Tanium EDR Integration Setup
This guide walks you through integrating Tanium EDR with RAD Security for real-time endpoint visibility and threat response, enabling you to correlate endpoint security events with container and cloud runtime activity. Tanium provides real-time endpoint data collection, threat detection, incident response, and compliance monitoring across your entire infrastructure.Prerequisites
Before you begin, ensure you have:- Admin access to Tanium Console
- Ability to create roles, personas, and users in Tanium
- A service account dedicated for integrations (recommended)
- Access to RAD Security workspace with integration permissions
Step 1: Access Tanium Console
Log in to Console
Note Your Console URL
https://your-company.cloud.tanium.comStep 2: Create Custom Role with Minimal Permissions
Follow the principle of least privilege by creating a role with only the necessary permissions.Navigate to Roles
Create New Role
- Role Name (e.g., “RAD Security Integration Role”)
- Description (e.g., “Role for RAD Security API integration”)
- Permission Type: Allow
Assign Gateway Permissions
- Locate Gateway permissions
- Expand the section
- Select Execute permission for Gateway API
Assign Platform Content Permissions
- Select Platform Content Permissions
- Check the Read option
- Click the icon with a number (n+) that appears
- Select the following Content Sets:
- Reserved
- Base
- Core Content
- Comply Reporting
Save Role
Step 3: Create Persona with Custom Role
Personas in Tanium combine roles with computer group access to define the scope of access.Navigate to Personas
Create New Persona
- Persona Name (e.g., “RAD Security Integration Persona”)
- Description (e.g., “Persona for RAD Security API access”)
Assign Role
Configure Computer Groups
- Open the Computer Groups section
- Check the Unrestricted Management Rights checkbox
Assign Users
- Open the Users section
- Assign one or more users to this persona
Save Persona
Step 4: Generate API Token
Log in as Service Account
Navigate to API Tokens
Create New API Token
Configure Token Details
- Add a description to identify the token’s purpose (e.g., “RAD Security Integration”)
- Recommended: 14 days for production
- Default: 7 days
- Maximum: 365 days
Assign Persona
Configure Trusted IP Addresses
- Add RAD Security IP addresses (provided by your RAD Security team)
- You can use
0.0.0.0/0for initial testing - Remove this before production deployment
0.0.0.0/0 allows access from any IP address. Only use this for sandbox testing and never in production environments.Generate Token
Save Token Securely
Step 5: Configure in RAD Security
Navigate to your RAD Security workspace and configure the Tanium integration with the following parameters:Required Parameters
| Parameter | Description | Example |
|---|---|---|
| Base URL | Your Tanium Console URL | https://your-company.cloud.tanium.com |
| Secret | The API token generated in Step 4 | your-api-token-here |
Verify Integration
After completing the setup, verify your integration is working:- Navigate to Data Sources > Integrations > EDR in RAD Security
- Locate your Tanium integration
- Check the connection status shows as Connected
- Verify endpoint data is being synced
What Data is Synced
Once configured, RAD Security will sync the following data from Tanium:Endpoint Information
Endpoint Information
- Real-time endpoint inventory
- Operating system details
- Computer names and IP addresses
- Last seen timestamps
- Network configuration
- Tanium client version and status
Vulnerability Data
Vulnerability Data
- Software vulnerabilities using default sensors
- Missing patches and updates
- CVE information
- Vulnerability severity scores
- Remediation recommendations
Compliance Data
Compliance Data
- Compliance posture assessments
- Policy violations
- Configuration baselines
- Comply Reporting data
- Audit findings
Threat Detection
Threat Detection
- Security events
- Threat indicators
- Suspicious activities
- IOC detections
- Behavioral anomalies
Software Inventory
Software Inventory
- Installed applications
- Software versions
- Unmanaged software
- License information
- End-of-life software
Token Rotation
Regular token rotation is a security best practice. Follow these steps to rotate your API token:Rotate Token in Tanium
- Go to Administration > Permissions > API Tokens
- Select your existing API token
- Use the Rotate feature
- Save the new token immediately
Update Token in RAD Security
- Navigate to your Tanium integration in RAD Security
- Update the token with the newly rotated value
- Verify the connection still works
Set Reminder
Use Cases
Real-Time Visibility
Vulnerability Management
Compliance Monitoring
Incident Response
Troubleshooting
Authentication Failed
Authentication Failed
- API token is incorrect or expired
- Token was rotated and not updated
- Service account permissions changed
- Token not generated by correct service account
- Verify the token is copied correctly (no extra spaces)
- Check token expiration date in Tanium
- Ensure service account still has assigned persona
- Try logging in as the service account to verify it’s active
- Generate a new token if needed
Insufficient Permissions
Insufficient Permissions
- Role missing Gateway API execute permission
- Platform Content permissions not configured
- Persona not assigned correct role
- Missing required content sets
- Verify role has Gateway API Execute permission
- Check Platform Content Read permission is granted
- Ensure all 4 content sets are selected (Reserved, Base, Core Content, Comply Reporting)
- Verify persona is assigned to the token
- Review RBAC configuration following Tanium’s guide
IP Address Blocked
IP Address Blocked
- RAD Security IP addresses not in trusted IPs list
- Incorrect IP address format
- Firewall blocking connections
- Verify RAD Security IP addresses are added to trusted IPs
- Contact RAD Security support for current IP addresses
- Check IP address format is correct (CIDR notation)
- Review firewall rules allowing Tanium API access
- For testing, temporarily use
0.0.0.0/0(sandbox only!)
No Data Syncing
No Data Syncing
- No endpoints reporting to Tanium
- Computer group access restricted
- Default sensors not enabled
- Initial sync still in progress
- Verify Tanium clients are installed and connected
- Check computer group access (Unrestricted vs specific groups)
- Confirm default sensors are active
- Allow up to 15 minutes for initial data sync
- Review integration logs in RAD Security for errors
Token Expired
Token Expired
- Token reached its expiration date
- Token was manually revoked
- Check token expiration in Tanium
- Rotate the token to generate a new one
- Update RAD Security integration with new token
- Set a calendar reminder for next rotation
- Consider using longer expiration periods (e.g., 90 days) if frequent rotation is challenging
Service Account Issues
Service Account Issues
- Service account was disabled or deleted
- Service account password changed
- Persona unassigned from service account
- User removed from persona
- Verify service account is active
- Check persona assignment in Administration > Permissions > Personas
- Ensure service account is still listed under Users for the persona
- Re-add service account to persona if needed
Security Best Practices
Use Service Accounts
Least Privilege Access
Rotate Tokens Regularly
Restrict IP Addresses
0.0.0.0/0 in production environments.