From Tanium 6.5 Security Technical Implementation Guide
Part of SRG-APP-000516
Associated with: CCI-000366
When using the Tanium Client Deployment Tool (CDT), using psexec represents an increased vulnerability as the NTLM hash and clear text passwords of the authenticating user is exposed in the memory of the remote system.
NOTE: The Tanium Server uses a renamed version of the psexec tool to be used when deploying packages to clients. In order to ensure psexec is not used, the renamed psexect.exe must be removed from the Tanium Server directory. Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Navigate to \Program Files(x86)\Tanium\Tanium Client Deployment Tool folder. If the file "psexect.exe" exists, this is a finding.
Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Navigate to \Program Files(x86)\Tanium\Tanium Client Deployment Tool folder. Remove the file "psexect.exe".
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer