In the Configure Protect section of the Protect Home page, click Set AppLocker rules within Settings on the Set Defaults for AppLocker tab. Review these settings to determine if you should modify them.

AppLocker settings allow you to configure default AppLocker rules, which are included automatically in any AppLocker policy you define. Default AppLocker rules are generally used to exclude trusted system files from AppLocker scans.

Protect allows you to select Whitelist or Blacklist templates for default Allow rules. You can also create a Custom template and define custom default Allow and/or Deny rules.

You can choose a Rule Template and define default Allow and Deny rules in AppLocker settings by clicking Settings at the top right of the Protect home page or by clicking Set Defaults for AppLocker > Set AppLocker rules within Settings in the Configure Protect

© 2019 Tanium Inc. All Rights Reserved Page 21 section of the Protect home page.

The Blacklist Rule Template has the default All files Allow rule, which allows all executables to run. You can then specify Deny rules to block specific applications.

Note: You cannot modify or delete this default rule.

The Whitelist Rule Template, by default, allows only applications that administrators run, or that are run out of special folders specified as follows:

l All files located in the Program Files folder: applies to Everyone

l All files located in the Windows folder: applies to Everyone

l All files: applies to Administrators

You can expand the allowed applications by adding additional Allow rules or Deny rules to specify exceptions to otherwise allowed applications.

© 2019 Tanium Inc. All Rights Reserved Page 22 The Blacklist Rule Template is the default template used in Protect for new deployments until you change it.

The Custom Rule Template does not contain any default Allow or Deny rules.

To go back to the original default settings, click Restore to Default. Add exceptions to default AppLocker rules

With rule exceptions, you can specify files or folders to exclude from a default AppLocker rule.

Note: You can create exceptions for Path and Publisher AppLocker rule types only. You cannot create exceptions for Hash AppLocker rule types.

1. Click + Add exception next to Exceptions in the Deny or Allow section. 2. Configure the Exception type. a. For Path, provide the full name or path in the Path field. b. For Hash, provide the Hash and File Size (bytes). c. For Publisher, provide the Publisher, Product Name, File Name, and File Version, indicating if you want earlier or later versions included or only the version you specify. Use the * character as a wildcard in any of these values. 3. Select the Windows user to which the exception applies. You can choose Everyone or Administrators. 4. To add more exceptions, click + Add exception.

Upload Anti-malware

In the Configure Protect > Upload Anti-Malware section of the Protect home page, click Upload anti-malware within Settings. Review these settings to determine if you should

© 2019 Tanium Inc. All Rights Reserved Page 23 modify them.

If Protect has a problem with an anti-malware definition, an Error displays next to the definition under Anti-Malware Definitions Status in the Health section of the Protect home

© 2019 Tanium Inc. All Rights Reserved Page 24 page. View the error reason from the Anti-Malware page, which you can access by clicking Settings > Anti-Malware. Microsoft System Center Endpoint Protection (SCEP) Installation

Anti-malware policies require that either SCEP or Windows Defender is installed on endpoints. When SCEP installation is enabled, enforcing an Anti-malware policy automatically installs SCEP on endpoints that do not support Windows Defender.

You can choose one of the following:

l Disable SCEP Installation: This is the default state in Protect. Leave disabled if you are creating Anti-malware SCEP rules and already have SCEP installed on your endpoints.

l Enable SCEP Installation: Use this option to automatically install SCEP on endpoints that do not support Windows Defender. Once enabled, click Choose Installer or Update Installer to upload an installer file.

Note: The Microsoft System Center Configuration Manager includes the SCEP client installation file. For more help locating the SCEP installer, contact your TAM.

Please refer to Microsoft Technet: Endpoint Protection for more information about SCEP. Managed Anti-Malware Definitions Download URLs

Windows Anti-malware policies can use Tanium to download and distribute Windows Anti- malware definitions.

You can choose one of the following:

l Automatically retrieve definitions from Microsoft: This is the default setting. Definitions are downloaded from Microsoft.

l Download definitions from custom URLs: Use this option if your network cannot reach Microsoft, and you want to host the files on a local server and specify that URL.

The URLs listed under Managed Anti-Malware Definitions Download URLs specify the Microsoft links Protect uses to download definitions.

Please refer to Microsoft Technet: File-Share-Based Definition Updates for more information about Anti-malware settings.

© 2019 Tanium Inc. All Rights Reserved Page 25 Manage Windows device classes and devices

Click Settings on the top right of the Protect home page and go to Device Control to manage the global list of Windows device classes and devices for use with Windows device control policies.

Device Classes

The list includes the predefined device classes that are provided by Microsoft and any additional device classes that were added, either from this page or through a device control policy. Click Device Classes to manage the global list of device classes.

l Use the sort menu to sort the list by Name, Type, or Associated Policy.

l Use the types filter to filter the list by class: All Types, Custom, or Default.

l Use the Filter by name field to filter the list by a specific name.

l Click Create to add a custom device class to the global list.

© 2019 Tanium Inc. All Rights Reserved Page 26 l You can edit or delete custom device classes:

l Select a custom device class and click Edit to update the configuration for that device class.

l Select a custom device class and click Delete to delete that device class.

Note: Only custom device classes can be modified or deleted. You cannot modify or delete the default device classes. Changes that are made to device classes through the global list are pushed out to all policies that reference the device class. If you delete a device class, it is removed from all policies where it is referenced.

Devices

This list includes devices that were added from this page or through a device control policy. Click Devices to manage the global list of devices.

l Use the sort menu to sort the list by Name or Associated Policy.

l Use the Filter by name field to filter the list by a specific name.

l Click Create to add a new device to the global list.

l Select a device and click Edit to update the configuration for that device.

l Select a device and click Delete to delete that device.

Note: Changes that are made to devices through the global list are pushed out to all policies that reference the device. If you delete a device class, it is removed from all policies where it is referenced.

Configure endpoint encryption settings

Before you create endpoint encryption policies, you must configure a Postgres database to store the recovery keys. Specify the connection settings for this database on the Endpoint Encryption tab:

l Postgres Connection String: This string is used to connect to your Postgres database and is usually formatted as: postgres://:@:/ For example, postgres://postgresuser:********@192.20.30.40:5432/protect.

© 2019 Tanium Inc. All Rights Reserved Page 27 l Protect Service Token: This token is a string that must be at least 12 characters long and contain an uppercase, lowercase, numeric, and special character. It is used to connect the recovery portal to the Postgres database to retrieve lost keys.

l DB Pool: Specify the maximum number of connections that are allowed to the database. The default value is 5. A connection is made whenever the Protect service needs to communicate with the database. When the maxiumum number of connections is reached, the service waits until a connection is available to complete the action.

l Postgres Server CRT File: Provide the CRT file for the Postgres server.

l Key Encryption Key: Specify the password to use as the key encryption key (KEK) to encrypt data encryption keys (DEKs). This password must be at least 12 characters long and contain an uppercase, lowercase, numeric, and special character.

CAUTION: You must save this password outside of Protect for future reference. If you are in a disaster recovery scenario for Protect and a user forgets their PIN or password, you must use this password to access the BitLocker recovery keys. If you cannot access Protect due to a failure and you do not know this password, the endpoint is unrecoverable.

Deploy Protect tools

Some policies and sensors require Protect tools to be deployed to the endpoint. This is an optional setting, but initial policy enforcements take longer to apply and some sensors do not work without these tools.

1. From the Protect Home page, click Settings and go to Tools. 2. Select one or more computer groups to which you want to deploy tools. 3. Click Save.

Note: The first time you deploy Protect tools to an endpoint, you must wait four hours for the Tanium Client to restart before an endpoint returns sensor results for sensors that depend on Protect tools.

What to do next

See Getting started on page 11 for more information about using Protect.

© 2019 Tanium Inc. All Rights Reserved Page 28 Creating policies

You can create the following policies in Protect:

Anti-Malware policy

Anti-malware policies use the Microsoft Anti-malware engine to protect your endpoints from viruses.

AppLocker policy

AppLocker policies provide access control by using application whitelisting. Use AppLocker policies to prevent unwanted executables from running on your endpoints (Deny rules) or to only allow certain applications to run on endpoints (Allow rules).

BitLocker policy

Use BitLocker policies to encrypt drives on endpoints using Windows BitLocker Drive Encryption. For more information about BitLocker Drive Encryption, see Microsoft: BitLocker.

Windows device control

Use Windows device control policies to administer devices on Windows endpoints by denying specific permissions to categories of removable devices or restricting the installation of new devices.

Enhanced Mitigation Experience Toolkit (EMET) policy

Policies created via Microsoft EMET add protection against common memory corruption attacks. These mitigations might be system-wide and/or application- specific. EMET rules can also protect against “man in the middle” attacks on websites that use Transport Layer Security (TLS).

Firewall management policy

Firewall management policies consist of rules that block or allow network traffic using the built-in Windows Firewall.

Software Restriction Policy (SRP)

© 2019 Tanium Inc. All Rights Reserved Page 29 SRPs consist of rules that block the execution of applications and are created using Windows SRP component.

Remediation Policy

A remediation policy is a list of tasks that run sequentially on the endpoint(s).

See Using best practices with policies and rules on page 73 for more details on successfully creating policies and rules in Protect.

IMPORTANT: A Protect policy can contain only one policy type.

Create an Anti-malware policy

Anti-malware policies consist of groups of settings. You can only have one Anti-malware rule per policy; however, a single Anti-malware rule within one policy can have multiple settings.

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section, enter a Name and Description for the policy. Select Anti-Malware from the Policy Type drop-down menu. 3. Click Change settings for SCEP Installation depending on if you already have Microsoft System Center Endpoint Protection (SCEP) installed on your endpoints or if you want Tanium to automatically install SCEP when enforcing Anti-malware policies.

Note: Anti-malware policies require that endpoints have either SCEP or Windows Defender installed. When SCEP Installation is enabled, enforcing an Anti-malware policy automatically installs SCEP on endpoints that do not support Windows Defender. See Enable Microsoft System Center Endpoint Protection (SCEP) Installation on page 79 to understand how to correctly enable SCEP installation.

© 2019 Tanium Inc. All Rights Reserved Page 30 4. Determine if you should keep Deploy definition update using Tanium for Managed Definitions enabled.

Note: By default, Anti-malware rules are configured to use Tanium to deploy Anti-malware definition updates. If an endpoint has not received an update within the specified grace period, it is considered unenforced. When this option is unchecked, endpoints retrieve definitions directly from Microsoft.

5. Complete the fields for Definition Grace Period to specify how often endpoints use Tanium to check for Anti-malware definition updates. This value represents how old an Anti-malware definition can be before the policy is considered unenforced. The default grace period is 1 day. 6. Under Settings, click + Add Setting Group and select a setting group. See Reference: Anti-malware settings on page 83 for definitions of Anti-malware settings. 7. Click + Add setting to add another setting to that setting group. 8. Click + Add Setting Group to add another setting group. 9. Click Create to create your policy with this rule. 10. Edit a policy once you have created it by selecting the policy on the Policies page and then clicking Edit, making any necessary changes, and clicking Enforce Changes if enforcements exist or Update (if no enforcements are in place).

© 2019 Tanium Inc. All Rights Reserved Page 31 Create an AppLocker policy

Note: For successful AppLocker rule enforcement, Protect starts the Application Identity service.

Protect allows you to select Whitelist or Blacklist templates for default Allow rules. You can also create a Custom template and define custom default Allow and/or Deny rules.

You can choose a Rule Template and define default Allow and Deny rules in Default AppLocker Executable Rules by clicking Settings at the top right of the Protect Home page or by clicking Set Defaults for AppLocker > Set AppLocker rules within Settings in the Configure Protect section of the Home page.

The Blacklist Rule Template has the default All files Allow rule, which allows all executables to be run. You can then specify Deny rules to block specific applications.

Note: You cannot modify or delete this default rule.

The Whitelist Rule Template, by default, allows only applications that administrators run, or that are run out of special folders specified as follows:

l All files located in the Program Files folder: applies to Everyone

l All files located in the Windows folder: applies to Everyone

l All files: applies to Administrators

© 2019 Tanium Inc. All Rights Reserved Page 32 You can expand the allowed applications by adding additional Allow rules or Deny rules to specify exceptions to otherwise allowed applications.

© 2019 Tanium Inc. All Rights Reserved Page 33 IMPORTANT: If you choose to enforce the default Protect Whitelist Rule Template, you might block applications unintentionally. The Protect Whitelist Rule Template blocks applications without explicitly listing the applications. For example, a program being run by a user out of that user’s profile directory is blocked. For best results, deploy whitelist policies initially in Audit Only mode until audit reports can be reviewed and the desired results are confirmed. See Using best practices with policies and rules: AppLocker policies for an example workflow.

The Blacklist Rule Template is the default template used in Protect for new deployments until you change it.

The Custom Rule Template does not contain any default Allow or Deny rules.

To go back to the original default settings, click Restore to Default. Create an AppLocker policy

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section, enter a Name and Description for the policy. Select AppLocker from the Policy Type drop-down menu. 3. Select Audit Only or Blocking for Mode. 4. Click + Add another next to Deny to create a Deny rule that prevents applications from running on endpoints or scroll down past the default Allow rules and click + Add another to create an Allow rule that allows certain applications to run.

Note: Deny AppLocker rules take precedence over Allow AppLocker rules.

© 2019 Tanium Inc. All Rights Reserved Page 34 5. Provide a Name for the AppLocker rule. 6. Select Path, Hash, or Publisher from the Rule type drop-down list. a. For Path, provide the full name or path in the Path field. b. For Hash Rule Type, provide the Hash and File Size (bytes). You can add multiple hashes. c. For Publisher, provide the Publisher, Product Name, File Name, and File Version, indicating if you want earlier or later versions included or only the version you specify. Use the * character as a wildcard in any of these values. 7. Select Everyone or Administrators in the Windows user drop-down list.

© 2019 Tanium Inc. All Rights Reserved Page 35 8. Click + Add exception to add and configure exceptions to a Path or Publisher rule type. With rule exceptions, you can specify files or folders to exclude from an AppLocker rule. 9. Either click Create to create your policy with the rule you have configured or click + Add another to continue adding rules. 10. Edit a policy once you have created it by selecting the policy on the Policies page and then clicking Edit, making any necessary changes, and clicking Enforce Changes if enforcements exist or Update (if no enforcements are in place).

Note: Be aware of AppLocker Allow or Deny rules set in your Domain Policy – these rules might take precedence over AppLocker rules created in Protect.

Import an AppLocker rule

Protect allows you to import AppLocker rules using the XML files you generate in the AppLocker section of Windows Local Security Policy Tool. This way you can quickly add multiple rules to a policy.

1. From the Protect menu, click Policies and then click Create Policy to create a new policy with imported AppLocker rules or select a policy from the Policies page and click Edit to import AppLocker rules into an existing policy. 2. In the Policy Details section, enter a Name and Description for the policy. Select AppLocker from the Policy Type drop-down menu. 3. Select Audit Only or Blocking for Mode. 4. Click Choose File under Import Rules From XML:. 5. Select the XML file that contains the exported AppLocker rule and click Open. 6. The Import Pending Review window shows three tabs including the new rules added to the policy from the imported XML file, the rules Protect cannot import, and

© 2019 Tanium Inc. All Rights Reserved Page 36 duplicate rules.

7. Click Proceed to import the XML file. 8. Click Save if you are creating a new policy

© 2019 Tanium Inc. All Rights Reserved Page 37 9. Click Enforce Changes (if enforcements exist) or Update (if there are no enforcements in place) to add the imported rules to a policy you are editing.

Create a BitLocker policy Before you begin

Before you create a BitLocker policy, you must have the following configuration in place:

1. A Postgres database with the connection information specified in the Protect settings. For more information on configuring the connection information, see Configure endpoint encryption settings on page 27. 2. The Key Encryption Key must be specified in the Protect settings. For more information, see Configure endpoint encryption settings on page 27. 3. The End-User Notifications service must be installed and the End-User Notifications package must be pushed out to endpoints where the BitLocker policy is enforced. 4. The Direct Connect service must be installed and the Direct Connect package must be pushed out to endpoints where the BitLocker policy is enforced.

For more information on the required BitLocker configuration beyond the policy itself, see Reference: BitLocker.

A checklist displays in the BitLocker Encryption section of the policy to show you the status of each of the required configuration steps. Create the policy

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section: a. Enter a Name and Description for the policy. b. Select BitLocker from the Policy Type drop-down menu. 3. Specify the BitLocker Encryption settings: a. In the Startup Authentication section:

l For computers that have a TPM chip, specify the behavior of the computer at startup or reboot when the drive is encrypted: TPM only If you choose TPM only, the drive is unlocked at startup or reboot using the integrated TPM chip with no user interaction.

TPM + PIN

© 2019 Tanium Inc. All Rights Reserved Page 38 If you choose TPM + PIN, the user configures a PIN during the initial BitLocker setup on the computer. The user must enter that PIN when the computer starts or reboots. If you use a PIN, you must set the Minimum PIN Length. Set this value to a number between 6 and 20. By default, PINs can only include numbers. If you want to allow PINs to include uppercase and lowercase letters, symbols, numbers, and spaces, select Enhanced PIN.

l Specify whether you want to Allow BitLocker to run without a compatible TPM. If you select this option, you can enforce the policy on computers that do not have a compatible TPM chip. Users must enter a password to access the encrypted drive. b. In the Encryption Details section:

l Choose the Drive Encryption: Full or Used Disk Space Only. For more information on this option, see Microsoft: Overview of BitLocker Device Encryption in Windows 10.

l Select the Encryption Type: Hardware, Software, or Hardware and Software.

Note: If you select Hardware and Software, BitLocker software- based encryption is used if the drive does not support hardware- based encryption.

l If you selected Software or Hardware and Software for the Encryption Type, set the Encryption Method for each operating system.

Note: This setting applies only to software-based encryption. It configures the encryption algorithm and key cipher strength for the drive. For more information on this setting, see Microsoft: BitLocker settings.

c. In the End User Notifications section:

l Select an image file (PNG, GIF, or JPG/JPEG) and title to use in the notifications window for all BitLocker notifications.

l In the Reboot Computer section, provide the message that you want to display to users before the computer is rebooted. This message is the

© 2019 Tanium Inc. All Rights Reserved Page 39 first message that displays to the user after the policy is enforced. It should prompt them to reboot their computer when possible to prepare their drive for encryption.

l In the Enter New Credentials section, provide the message that you want to display to users when they are prompted to set the password or PIN to use with BitLocker.

Note: This option is available only when you choose the TPM + PIN or Allow BitLocker to run without a compatible TPM options.

l In the Encrypt Hard Drive section, provide the message that you want to display to users to notify them that they must reboot their computer to begin the encryption process. This message displays when the user's drive is prepared for encryption, which occurs after the first reboot. This message should prompt the user to reboot their computer when possible to start the encryption. Tip: You might want to inform users that drive encryption is not a disruptive process and that they can continue to work while encryption occurs.

l In the Encrypt Hard Drive section, provide the message that you want to display to users to notify them that they must reset the password or PIN.

Note: This option is available only when you choose the TPM + PIN or Allow BitLocker to run without a compatible TPM options.

4. In the Key Recovery section:

l Specify the Pre-Boot Recovery Message. If you chose the TPM + PIN or Allow BitLocker to run without a compatible TPM option, this message displays to users at startup and reboot on the screen where the PIN or password is entered.

l Select how often you want keys to rotate from the Recovery Key Rotation drop-down list.

Create a Windows device control policy

Windows device control policies provide two modes for administering devices on Windows endpoints.

Removable Storage

© 2019 Tanium Inc. All Rights Reserved Page 40 Controls access permissions on removable media. The types of removable media predefined by Microsoft are CD-ROM and DVD drives, floppy disk drives, removable disk drives, tape drives, and Windows Portable Devices (WPD).

With this mode, you can deny specific permissions to categories of removable devices. On the endpoint, the permissions are managed using local group policy settings located in Administrative Templates > System > Removable Storage Access.

© 2019 Tanium Inc. All Rights Reserved Page 41 All Devices

Restricts the installation of new devices. This advanced mode provides more granular control by using a whitelist-based approach.

With this mode, the installation of any new device is blocked unless the device is explicitly allowed by either the device class or the hardware ID of the device. Optional settings allow administrators to bypass all restrictions and to uninstall existing USB storage devices that are not on the allowed list of devices. On the endpoint, the permissions are managed using local group policy settings located in Administrative Templates > System > Device Installation > Device Installation Restrictions.

© 2019 Tanium Inc. All Rights Reserved Page 42 © 2019 Tanium Inc. All Rights Reserved Page 43 Create a Windows device control policy to administer removable storage

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section: a. Enter a Name and Description for the policy. b. Select Device Control - Windows from the Policy Type drop-down menu. c. For the Management Method, select Removable Storage. 3. In the Deny Removable Storage Access section, select the type of removable storage that you want to administer and the access that you want to deny for that storage type. 4. Click Create to create your policy. 5. Edit a policy once you have created it by selecting the policy on the Policies page and then clicking Edit, making any necessary changes, and clicking Enforce Changes if enforcements exist or Update (if no enforcements are in place). Create a Windows device control policy to administer all devices

CAUTION: This mode blocks new installations of all devices by default. This mode includes an optional setting to uninstall existing USB storage devices that are not on the policy whitelist. All other existing devices remain installed and will not be blocked, including devices that are not currently connected but were installed previously. You must add devices to the policy whitelist to allow installation to endpoints. Carefully test configurations and their impacts before you deploy them widely.

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section: a. Enter a Name and Description for the policy. b. Select Device Control - Windows from the Policy Type drop-down menu. c. For the Management Method, select All Devices. 3. Configure the Device Control settings for your policy: a. Optional. In the Deny section, select Provide a notification message for users when a device is denied access and specify a message to display when a user attempts to install a restricted device. b. In the Allow section, configure the following settings: General Device Rules

© 2019 Tanium Inc. All Rights Reserved Page 44 l Select the Allow Administrators to bypass all restrictions option to enable end-users to bypass the restrictions if they are logged in as an administrator.

Note: Devices do not install automatically when this option is selected. Administrators must manually install the device through .

l Select the Uninstall existing USB storage devices not on the allowed list of devices option to uninstall USB storage devices that are not whitelisted.

Note: As a safeguard against uninstalling devices that are required for the system to run, other devices that are currently installed on an endpoint, including devices that are not currently connected but were installed previously, are not uninstalled when this option is selected. If the device is in use when the policy is enforced on the endpoint, the device is uninstalled at the next reboot of the endpoint. In this scenario, the policy status sensor returns a status indicating that prohibited devices are still installed.

Device Classes Use the Device Classes section to define groups of devices that you want to allow in your environment. Many device classes are predefined by Microsoft, and you can define custom device classes. Each device class has a globally unique identifier (GUID). For more information about device classes, see Microsoft: Hardware Dev Center: Device Classes. When you add a device class, it is stored in the global device class list, which you can access from the Protect settings page. For more information on the global list, see Manage Windows device classes and devices on page 26.

Note: If you add a device by device class, you must allow all of the device nodes in the device tree for that class. For example, if you want to allow the installation of a USB storage device, you must allow the installation of Disk Drives and USB Bus Devices (hubs and host controllers). For more information, see Microsoft: Hardware Dev Center: Device nodes and device stacks.

© 2019 Tanium Inc. All Rights Reserved Page 45 a. Click Import to query all Windows endpoints for their installed device classes and import them to the allow list. With this option, you can quickly add any custom device classes that might be used in your environment. Device classes that are already known to Protect, marked with a warning icon , are not imported to avoid duplicates. From this page, you can select all device classes that were found on endpoints or you can select individual device classes. Click Proceed to add the selected device classes to the allow list.

b. Click Manage Existing to add existing device classes to the allow list. This list contains the predefined device classes that are provided by Microsoft and any device classes that were manually added previously. From this page, you can add or remove all available device classes, or add or remove individual device classes.

Note: If you added a device class using the Create option, you will not see it in this list until you save the policy.

c. Click Create to add a new device class. Specify a device class name, valid GUID, and optional description. Click Create again to add the device class to the allow list.

© 2019 Tanium Inc. All Rights Reserved Page 46 Devices Use the Devices section to define individual devices that you want to allow in your environment. This option is useful if, for example, you want to allow a USB storage device from a specific manufacturer that is supported by your company, but no other USB storage devices. You do not need to allow the associated device classes when you allow a specific device. When you add a device, it is stored in the global device list, which you can access from the Protect settings page. For more information on the global list, see Manage Windows device classes and devices on page 26.

l Click Create to add a new device. Specify a device name and an optional ID. Click Create again to add the device to the allow list.

Note: Most devices have several hardware IDs. These IDs range from the most specific, which identifies a particular device, to a more general ID, which might identify a device type. Use the hardware ID that is appropriate for your environment.

l Click Import to query all Windows endpoints for their installed USB storage devices and import them to the allow list. With this option, you can quickly add any USB storage devices that might be used in your environment. USB storage devices that are already known to Protect, marked with a warning icon , are not imported to avoid duplicates. From this page, you can select all USB storage devices that were found on endpoints or you can select individual USB storage devices. Click Proceed to add the selected USB storage devices to the allow list.

l Click Manage Existing to add existing devices to the allow list. This list contains devices that were manually added previously. From this page, you can add or remove all available devices, or add or remove individual devices. 4. Click Create to create your policy. 5. Edit a policy once you have created it by selecting the policy on the Policies page and then clicking Edit, making any necessary changes, and clicking Enforce Changes if enforcements exist or Update (if no enforcements are in place).

Create an EMET policy

IMPORTANT: Before creating EMET rules, read best practices for EMET rules on page 74. It is important that you also read and understand Microsoft’s Enhanced Mitigation

© 2019 Tanium Inc. All Rights Reserved Page 47 Experience Toolkit (EMET) 5.5 User Guide and then carefully test mitigations and their impacts before deploying them widely.

If an endpoint does not have .NET 4.5, Protect dynamically installs .NET 4.5.2 in order to be able to create EMET rules. If an endpoint does not have EMET 5.5 installed, Protect dynamically installs this as well. If previous versions of EMET exist on the endpoint, Protect removes them. If you do not want the dynamic installation of either .NET or EMET, then you can disable this capability by selecting Protect Settings on the Protect Home page and then unchecking Automatically Install Prerequisites. If you disable this capability, you cannot enforce EMET rules on endpoints that do not meet the .NET and EMET requirements.

Note: You must stage .NET and EMET packages on the Tanium Server before you can deploy EMET with Protect. If you are in an air-gapped environment (networks that are not exposed to the Internet), please consult with your TAM on the procedure to upload these packages in an air-gapped environment.

Refer to Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) 5.5 User Guide for instructions on how to create an EMET protection profile and associated XML file. You must use the EMET application to create an EMET protection profile and export it from the main Enhanced Mitigation Experience Toolkit page to an XML file for use in Protect. This XML

© 2019 Tanium Inc. All Rights Reserved Page 48 file is uploaded to Protect.

Protect does not support XML file creation or in-line editing. Protect verifies that the imported EMET XML file is valid and does not enforce an invalid EMET XML file.

CAUTION: Do not export the profile from any other EMET windows such as Application Configuration, Certificate Trust Configuration, etc. in order for the EMET rule to work correctly in Protect.

© 2019 Tanium Inc. All Rights Reserved Page 49 1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section, enter a Name and Description for the policy. Select EMET from the Policy Type drop-down menu. 3. Click Choose EMET XML file and browse to the file that contains XML code for the EMET rule. 4. Click Create to create your policy.

Create a Windows firewall management policy

Note: When a Windows firewall management policy is enforced on an endpoint, Protect starts the MpsSvc (Windows Firewall) service on that endpoint.

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section, enter a Name and Description for the policy. Select Firewall Management - Windows from the Policy Type drop-down menu. 3. Configure the following settings in the Firewall Profiles section: 1. Expand Domain, Private, and/or Public to define the policy profiles. For more information about protocols, see Microsoft Technet: Understanding Firewall Profiles. 2. For Network Selection, choose Default, Enabled, or Disabled . 3. For Rule Management, choose Replace or Merge The Replace option removes all existing firewall rules on the endpoint and replaces them with the rules in this policy. The Merge option leaves the existing firewall policies on the endpoint in place and adds the rules in this policy. Create a new Windows firewall rule

1. In the Firewall Rules section, click Add Rule. 2. Complete the following fields for your firewall rule:

Field Description

Name This is a required field. Enter a brief name for the rule.

Directio This is a required field. Select Outbound, Inbound, or Bi- n directional for the direction of the connection.

Action This is a required field. Select either Block or Allow depending on the type of rule you are creating.

© 2019 Tanium Inc. All Rights Reserved Page 50 Field Description

Networ This is a required field. Select a protocol. If you specify UDP k or TCP for the protocol, then you must specify at least one Protoco value in the following fields: Application Path, Local Address l (es), Local Port(s), Remote Address(es), Remote Port(s), or Service Name.

For more information about protocols, see Microsoft Technet: Firewall Rule Properties.

Group This is an optional field. You can specify a group name here or choose one that already exists that can help organize your firewall rules.

Profiles Select the applicable profiles. If you do not select one or more profiles, the rule is created as if all profiles were selected.

Applicat An example of an application path is ion C:\Windows\System32\WindowsPowerShell\v1.0\ Path .exe.

Local Use this field to target the rule to specific local IP addresses. Address Separate IP addresses with commas. (es)

Local This field is most likely populated for Inbound connections. You Port(s) can specify port ranges, for example: 80, 443, 5000-5010.

Remote This field can be used to target the rule to a specific remote IP Address address. Separate IP addresses with commas. (es)

Remote This field is most likely populated for Outbound connections. Port(s) You can specify port ranges, for example: 80, 443, 5000-5010.

Service This field can be used for a Display name. Name 3. Click Create to create your policy or click Add Rule again to add another rule to the policy. 4. Edit a policy once you have created it by selecting the policy on the Policies page and then clicking Edit, making any necessary changes, and clicking Enforce Changes if enforcements exist or Update (if no enforcements are in place).

© 2019 Tanium Inc. All Rights Reserved Page 51 Import firewall rules from a Windows TSV file

Before you can import a firewall policy into Protect from a Windows TSV file, you must export it from Windows.

1. In Windows, go to Windows Firewall Advanced Security. 2. In the left pane, right-click on Inbound Rules and click Export List. Save the file as a Text (Tab Delimited) .txt file.

3. In the Firewall Rules section, select Import from Windows TSV File from the Import drop-down list 4. Select the files that contains the exported firewall rules and click Open. The Import window shows the file name and how many rules are being imported. 5. Select the Direction. 6. Click Proceed. 7. Repeat these steps for Outbound Rules to export them from Windows and import them into Protect.

© 2019 Tanium Inc. All Rights Reserved Page 52 If the file you are importing does not include a Service column, a warning displays. If your firewall rules depend on the Service field, add the Service column and re-export the firewall rules from Windows.

To add a Service column

1. In Windows, go to Windows Firewall with Advanced Security. 2. Select Add/Remove Columns from the View menu. 3. Select Service from Available columns and click Add. 4. Click OK. 5. Select Export List from the Action menu and save it to a file.

Import firewall rules from Tanium Endpoints

1. In the Firewall Rules section, select Import Rules from Tanium Endpoints from the Import drop-down list.

© 2019 Tanium Inc. All Rights Reserved Page 53 2. In the Import Firewall Rules from Tanium Endpoints window, select the rules already existing on Tanium endpoints that you want to import.

3. Click Proceed.

Create a Linux firewall management policy

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section, enter a Name and Description for the policy. Select Firewall Management - Linux from the Policy Type drop-down menu. 3. In the Linux Firewall Default Chain Policies section, select ACCEPT or DROP for the Input, Output, and Forward fields. Create a new Linux firewall rule

1. In the Linux Firewall Rules section, click Add Rule. 2. Complete the following fields for your firewall rule:

Field Description

Name This is a required field. Enter a brief name for the rule.

© 2019 Tanium Inc. All Rights Reserved Page 54 Field Description

Chain This is a required field. Select INPUT, OUTPUT, or FORWARD to specify where in a packet's delivery path a rule is evaluated.

Target This is a required field. Select one of the following:

ACCEPT: Allows the packet.

DROP: Drops the packet.

QUEUE: Pass the packet to userspace.

REJECT: Send a response back and drop the packet.

Network This is an optional field where you can select the Protocol protocol of the rule or of the packet to check. The specified protocol can be one of the predefined options or it can be a numeric value, representing one of these protocols or a different one. Protocol all is the default when this option is omitted.

State Select one of the following:

l New: The packet has started a new connection.

l Established: The packet is associated with a connection which has seen packets in both directions.

l Related: The packet is starting a new connection, but is associated with an existing connection.

l Invalid: The packet could not be identified for some reason.

Source Address A comma separated list of network names, IP addresses with masks, plain IP addresses, or IP address ranges.

Destination A comma separated list of network names, IP addresses Address with masks, plain IP addresses, or IP address ranges.

Optional fields that might appear depending on choices you make for some of the fields above:

Source port(s) A comma separated list of ports or port ranges.

© 2019 Tanium Inc. All Rights Reserved Page 55 Field Description

Destination A comma separated list of ports or port ranges. ports(s)

In Interface Name of an interface via which a packet was received.

Out Interface Name of an interface via which a packet is going to be sent.

Note: Depending on the choices you make for the Chain, Target, and Network Protocol fields, additional optional fields might appear that you can complete.

3. Click Create to create your policy or click Add Rule again to add another rule to the policy. 4. Edit a policy once you have created it by selecting the policy on the Policies page and then clicking Edit, making any necessary changes, and clicking Enforce Changes if enforcements exist or Update (if no enforcements are in place). Import Linux firewall rules from Tanium endpoints

Note: In order to import Linux firewall rules from Tanium endpoints, you must deploy Protect tools to your endpoints. See Deploy Protect tools on page 28.

1. In the Linux Firewall Rules section, click Import Rules from Tanium Endpoints. 2. In the Import Firewall Rules from Tanium Endpoints window, select the rules already existing on Tanium endpoints that you want to import. 3. Click Proceed.

Note: Some rules might specify “rule not supported …”. This means that Protect does not support this rule, but the entire rule configuration is shown in the rule listing so that you can configure it manually if needed.

© 2019 Tanium Inc. All Rights Reserved Page 56 Create an SRP Management policy

Note: When you enable Windows SRP for the first time, targeted endpoints must be rebooted in order for SRP Management policies to be enforced.

As a best practice, you might want to enforce an SRP Management policy that does not block anything or allows a path that will always be trusted, such as the Tanium Client. With this practice, the required reboot does not have to take place when you need push out an urgent policy, such as a policy to block a malicious application.

Create an SRP process rule using a path

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section, enter a Name and Description for the policy. Select SRP Management from the Policy Type drop-down menu. 3. Click Add Path Rule. 4. Enter a Name for the rule. 5. Enter the path or filename in the Path field. Full paths, environment variables, and filenames are supported. 6. Click Create to create your policy or continue to add rules. 7. Edit a policy once you have created it by selecting the policy on the Policies page and then clicking Edit, making any necessary changes, and clicking Enforce Changes if enforcements exist or Update (if no enforcements are in place). Create an SRP process rule using a hash

1. From the Protect menu, click Policies and then click Create Policy. 2. Enter a Name and Description for the policy. 3. Select SRP Management from the Policy Type drop-down menu. 4. Click Add Hash Rule. 5. Enter a Name for the rule. 6. Enter the MD5 Hash. 7. Enter the File Size in bytes. 8. Click Create to create your policy or continue adding rules.

© 2019 Tanium Inc. All Rights Reserved Page 57 9. Edit a policy once you have created it by selecting the policy on the Policies page and then clicking Edit, making any necessary changes, and clicking Enforce Changes if enforcements exist or Update (if no enforcements are in place).

Note: Be aware of AppLocker Allow or Deny rules set in your Domain Policy – these rules might prevent SRP process rules created in Protect from being enforced.

Search for firewall and SRP management rules

Once you have created firewall or SRP management rules, you can open the policy and use the Filter and Search fields at the top right of the Firewall Rules or SRP sections to search for specific rules.

Note: The policy must be in edit mode to see these fields.

Create a remediation policy

1. From the Protect menu, click Policies and then click Create Policy. 2. In the Policy Details section, enter a Name and Description for the policy. 3. Select the type of remediation policy from the Policy Type drop-down list (Remediation - Windows, Remediation - Linux, or Remediation - Mac). 4. In the Remediation section, select the task you want to run on your endpoint(s) from the Add Task drop-down list. You can add the following seven types of tasks to a Windows remediation policy:

l Delete Registry Key: deletes a registry key if it exists.

l Delete File: deletes a single file or multiple files matching a glob pattern.

l Edit Registry Data: modifies an existing registry value if it exists; optionally, the value can be created if it does not exist.

l Update Registry Value: changes the name of a registry value if it exists or deletes the value if the delete option is selected.

l Kill Process: kills all processes that match the specified Process Type options: name, path, or hash. You can also optionally enter Command Line Args to use

© 2019 Tanium Inc. All Rights Reserved Page 58 a regular expression to match against process command line arguments for any of the Process Type options.

l Run Service Action: changes the running state of the specified service.

l Run Service Configuration: Changes the startup config of the specified service.

Note: For tasks that modify the registry and target the HKEY_USERS hive, if you use the wildcard (*) to target all users, users that are logged out when the policy is enforced are skipped.

You can add the following three types of tasks to a Linux or Mac remediation policy:

l Delete File: deletes a single file or multiple files matching a glob pattern.

l Kill Process: kills all processes that match the specified Process Type options: name, path, or hash. You can also optionally enter Command Line Args to use a regular expression to match against process command line arguments for any of the Process Type options.

l Run Service Action: changes the running state of the specified service. 5. Complete the required fields for the task you are defining. 6. Add other tasks as needed for the policy. When you have added all tasks, click Create.

Import policies

You can import one or more policies from a JSON file.

1. From the Protect menu, click Policies and then click Import. 2. Click Choose File on the Import Policies page. 3. Select a JSON file and click Open. 4. Select the policies you want to import. Import Status shows one of the following:

l New: The policy does not already exist.

l Modified: A policy with this name exists and will be overwritten with the policy you are importing.

l Error: A problem occurred during your import. You might not have sufficient privileges to import this policy. 5. Click Import. 6. Imported policies appear on the Policies page. The Change Type under Policy Details indicates Imported.

© 2019 Tanium Inc. All Rights Reserved Page 59 Export policies

1. On the Policies page, select the policies you want to export. 2. Click Export to export selected policies to a JSON file.

© 2019 Tanium Inc. All Rights Reserved Page 60 Working with policy enforcement

Enforce policies

Enforce a policy on one or more computer groups for which you have management rights that you have defined in the Administration section of Tanium Console. See Tanium Platform User Guide: Managing Computer Groups for more information about creating and managing computer groups. Manual computer groups are not supported by Protect.

1. On a policy page, click Add Enforcement. 2. On the Create Enforcement page, select Computer Groups or Individual Computers.

Note: To select Individual Computers, you must have a micro admin role that grants the Read System Status permission.

3. Define the Schedule when enforcing a remediation policy. 4. Click Create.

If you are using a Common Access Card (CAC), check the Proceed with enforcement of this policy to endpoints box and click Confirm to enforce the policy.

© 2019 Tanium Inc. All Rights Reserved Page 61 Remove a policy enforcement

1. Under Enforcements for this Policy, click Delete next to the enforcement you want to remove. 2. On the next window, enter your password and click Confirm.

If you are using a CAC, check the Proceed with deletion of this enforcement of this policy on target group "XXXX" box (where XXXX is the name of the target Computer Group) and click Confirm to remove the policy enforcement.

View policies

From the Protect menu, click Policies to view all created policies.

Click on a policy to see the configuration of that policy, the number of enforcements, which user created the policy, and when the user created it.

Use the Type and Enforcement Status drop-down menus under Filter Results to see policies of each type.

You can also select a policy to export, copy, edit, or delete it. A policy can be deleted only if it has no enforcements.

Prioritize policies

All policies are exclusive, meaning that only one policy of each type can be in effect on an endpoint at a given time. When multiple policies with the same exclusive rule type are enforced against a particular endpoint, Protect must resolve the conflict to decide which policy is applied.

If an endpoint is enforced with two or more policies of the same type, only the highest priority policy is applied. Lower priority policies are not enforced.

© 2019 Tanium Inc. All Rights Reserved Page 62 Set the prioritization of policies to determine which policy is applied if a conflict exists.

1. On the Policies page, select Prioritize. 2. Drag and drop a policy to reprioritize it. Protect automatically adjusts the numbers next to the other policies and reorders the list by priority. 3. Click Save to save your new policy prioritization order. 4. On the Confirm Update of Conflict Resolution Priorities window, enter your password and click Confirm.

If you are using a CAC, check the Proceed with update of conflict resolution priorities box and click Confirm to enforce the policy.

View policy details

Click a policy to view the Policy Details including all rules associated with that policy.

© 2019 Tanium Inc. All Rights Reserved Page 63 You can also see details for all Enforcements.

Click Add Enforcement to add a computer group or endpoint to the enforcements.

Note: If you see any Online Partially Enforced Assets or Online Unenforced Assets on the Protect Home page, you should go to Policies and Computer Groups in the Protect menu to determine which policies are not being enforced and which computer groups are unenforced.

© 2019 Tanium Inc. All Rights Reserved Page 64 Selecting Protect computer groups

Protect shows computer groups you define in the Administration section of Tanium Console. See Tanium Platform User Guide: Managing Computer Groups.

By clicking Computer Groups in the Protect menu, you can view all Enforced Computer Groups and Unenforced Computer Groups. Within these categories, you can view online assets in the following states:

l Online Enforced Assets

l Online Partially Enforced Assets

l Online Unenforced Assets

You can also click Create Policy from the Computer Groups page to create a policy and associated rules. Clicking Manage Computer Groups takes you to Administration in the Tanium Console.

You can expand a computer group by clicking the next to the computer group and see the polices that it is enforced with, the percentage of enforced and unenforced assets, which user enforced the policies, and when the user enforced them.

© 2019 Tanium Inc. All Rights Reserved Page 65 Once expanded, if you click Interact next to any enforcement state, you are taken to the Tanium Interact™ module and you can see the computers in each state.

© 2019 Tanium Inc. All Rights Reserved Page 66 © 2019 Tanium Inc. All Rights Reserved Page 67 You can also add enforcements to a specific computer group from the Computer Groups page.

To add an enforcement

1. Click Add Enforcement next to the desired computer group. 2. Select the desired policy from the Policy Name drop-down menu under New Enforcement. 3. The computer group you selected is shown in the Computer Group field under Targeting Criteria. Click Enforce to enforce the selected policy on this computer group.

© 2019 Tanium Inc. All Rights Reserved Page 68 Running reports

Run reports to view events that have occurred due to enforced SRP process and AppLocker rules, as well as reports to show Windows Anti-Malware information, including the following:

l General

l Enforcement Summary

l Anti-Malware

l Action Results

l Outdated Clients

l Malware Outbreak

l Top Infected Endpoints

l Anti-Malware Blocks

l Anti-Malware Definition Versions

l Anti-Malware Engine Versions

l AppLocker

l AppLocker Warnings

l AppLocker Blocks

l SRP

l SRP Process Blocks

1. From the Protect menu, click Reports. 2. On the Reports page, click Create Report. 3. On the Create Report page, select the Computer Group and Report Type. Depending on the Report Type you select, you might have to specify the Report Time and Number of Endpoints.

Note: Reports for Anti-Malware Definition Versions and Anti-Malware Engine Versions always retrieve current data and do not have the Report Time setting.

4. Select Include on the homepage if you want your report to appear on the Protect Home page with the latest data. You can have a maximum of four reports on the Home page. If no more reports can appear on the home page, you see Max number of reports on homepage reached. 5. Click Create.

© 2019 Tanium Inc. All Rights Reserved Page 69 On the Reports page, results are shown in a bar chart. Reports refresh every 10 seconds.

On the Reports page, you can do any of the following from the default bar chart view:

l Click Add to home or Remove from home to add the report to or remove the report from the Home page.

l Click close to delete a report.

l Click export to export results to a CSV file.

l Click the title of the report to view more details about that report, including an approximate number of Occurrences on endpoints for each result.

Note: Occurrences is the approximate count of events on endpoints.

From the detailed view, you can do any of the following:

l If a report is complex and includes extensive data, click tree to show results in a tree map view. Click bar to return to the default bar chart view.

© 2019 Tanium Inc. All Rights Reserved Page 70 l Select the number of results you want shown in the drop-down list at the top right of the page.

l Click Save View if you want to save the chart type and number of results shown for the next time you run a report.

l Click View All in Interact to load the question in Interact so that you can review the full set of the results.

© 2019 Tanium Inc. All Rights Reserved Page 71 l Click next to a result item to load the question filtered for that item in Interact.

l Use the Search field to filter the list of items.

l Click full screen to expand the list of items. This expanded view shows the full data set of the results, such as Severity.

© 2019 Tanium Inc. All Rights Reserved Page 72 Using best practices with policies and rules

Anti-malware policies

In order for Anti-malware policies to be enforced correctly, you must enable Managed Definitions to deploy Microsoft anti-malware definitions through Tanium. If your endpoints have Windows 7 or older, enable SCEP.

AppLocker policies

See Microsoft Technet: AppLocker for more information about creating AppLocker rules.

By default, blacklist rules allow all executables to run. Whitelist rules allow only administrators to run applications unless otherwise specified.

You should deploy a policy in audit mode with reporting enabled in your test environment before deploying the policy in your production environment. Review any warning events in the reports and modify the policy as needed.

Follow this example workflow to better understand how the default Protect Whitelist Rule Template works. Example workflow using default Whitelist Rule Template

This workflow can help you confirm you are achieving the results you want with your Protect whitelist policy.

1. Enforce the default Protect Whitelist Rules Template in Audit Only mode on a representative computer group. 2. Create the AppLocker Warnings report to run for the appropriate number of days. You must enforce the policy for approximately 7 to 30 days in order to collect an accurate representation of user activity on the endpoint. 3. Based on the aggregated data of blocked applications in the AppLocker Warnings report, click the Interact icon next to the application to go to Interact to view detailed event information about that specific application. 4. Select the AUDIT row(s) in the resulting Question Results and click Drill Down. 5. On the Create Question tab of the Select Drilldown Question window, begin typing threat details and click on the resulting query Get AppLocker Threat Details Last X Days from all machines.

© 2019 Tanium Inc. All Rights Reserved Page 73 6. In the Number of days to display results for field, enter the same number of days for which you created the report (in this example, 7) and click Go. 7. The Question Results page shows the paths for the application. To allow the application to run, edit the policy and add the path in the Allow section of the policy.

8. Click Enforce Changes and Confirm Save of Enforced Policy.

EMET rules

Complete EMET documentation is available in Microsoft's Enhanced Mitigation Experience Toolkit (EMET) 5.5 User Guide. If you are creating EMET rules, it is important to review and understand the toolkit. Be sure to thoroughly test EMET mitigations and their impacts before deploying them widely in your enterprise. For more information about application compatibility issues, refer to Microsoft’s EMET mitigations guidelines.

EMET rules can help prevent the most common techniques attackers might use to exploit vulnerabilities in computer systems by diverting, terminating, blocking, and invalidating those actions. EMET allows customers to leverage security mitigation that provides several unique benefits:

l EMET profiles help harden legacy applications: EMET can help manage the risk while old software is being phased out by making it harder for hackers to exploit vulnerabilities in legacy software.

l EMET profiles help verify SSL certificates trust while surfing websites: EMET offers the possibility to enforce a set of pinning rules that can verify SSL certificates of specified domains against their issuing Root CA (configurable certificate pinning) to prevent “man in the middle” attacks.

Be sure to consider the following when creating EMET rules:

l Because EMET can alter the execution of applications, it might cause some applications to crash unexpectedly. Be sure to test all EMET profiles before deploying

© 2019 Tanium Inc. All Rights Reserved Page 74 them enterprise-wide.

l Different mitigations are available on different Windows operating systems, and EMET rules might need to be targeted at computer groups based on operating system type.

l Specific applications can “opt in” to certain EMET mitigations. Some mitigations might be system-wide and affect everything that runs on the host.

l Because changing the system-wide Data Execution Prevention (DEP) setting can cause service disruptions, Protect ignores the system-wide DEP setting in an EMET rule.

l A reboot might be required for some system-wide EMET mitigations.

l Configure EMET reporting settings to meet your needs before enforcing EMET profiles widely in the enterprise. EMET reporting settings

Consider the implications of the EMET reporting settings before creating EMET rules.

If Tray Icon is selected, end users receive popup notifications from EMET from the Windows Notification Tray in the . If Early Warning is selected, EMET-related information, including details about exploit activity, is shared with Microsoft. If Windows Event Log is checked, EMET-related data is logged to the Windows Event Log subsystem, and this data can be mined and monitored for information on potential exploits or application incompatibilities. These settings are enabled by default in EMET 5.5. Default action settings for EMET

The EMET configuration interface allows administrators to set default action to be taken when an exploit is attempted against a protected application. These settings are Stop on exploit, meaning the application terminates or crashes, or Audit only, meaning EMET logs the attack, but does not terminate the process. Be aware that Audit Only is not supported for all mitigations. See Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) 5.5 User Guide for more details.

If EMET is causing applications to crash, see the Enhanced Mitigation Experience Toolkit (EMET) 5.5 User Guide for troubleshooting steps and further guidance, including the possibility that the application could be under attack.

© 2019 Tanium Inc. All Rights Reserved Page 75 Firewall rules

With Protect, do not manage Windows Firewall with Group Policy Management Editor. In order for firewall policies created under Protect to take effect, the Group Policy Firewall setting must be set to Not configured.

SRP management rules

Windows SRP is capable of blocking applications launched by the user. Windows SRP does not prevent Windows services from starting. SRP does not prevent SYSTEM privileges from launching applications. For more information, see Microsoft TechNet Software Restriction Policies.

Policy limitations Table 5: Maximum number of policies and rules allowed Item Limit

Maximum number of policies 100

Maximum number of AppLocker rules 100 per policy

Maximum number of firewall rules per 1000 policy

Maximum number of SRP 100 management rules per policy

© 2019 Tanium Inc. All Rights Reserved Page 76 Uninstalling Protect and removing Protect policies

In some instances, if you decide to uninstall Protect, you might need to disable associated firewall policies and SRP rules to ensure they are cleanly removed from endpoints. Consult with your TAM to determine if this is required. If so, you need to deploy actions including the following two packages that were created when Protect was installed:

l Disable Tanium Protect Software Restriction Policies

l Remove Protect Firewall Rules

Note: In order to complete a clean uninstall and removal of Protect policies, you must uninstall Protect before disabling the associated firewall policies and SRP rules.

How to uninstall Protect

The following procedure guides you through removing the Protect workbench and uninstalling the service from the Tanium Module Server™. See How to disable and remove Protect policies on page 77 for the procedure to deploy actions for the two specific packages required to remove content associated with Protect after you have uninstalled Protect.

To uninstall Protect

1. From the Main menu, click Tanium Solutions. 2. Click Uninstall on the bottom right corner of the Protect box. 3. Click Proceed with Uninstall on the next window and enter your credentials.

How to disable and remove Protect policies

After consultation with your TAM, you might be required to disable Protect policies after you have uninstalled Protect. This can occur if some endpoints are off-line when you uninstall Protect. For more detailed information on packages and deploying actions, see Tanium Platform User Guide: Managing Scheduled Actions and Tanium Platform User Guide: Managing and creating Packages.

To disable and remove Protect policies, you must first find all of the endpoints that are online and then deploy the removal packages.

© 2019 Tanium Inc. All Rights Reserved Page 77 Find all endpoints online

1. Select Interact from the main menu. 2. Assuming you want to disable Protect policies from all online computers now that you have uninstalled Protect, type get online from all machines in the question bar. 3. Interact suggests the query: Get Online from all machines. Select this query. 4. Wait until your results have reached 100% and then select the box next to True. Deploy removal packages

1. Click Deploy Action. 2. Under Deployment Package on the Deploy Action page, type Protect in the Enter package name here field. 3. Select the Disable Tanium Protect Software Restriction Policies Package. 4. Click show preview to continue at the bottom of the Deploy Action page. 5. Click Deploy Action and enter your credentials. The Action Summary page appears. 6. Repeat all steps above, but select and deploy the Remove Protect Firewall Rules Package.

Note: The Disable Tanium Protect Software Restriction Policies Package removes all SRP rules created by Protect. It does not disable SRP on the endpoint. Likewise, the Remove Protect Firewall Rules Package removes all firewall rules created by Protect. It does not disable the firewall on the endpoint.

IMPORTANT: Consult with your TAM before uninstalling Protect and disabling Protect policies.

© 2019 Tanium Inc. All Rights Reserved Page 78 Troubleshooting

Collect logs

To collect logs required for troubleshooting

1. At the top right of the Home page, click the Help icon . 2. Click the Troubleshooting tab. 3. Click Collect and then click Download to get the zipped file required by Tanium to assist you with troubleshooting.

View usage statistics

At the top right of the Home page, click Info . Protect usage statistics shown under the About tab can also assist with troubleshooting.

Enable Microsoft System Center Endpoint Protection (SCEP) Installation

Anti-malware policies require that either SCEP or Windows Defender is installed on endpoints. When you are creating an Anti-malware rule and the SCEP Installation option is enabled, enforcing an Anti-malware policy automatically installs SCEP on endpoints that do not support Windows Defender. However, you will receive an error if you have not

© 2019 Tanium Inc. All Rights Reserved Page 79 uploaded an installer file.

Go to the Anti-Malware Settings page and click Choose Installer or Update Installer to specify the location of the installer file to be uploaded as described in Microsoft System Center Endpoint Protection (SCEP) Installation on page 25.

This error can also appear on the Policies page or on the Anti-Malware Settings page. Use the same process described above to resolve it.

© 2019 Tanium Inc. All Rights Reserved Page 80 Uninstall Protect

In some instances, if you decide to uninstall Protect, you might need to disable associated firewall policies and SRP rules to ensure they are cleanly removed from endpoints. Consult with your TAM to determine whether these steps are required. If so, you need to deploy actions including the following two packages that were created when Protect was installed:

l Disable Tanium Protect Software Restriction Policies

l Remove Protect Firewall Rules

Note: To complete a clean uninstall and removal of Protect policies, you must uninstall Protect before you disable the associated firewall policies and SRP rules.

1. From the Main menu, click Tanium Solutions. 2. Under Protect, click Uninstall. 3. Review the content that will be removed and click Uninstall. 4. Depending on your configuration, enter your password or click Yes to start the uninstall process. 5. Return to the Tanium Solutions page and verify that the Import button is available for Protect.

© 2019 Tanium Inc. All Rights Reserved Page 81 Disable and remove Protect policies

After consultation with your TAM, you might be required to disable Protect policies after you uninstall Protect. This can occur if some endpoints are offline when you uninstall Protect. For more detailed information on packages and deploying actions, see Tanium Platform User Guide: Managing Scheduled Actions and Tanium Platform User Guide: Managing and creating Packages.

To disable and remove Protect policies, you must first find all of the endpoints that are online and then deploy the removal packages.

1. From the Main menu, click Interact. 2. Ask a question to target the endpoints from which you want to Protect policies. For example, Get Protect - Tools Version from all machines. 3. Select the row for the endpoints from which you want to remove the Protect policies. 4. Click Deploy Action. 5. On the Deploy Action page, enter Protect in the Enter package name here field. 6. Select the Disable Tanium Protect Software Restriction Policies Package. 7. Click Show preview to continue at the bottom of the Deploy Action page. 8. Click Deploy Action and enter your credentials. The Action Summary page appears. 9. Repeat these steps, but select and deploy the Remove Protect Firewall Rules package.

Note: The Disable Tanium Protect Software Restriction Policies package removes all SRP rules created by Protect. It does not disable SRP on the endpoint. Likewise, the Remove Protect Firewall Rules package removes all firewall rules created by Protect. It does not disable the firewall on the endpoint.

IMPORTANT: Consult with your TAM before uninstalling Protect and disabling Protect policies.

© 2019 Tanium Inc. All Rights Reserved Page 82 Reference: Anti-malware settings

When you create an Anti-Malware policy, you can add settings to control the user experience. These settings apply to both System Center Endpoint Protection (SCEP) and Windows Defender Antivirus unless they are labeled (SCEP only) or (Defender only).

Client Interface

Display additional text to clients when they need to perform an action

Set a custom message to display to users when they need to perform an action. The string must be less than 1024 characters.

Example: Contact our company help desk at 555-1212 for more help.

Display notifications to clients when they need to perform actions

Configure whether to display notifications to users when they need to perform an action.

Enable or do not configure this setting to display notifications to users when they need to perform an action.

Disable this setting to prevent notifications from being displayed to users.

Enable headless UI mode

Configure whether the Windows anti-malware user interface displays to users.

Enable this setting to hide the Windows anti-malware user interface from users.

Disable or do not configure this setting to show the Windows anti-malware user interface to users.

Suppresses reboot notifications

Configure whether reboot notifications display to users.

Enable this setting to suppress reboot notifications.

Disable or do not configure this setting to display reboot notifications to users.

Exclusions

Extension Exclusions

© 2019 Tanium Inc. All Rights Reserved Page 83 Specify file extensions to exclude from scanning.

Example: obj

IP address range Exclusions

Specify IP addresses to exclude from network scanning.

Example: 157.1.45.123-60.1.1.1

Path Exclusions

Specify file paths to exclude from scanning.

Example: C:\Program Files

Port number Exclusions

Specify TCP ports to exclude from network scanning.

Example: 17472

Process Exclusions

Specify a path to a process to exclude all files opened by that process from scanning. Each value must be a full path to a process. The process itself is still scanned.

Example: C:\Windows\Program.exe

Process Exclusions for outbound traffic

Specify a path to a process to exclude outbound traffic from that process from network scanning.

Example: C:\Windows\Program.exe

Threat ID Exclusions

Exclude specific threats from network scanning.

Example: 2925110632

Turn off Auto Exclusions (Defender Only)

Turn Automatic Exclusions on or off.

Enable this setting to turn off Automatic Exclusions.

Disable or do not configure this setting to turn on Automatic Exclusions.

© 2019 Tanium Inc. All Rights Reserved Page 84 MAPS

Configure local setting override for reporting to MAPS

Allow the local preference for joining the Microsoft Active Protection Service to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Join MAPS

Join the Microsoft Active Protection Service. Possible values are:

l Disabled

l Basic MAPS

l Advanced MAPS

Send file samples when further analysis is required

Configure how samples are sent to the Microsoft Active Protection Service. Possible values are:

l Always prompt

l Send safe samples

l Never send

l Send all samples

Network Inspection System

Define the rate of detection events for logging

Control the time interval in minutes for logging of detection events. Each event is logged at most once per time interval.

Default value: 60

Specify additional definition sets for network traffic inspection

Specify additional definition sets to enable for network scanning. Each value must be a GUID of a definition set to enable.

© 2019 Tanium Inc. All Rights Reserved Page 85 Example: {b54b6ac9-a737-498e-9120-6616ad3bf590}

Turn on definition retirement

Control whether known network vulnerabilities are scanned for after they are patched.

Enable or do not configure this setting to stop checking for network vulnerabilities after they are patched.

Disable this setting to always check for known network vulnerabilities.

Turn on protocol recognition

Control whether network protocol recognition is used to protect against attacks from known vulnerabilities.

Enable or do not configure this setting to enable network protocol recognition.

Disable this setting to disable network protocol recognition.

Quarantine

Configure local setting override for the removal of items from Quarantine folder

Allow the local preference for the number of days to keep items in the quarantine folder to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure removal of items from Quarantine folder

Define the number of days that items are kept in the quarantine folder before they are removed. By default, items remain in the quarantine folder indefinitely.

Example: 30

Real-time Protection

Configure local setting override for monitoring file and program activity on your computer

© 2019 Tanium Inc. All Rights Reserved Page 86 Allow the local preference for file and program activity to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override for monitoring for incoming and outgoing file activity

Allow the local preference for monitoring of incoming and outgoing file activity to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override for scanning all downloaded files and attachments

Allow the local preference for scanning downloaded files and attachments to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override for turn on behavior monitoring

Allow the local preference for behavior monitoring to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override for turn on script scanning (SCEP Only)

© 2019 Tanium Inc. All Rights Reserved Page 87 Allow the local preference for script scanning to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override to turn off Intrusion Prevention System

Allow the local preference for network scanning to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override to turn on real-time protection

Allow the local preference for turning on real-time protection to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure monitoring for incoming and outgoing file and program activity

Configure whether incoming or outgoing files are scanned. On servers with heavy network traffic, disabling scanning for a particular direction can help to achieve optimal network performance. This setting is applicable only to NTFS volumes.

Define the maximum size of downloaded files and attachments to be scanned

Configure the maximum size of downloaded files and attachments to scan. The value is the maximum file size in kilobytes.

Example: 524288

Monitor file and program activity on your computer

© 2019 Tanium Inc. All Rights Reserved Page 88 Configure monitoring of file and program activity.

Enable or do not configure this setting to turn on monitoring of file and program activity.

Disable this setting to turn off monitoring of file and program activity.

Scan all downloaded files and attachments

Configure scanning of downloaded files and attachments.

Enable or do not configure this setting to scan all downloaded files and attachments.

Disable this setting to turn off scanning of downloaded files and attachments.

Turn off real-time protection

Configure whether users are prompted when known malware is detected.

Enable this setting to never prompt users to take action when malware is detected.

Disable or do not configure this setting to prompt users to take action when malware is detected.

Turn on behavior monitoring

Turn behavior monitoring on or off.

Enable or do not configure this setting to enable behavior monitoring.

Disable this setting to enable behavior monitoring.

Turn on Information Protection Control

Turn Information Protection Control on or off.

Enable this setting to turn on Information Protection Control.

Disable or do not configure this setting to turn off Information Protection Control.

Turn on network protection against exploits of known vulnerabilities

Configure network protection from known vulnerabilities.

Enable or do not configure this setting to turn on network protection.

© 2019 Tanium Inc. All Rights Reserved Page 89 Disable this setting to turn off network protection.

Turn on process scanning whenever real-time protection is enabled

Configure whether all processes are scanned when real-time protection is first turned on. This scan can detect malware that starts when real-time protection is off.

Enable or do not configure this setting to start a process scan when real-time protection is turned on.

Disable this setting to not start a process scan when real-time protection is turned on.

Turn on raw volume write notifications

Configure notifications of raw volume writes.

Enable or do not configure this setting to turn on raw write notifications.

Disable this setting to turn off raw write notifications.

Turn on script scanning (SCEP Only)

Configure script scanning.

Enable or do not configure this setting to enable script scanning.

Disable this setting to disable script scanning.

Remediation

Configure local setting override for the time of day to run a scheduled full scan to complete remediation

Allow the local preference for the scheduled scan time to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Specify the day of the week to run a scheduled full scan to complete remediation

Schedule the day of the week to perform a full scan.

Specify the time of day to run a scheduled full scan to complete remediation

© 2019 Tanium Inc. All Rights Reserved Page 90 Specify the time of day to perform a full scan. The value is the number of minutes past midnight in the local time for the endpoint to perform the scan.

Example: 180

Reporting

Configure time out for detections in critically failed state

Set the time in minutes for a "critically failed" detection to move to "additional action" or be "cleared."

Example: 7200

Configure time out for detections in non-critical failed state

Set the time in minutes to "clear" a "non-critically failed" detection.

Example: 7200

Configure time out for detections in recently remediated state

Sets the time in minutes to "clear" a "completed" detection.

Example: 7200

Configure time out for detections requiring additional action

Set the time in minutes to "clear" an "additional action."

Example: 7200

Configure Watson events (SCEP Only)

Use this policy setting to configure whether or not Watson events are sent. This value has been deprecated as of the February 2015 anti-malware platform update. For more information, see Microsoft: February 2015 anti-malware platform update for Endpoint Protection clients.

Configure Windows software trace preprocessor components

Configure the Windows software trace preprocessor.

Configure WPP tracing level

Configure tracing levels for the Windows software trace preprocessor (WPP Software Tracing). The allowed values are Error (1), Warning (2), Info (3), or Debug (4).

© 2019 Tanium Inc. All Rights Reserved Page 91 Example: 1

Scan

Allow users to pause scan

Allow users to pause a scan while it is in progress.

Enable or do not configure this setting to add a new context menu to the task tray icon that allows users to pause a scan.

Disable this setting to prevent users from pausing scans.

Check for the latest virus and definitions before running a scheduled scan

Check for new virus and spyware definitions before running a scan. This setting does not apply to scans started manually from the user interface.

Enable to check for new definitions before running a scan.

Disable or do not configure this setting for scans to use existing definitions.

Configure local setting override for maximum percentage of CPU utilization

Allow the local preference for maximum CPU utilization to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override for schedule scan day

Allow the local preference for the scheduled scan day to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override for scheduled quick scan time

Allow the local preference for the scheduled quick scan time to override the group policy.

© 2019 Tanium Inc. All Rights Reserved Page 92 Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override for scheduled scan time

Allow the local preference for the scheduled scan time to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Configure local setting override for the scan type to use for a scheduled scan

Allow the local preference for the scan type to use during a scheduled scan to override the group policy.

Enable this setting for the local preference to have precedence over the group policy.

Disable or do not configure this setting for the group policy to have precedence over the local preference.

Create a point

Configure whether a daily system restore point is created on an endpoint before it is cleaned.

Enable this setting to create a system restore point before cleaning.

Disable or do not configure this setting to prevent a system restore point from being created.

Define the number of days after which a catch-up scan is forced (Defender Only)

Specify the number of consecutive scheduled scans that can be missed until a forced catch-up scan runs.

Example: 2

Default value: 2

Run full scan on mapped network drives

© 2019 Tanium Inc. All Rights Reserved Page 93 Configure whether mapped network drives are scanned.

Enable this setting to scan mapped network drives.

Disable or do not configure this setting to prevent scanning mapped network drives.

Scan archive files

Configure whether archive files are scanned. Archive files are ZIP or CAB files.

Enable or do not configure this setting to scan archive files.

Disable this setting to prevent scanning archive files.

Scan network files

Configure whether network files are scanned.

Enable this setting to scan network files.

Disable or do not configure this setting to prevent scanning network files.

Scan packed executables

Configure whether packed executables are scanned.

Enable or do not configure this setting to scan packed executables. For best results, use this setting.

Disable this setting to prevent scanning of packed executables.

Scan removable drives

Configure whether removable drives, such as USB flash drives, are scanned when running a full scan.

Enable this setting to scan removable drives during any type of scan.

Disable or do not configure this setting to prevent scanning of removable drives in full scans. Removable drives can still be scanned during quick scans and custom scans.

Specify the interval to run quick scans per day

Configure the quick scan interval in hours. The value 0 means that quick scans are never scheduled.

© 2019 Tanium Inc. All Rights Reserved Page 94 Example: 24

Default value: 0

Specify the maximum depth to scan archive files

Set the maximum directory depth that archive files are unpacked during scanning. Archive files are ZIP or CAB files.

Example: 1

Default value: 0

Specify the maximum percentage of CPU utilization during a scan

Set the maximum percentage CPU utilization allowed during a scan. Valid percentage values can range from 5 to 50. The value 0 means that there is no limit.

Example: 5

Default value: 50

Specify the maximum size of archive files to be scanned

Set the maximum size of archive files that are scanned. Archive files are ZIP or CAB files. The value is the number of kilobytes. The value 0 means that there is no size limit.

Example: 1048576

Default value: 0

Specify the scan type to use for a scheduled scan

Specify the scan type used during scheduled scans. By default, scheduled scans use quick scans.

Specify the time for a daily quick scan

Specify the time of day when a daily quick scan runs. The value is the number of minutes past midnight in the local time for the endpoint to perform the scan.

Example: 180

Default value: 120

Start the scheduled scan only when computer is on but not in use

© 2019 Tanium Inc. All Rights Reserved Page 95 Set whether scans begin only when the endpoint is idle.

Enable or do not configure this setting to start scans only when the endpoint is idle.

Disable to start scans at the scheduled time.

Turn on catch-up full scan

Configure whether to start a full scan if two consecutive scheduled scans are missed. The full scan starts the next time someone logs in after the scheduled scans are missed.

Enable this setting to turn on catch-up full scans.

Disable or do not configure this setting to turn off catch-up full scans.

Turn on catch-up quick scan

Configure whether to start a quick scan if two consecutive scheduled scans are missed. The quick scan starts the next time someone logs in after the scheduled scans are missed.

Enable this setting to turn on catch-up quick scans.

Disable or do not configure this setting to turn off catch-up quick scans.

Turn on e- scanning

Configure whether email and email attachments are scanned.

Enable this setting to turn on email scanning.

Disable or do not configure this setting to turn off email scanning.

Turn on heuristics

Heuristics improve the capability to flag new threats.

Enable or do not configure this setting to turn on heuristics. For best results, use this setting.

Disable this setting to turn off heuristics.

Turn on removal of items from scan history folder

© 2019 Tanium Inc. All Rights Reserved Page 96 Configure the number of days that items are kept in the scan history folder before being permanently removed. The value 0 means that items are never removed from the history folder.

Example: 7

Default: 30

Turn on reparse point scanning

Configure whether reparse points are scanned. Reparse points are followed to a maximum depth, so a recursive reparse point might slow down scanning, but it does not cause an error.

Enable this setting to scan reparse points.

Disable or do not configure this setting to prevent reparse point scanning.

Signature Updates

Allow definition updates from Microsoft Update

Enable definition updates to be downloaded from Microsoft Update even if Automatic Updates are configured to use a different download source.

Enable this setting to download definition updates from Microsoft Update.

Disable or do not configure this setting to download definition updates from the configured source.

Allow definition updates when running on battery power

Configure whether definitions are updated when an endpoint is running on battery power.

Enable or do not configure this setting to update definitions even when an endpoint is running on battery power.

Disable this setting to turn off definition updates when an endpoint is running on battery power.

Allow notifications to disable definitions based reports to MAPS

Enable receiving notifications from MAPS to disable definitions that are causing false positives. MAPS must be configured on an endpoint to successfully use this functionality.

© 2019 Tanium Inc. All Rights Reserved Page 97 Enable or do not configure this setting to receive notifications from MAPS to disable definitions that are causing false positives.

Disable this setting to turn off receiving notifications from MAPS to disable definitions.

Allow real-time definition updates based on reports to MAPS

Enable real-time definition updates if MAPS finds that the latest definition update has definitions for a threat involving an unknown file. MAPS must be configured on an endpoint to successfully use this functionality.

Enable or do not configure this setting to enable real-time definition updates.

Disable this setting to turn off real-time definition updates.

Check for the latest virus and spyware definitions on startup

Specify whether definition updates should be checked at service startup.

Enable this setting to check for definition updates at service startup.

Disable or do not configure this setting to prevent checking for definition updates at service startup.

Define file shares for downloading definition updates

Set UNC file shares for downloading definition updates. The file shares are tried in the specified order.

Example: \\corp\updates

Define the number of days after which a catch-up definition update is required

Specify the number of days that can pass before a forced catch-up definition update.

Example: 7

Default value: 1

Define the number of days before spyware definitions are considered out of date

Set the number of days that can pass before spyware definitions are considered out of date.

Example: 7

Default value: 14

© 2019 Tanium Inc. All Rights Reserved Page 98 Define the number of days before virus definitions are considered out of date

Set the number of days that can pass before virus definitions are considered out of date.

Example: 7

Default value: 14

Define the order of sources for downloading definition updates

Specify the order for definition update sources to be contacted. Possible values are:

l Microsoft Update

l Microsoft Malware Protection Center

l Internal definition update server

l File shares

Initiate definition update on startup

Configure whether definitions are updated on startup when there is no antimalware engine.

Enable or do not configure this setting to enable definition updates on startup when no antimalware engine is present.

Disable this setting to turn off definition updates when no antimalware engine is present.

Specify the day of the week to check for definition updates

Specify the day of the week to check for definition updates. By default, updates are checked every day.

Specify the interval to check for definition updates

Specify the definition update check interval in hours.

Example: 12

Specify the time to check for definition updates

Specify the time of day to check for definition updates. The value is the number of minutes past midnight in the local time for the endpoint to check for definition

© 2019 Tanium Inc. All Rights Reserved Page 99 updates. By default, definition updates are checked 15 minutes before the scheduled scan time.

Example: 120

Turn on scan after signature update

Configure whether a scan should start after a definition update.

Enable or do not configure this setting to start a scan after a definition update.

Disable this setting to not start a scan after a definition update.

System Center Endpoint Protect

Turn on Potentially Unwanted Application (PUA) detection (SCEP Only)

Block PUAs from being downloaded through , Firefox, and Chrome.

Disable or do not configure this setting to disable improved PUA detection.

Turn on threat file hash logging (SCEP Only)

Determines whether or not the file hash (SHA1) of any detected threat files is recorded in the event log for additional research and correlation with other threat streams. When a threat file is detected and hash logging is enabled, EventID 1120 is recorded in the system log.

Enable this setting for events to be recorded.

Disable or do not configure this setting for threat file hashes to not be recorded to the event log.

Turn on virus definitions (SCEP Only)

Manage virus definitions used during a scan.

Enable or do not configure this setting for virus definitions to be used during scans.

Disable this setting for virus definitions to not be used during scans.

Threats

Specify threat alert levels at which default action should not be taken when detected

Customize the remediation action to take for each threat alert level.

© 2019 Tanium Inc. All Rights Reserved Page 100 Possible values for threat alert levels are:

l Low

l Medium

l High

l Severe

Possible values for remediation actions are:

l Quarantine

l Remove

l Ignore

Specify threats upon which default action should not be taken when detected

Customize the remediation action to take for each detected Threat ID. Possible values for remediation actions are:

l Quarantine

l Remove

l Ignore

Windows Defender

Allow antimalware service to remain running always

Choose whether the Windows Anti-malware service keeps running when virus and spyware definitions are disabled.

Enable this setting to keep the Windows Anti-malware service running when virus and spyware definitions are disabled.

Disable or do not configure this setting to stop the Windows Anti-malware service when virus and spyware definitions are disabled.

Allow antimalware service to startup with normal priority

Modify the startup priority of the Windows Defender service. This might impact performance.

Enable or do not configure this setting to start the Windows Anti-malware service with normal priority.

© 2019 Tanium Inc. All Rights Reserved Page 101 Disable this setting to start the Windows Anti-malware service with low priority.

Configure local administrator merge behavior for lists

Control whether local preferences for exclusions and threats are merged with the group policy.

Enable or do not configure this setting to merge local preferences with the group policy. Group policy settings take precedence over local preferences.

Disable this setting to ignore local preferences.

Define addresses to bypass proxy server

Bypass the proxy for a specific IP address. The value must be a valid URL.

Define proxy server for connecting to the network

Configure a proxy to use for downloading definition updates or reporting events to MAPS. By default, the following settings are used in order:

1. Internet Explorer proxy settings 2. Auto-detect 3. None

Randomize scheduled task times

Randomize the start time of scheduled tasks.

Enable or do not configure this setting for scheduled tasks to begin randomly within 30 minutes of their scheduled start time.

Disable this setting for scheduled tasks to begin at their scheduled start time.

Turn off routine remediation

Control whether Windows Anti-malware automatically remediates threats.

Enable this setting to prevent automatic remediation. Instead, users are prompted with a choice of actions to take.

Disable or do not configure this setting to automatically take action on all detected threats.

Turn off Windows Defender

© 2019 Tanium Inc. All Rights Reserved Page 102 Turn Windows Anti-malware on or off.

Enable this setting to turn off Windows Anti-malware.

Disable or do not configure this setting to turn on Windows Anti-malware.

© 2019 Tanium Inc. All Rights Reserved Page 103 Reference: Enforcement errors

Policy update not yet received

The specified policy xml file is an outdated version on the endpoint.

This is often a temporary state that resolves after a few minutes when the endpoint finishes downloading the most recent policy version.

Policy has not been applied

The specified policy xml file is not present on the endpoint.

This might be caused by an external process removing the files. Contact your Tanium Account Manager (TAM) for assistance.

Microsoft Anti-malware is not installed

These Windows 7 machines have an Anti-malware policy deployed, but do not have SCEP installed.

Enable automatic SCEP installation in Settings -> Anti-Malware Settings by selecting Enable SCEP Installation and uploading the SCEP installer.

Microsoft Anti-malware has no definitions applied

Microsoft Anti-malware is enabled and running on these machines, but has not yet installed any anti-malware definitions.

This is often a temporary state that occurs immediately after Windows Anti-malware is enabled for the first time. If the problem persists, the machines might have an issue contacting Microsoft to get the definitions.

You can have Tanium gather and deploy Microsoft definitions by enabling the Managed Definitions option in the Protect policy.

Microsoft Anti-malware definition has not been updated within the grace period

© 2019 Tanium Inc. All Rights Reserved Page 104 Microsoft Anti-malware is enabled and running, but its anti-malware definitions are older than the policy's grace period (default = 1 day).

This is often a temporary state that can occur if a machine has been offline for an extended period. If the problem persists, it might be that the machines have an issue contacting Microsoft, or, if the Managed Definitions option is enabled, the Protect service might be having an issue downloading the definitions. Check Anti-Malware Definitions Status Health on the Protect Home page for more information.

Microsoft Anti-malware configuration does not match policy

Microsoft Anti-malware has different configuration settings than what is set in the policy. This can occur either from a user manually making a change or from an external program like Group Policy Object (GPO).

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

Microsoft Anti-malware is not set to automatic start mode

Microsoft Anti-malware service is not set to automatic start mode. This can occur either from a user manually making a change or from an external program like GPO.

Protect resets the start mode to the correct state the next time the policy is enforced (default = 1 hour).

Microsoft Anti-malware services are not all running

Microsoft Anti-malware related services are not running. This can occur either from a user manually making a change or from an external program like GPO.

Protect resets the service to the correct state the next time the policy is enforced (default = 1 hour).

Unsupported EMET Settings - (x)

The setting (x) is not supported by the version of EMET running on these endpoints. Either the version of EMET is too old to support this, or the supplied EMET xml has an error in the setting name.

© 2019 Tanium Inc. All Rights Reserved Page 105 Verify the settings you are trying to configure are valid for the version of EMET you are using.

EMET 5.5 is not installed

EMET is not installed or the installed version is older than version 5.5.

Protect installs the correct version of EMET the next time the policy is enforced (default = 1 hour).

Unexpectedly missing EMET config

Protect is missing the supplied EMET configuration. This might be due to insufficient file permissions for the Tanium Client service, or the file might have been removed by an external program.

Contact your TAM for assistance.

Unable to read settings from EMET config

Protect could not open the specified EMET configuration. This might be due to insufficient file permissions for the Tanium Client service, or the file might have been corrupted in transit.

Contact your TAM for assistance.

AppLocker is enabled. SRP might be ignored

Both AppLocker and SRP Management policies are set on these endpoints. AppLocker is the newer implementation of SRP, and Windows ignores SRP if AppLocker is enabled.

Remove either AppLocker or SRP Management policies from these endpoints.

Protect has not yet initialized Windows SRP

Protect must initialize SRP.

This is often a temporary state that occurs right after SRP is enabled for the first time. Protect correctly initializes SRP when the policy is enforced (default = 1 hour).

Endpoint requires reboot to initialize Windows SRP

© 2019 Tanium Inc. All Rights Reserved Page 106 After SRP is first initialized by Protect, the settings do not actually take effect until the system is rebooted.

You must reboot these machines to finish enabling SRP.

One or more expected Windows SRP rules was not correctly applied

SRP has different rules than what is set in the policy. This can occur either from a user manually making a change or from an external program like GPO.

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

Windows Firewall is not running

The Windows firewall service is not currently running. This can occur either from a user manually making a change or from an external program.

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

Windows Firewall GPO conflict

GPO is changing the Windows firewall settings on these endpoints. This causes settings to constantly change between the GPO values and the Protect policy values.

Using GPO for firewall with Protect firewall policies is not supported. Remove GPO management from these endpoints.

An expected rule is missing from Windows Firewall

Windows Firewall has different rules than what is set in the policy. This can occur either from a user manually making a change or from an external program.

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

An expected rule is not correct in Windows Firewall

© 2019 Tanium Inc. All Rights Reserved Page 107 Windows Firewall has different rules than what is set in the policy. This can occur either from a user manually making a change or from an external program.

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

Invalid rules are still applied

Windows Firewall has different rules than what is set in the policy. This can occur either from a user manually making a change or from an external program.

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

Firewall profile does not match policy

Windows Firewall has different rules than what is set in the policy. This can occur either from a user manually making a change or from an external program.

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

One or more invalid firewall rules found in Policy

Windows Firewall could not read some of the rules specified in the policy. This can occur if the policy is corrupted on creation or during transit to the endpoint.

If this problem persists, recreate the Protect policy.

Windows AppLocker is not enabled

Windows AppLocker service is not running. This can occur either from a user manually making a change or from an external program.

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

Windows AppLocker configuration does not match policy

© 2019 Tanium Inc. All Rights Reserved Page 108 Windows AppLocker has a different configuration than what is set in the policy. This can occur either from a user manually making a change or from an external program.

Protect resets to the correct state the next time the policy is enforced (default = 1 hour).

Windows AppLocker configuration enforced by Protect has not yet been applied

Windows AppLocker is enabled and configured, but is not yet using the new configuration.

There is a small window after the configuration is set by Protect, but before AppLocker actually starts to block applications, based on the new rules. This usually resolves itself after a few minutes.

© 2019 Tanium Inc. All Rights Reserved Page 109 Reference: Encryption management

Encryption management policies encrypt drives on endpoints using Windows BitLocker Drive Encryption. For more information about BitLocker Drive Encryption, see Microsoft: BitLocker.

Endpoint requirements

l Windows 7 Enterprise or Ultimate

IMPORTANT: Windows 7 endpoints must have a TPM chip to use BitLocker.

l Windows 8 Enterprise or Pro

l Windows 10 Education, Pro Education, Enterprise, or Pro

For more detailed Windows endpoint requirements, including TPM compatibility, see Microsoft: BitLocker.

Configuration requirements

You must complete the following steps to configure your environment to use encryption management policies:

l Create a Postgres database to store the recovery keys

l Configure the endpoint encryption settings

l Install the End-User Notifications service and initialize endpoints

l Install and configure Direct Connect

l Create and enforce the encryption management policy

Detailed steps are provided in the subsequent sections. Create a Postgres database to store the recovery keys

Before you create and enforce encryption management policies, you must create a Postgres database to store the recovery keys. Specify the Postgres connection string on the Endpoint Encryption tab in the Protect settings. For more information, see Configure endpoint encryption settings on page 27.

Any user with the Protect Administrator or Protect Recovery Key Viewer role can view the recovery keys for users on the Endpoint Recovery page. This page lists all endpoints that

© 2019 Tanium Inc. All Rights Reserved Page 110 are encrypted through a Protect encryption management policy. Select an endpoint and click Show Recovery Key to view the Recovery Key ID and Recovery Key for that endpoint.

Note: Recovery keys are used to unlock the drive if a user forgets the PIN or password. The recovery key ID displays on the BitLocker recovery page.

IMPORTANT: As a best practice, configure the Postgres database to allow only connections from the Module Server.

Configure the endpoint encryption settings

Specify the connection details for the Postgres database on the Endpoint Encryption tab in the Protect settings. For more information, see Configure endpoint encryption settings. Install the End-User Notifications service and initialize endpoints

Encryption management policies use the End-User Notifications service to display notifications throughout the encryption process. This service must be installed and initialized on endpoints before you enforce encryption management policies. For more information, see Tanium End-User Notifications User Guide: Installing End-User Notifications.

If this service is not installed and pushed out to endpoints, the policy fails to enforce. In this scenario, the End-User Notifications service is listed as the enforcement failure reason. Install and configure Direct Connect

Encryption management policies use Direct Connect to transfer encryption keys securely from the client to the Postgres database during the encryption process. This service must be installed and initialized on endpoints before you enforce encryption management policies.

If this service is not installed and pushed out to endpoints, the policy fails to enforce. In this scenario, the Direct Connect service is listed as the enforcement failure reason. Create and enforce the encryption management policy

Create the policy and enforce it on endpoints. For more information, see Create a BitLocker policy.

© 2019 Tanium Inc. All Rights Reserved Page 111 Endpoint workflow

After the policy is enforced and pushed out to endpoints, the encryption process takes place in several stages. Prepare the drive for encryption

After the policy is enforced on an endpoint, a notification displays to instruct the user to reboot the computer to prepare the drive for encryption. The user can dismiss this message. It displays every hour until the user reboots the computer.

Configure the text for this notification in the Reboot Computer section of the BitLocker policy.

Note: This action is the only BitLocker action that does not automatically repeat if it fails because manual intervention is usually required to recover from a failure during drive preparation. If this action fails on an endpoint, a failure message displays to the user, and the policy is reported as unenforced with Failed to prepare volume for encryption as the enforcement error.

Configure the PIN or password

Note: This stage occurs only if you configured the policy for TPM + PIN or Allow BitLocker to run without a compatible TPM.

After the computer reboots, the user is prompted within five minutes to set a PIN or password. Configure the text for this message in the Enter New Credentials section of the BitLocker policy.

After the user enters a PIN or password and clicks Create PIN, a notification displays to alert the user that encryption will begin after the next reboot. Configure the text for this message in the Encrypt Hard Drive section of the BitLocker policy. Depending on the operating system configuration, the user might also see a Windows notification that encryption will begin after the computer is rebooted. Encryption occurs

The next time that the user reboots the computer, they are prompted to enter the PIN or password if one was set. Encryption begins. The encryption process is not disruptive. The user sees an icon in the system tray that indicates that the drive is being encrypted, but the

© 2019 Tanium Inc. All Rights Reserved Page 112 user can continue to work. If needed, the user can right click the system tray icon and choose to pause the encryption process. Behavior at subsequent starts / reboots

After encryption completes, users are prompted for the PIN or password each time they start or reboot the computer, if one was set. In the boot screen, users see the instructions for unlocking the drive using the recovery the key if they forget their PIN or password. Configure the text for this pre-boot message in the Key Recovery section of the BitLocker policy. User forgets the PIN or password

When a user is prompted to enter the PIN or password, there is an instruction to Press Esc for BitLocker recovery. When the user presses Esc, the BitLocker recovery page displays. This page displays the text that you configure in the Key Recovery section of the BitLocker policy and the user's Recovery key ID.

The user logs in to the recovery portal using the LDAP authentication that you configured in the ecosystem.config.js file. The user enters the number of characters of the recovery key ID that you set in the MINIMUM_KEY_LENGTH parameter in the ecosystem.config.js file, selects the recovery key ID from the autocomplete results, and clicks Get Recovery Key. The user can use this recovery key to unlock the drive.

After the drive is unlocked, the user is prompted to change the PIN or password within five minutes. The text for this prompt is hardcoded and does not need to be configured in the BitLocker policy. On subsequent starts or reboots, the user uses this new PIN or password to unlock the drive.

Suspending and resuming BitLocker

During system maintenance or troubleshooting, you might need to temporarily suspend BitLocker. The key protectors are disabled when you suspend BitLocker, which allows you to bypass BitLocker without unencrypting the drive. You can resume BitLocker after you complete the maintenance or troubleshooting without having to encrypt the drive again.

Protect 2.0.2 and later includes these packages to suspend and resume BitLocker: Protect - Suspend BitLocker and Protect - Resume BitLocker. Protect - Suspend BitLocker

Use this package to suspend BitLocker on an endpoint. This package has one parameter, rebootcount. Use this parameter to specify the number of reboots

© 2019 Tanium Inc. All Rights Reserved Page 113 before BitLocker automatically resumes. If you set this parameter to 0, BitLocker never automatically resumes and must be manually resumed by running the Protect - Resume BitLocker package. Protect - Resume BitLocker

Use this package to resume BitLocker on an endpoint where it was previously suspended.

When you suspend BitLocker on an enforced endpoint, the BitLocker policy enforcement Status is Unenforced with BitLocker has been suspended as the Reason.

For more information about using actions to deploy packages to endpoints, see Tanium Console User Guide: Deploying actions.

Removing BitLocker encryption from an endpoint

Two steps are required to remove BitLocker encryption from an endpoint:

1. Remove the BitLocker policy enforcement on the endpoint. For more information, see Remove a policy enforcement. 2. Deploy an action to run the Protect - Decrypt BitLocker package on the endpoint. For more information, see Tanium Console User Guide: Deploying actions.

Note: This multistep design is intentional so that encryption is not removed from a drive if an administator inadvertently removes enforcement of the policy from an endpoint.

© 2019 Tanium Inc. All Rights Reserved Page 114