Audience
This article is written for Enterprise Service Engineers, Technical Account Managers, and MSP engineers who manage SentinelOne in Tanium customer environments. It applies to new deployments and to any existing environment where SentinelOne exclusions have not yet been configured or validated.
Before You Begin
- Confirm you have administrative access to the SentinelOne management console.
- Know the Tanium Client installation path on your endpoints — default paths are listed in the exclusion table below.
- Review any existing SentinelOne exclusion policies to understand current coverage before making changes.
- For module-specific exclusions (especially Threat Response and Reveal), consult the Tanium Security Exclusions documentation in addition to the paths below.
Types of SentinelOne Exclusions
SentinelOne supports five exclusion modes. Each provides a different level of monitoring reduction. Select the mode that resolves the performance issue while retaining as much security coverage as possible.
| # | Exclusion Mode | Description |
|---|---|---|
| 1 | Suppress Alerts | Suppresses alerts for the excluded path without reducing inspection activity. Monitoring continues; detections are silenced. |
| 2 | Interoperability | Reduces some monitoring on the excluded path to improve compatibility with third-party software. |
| 3 | Interoperability Extended | Further reduces monitoring. Note: this mode has been observed to still block Tanium scripts under certain conditions — see Customer Case Example below. |
| 4 | Performance Focus RECOMMENDED | Significantly reduces resource consumption for the excluded path. Allows Tanium scripts and child processes to run normally. Recommended starting point for Tanium exclusions. |
| 5 | Performance Focus Extended RECOMMENDED | Maximum performance reduction. Use when Performance Focus alone does not fully resolve the issue. |
For full details on each mode, see the SentinelOne Path Exclusion documentation.
Recommended Tanium Exclusion Mode
Tanium recommends configuring SentinelOne exclusions using Performance Focus or Performance Focus Extended.
Because Tanium uses both built-in and custom scripts (PowerShell, Python, etc.) to query endpoints and run module operations, SentinelOne can inadvertently block these scripts during Patch or Deploy module scans — and may also prevent Tanium packages from spawning child processes correctly. The Interoperability and Interoperability Extended modes have been observed to be insufficient in some environments.
Resolution:Setting the SentinelOne exclusion for the Tanium Module Server to Performance Focus restored normal operation of all Tanium modules and customer scripts.
Exclusion Path Reference
Apply Performance Focus (or Performance Focus Extended) exclusions to the following paths. Exclude all subfolders and files.
| OS | Path to Exclude | Notes |
|---|---|---|
| Windows | \Program Files (x86)\Tanium\*\Program Files\Tanium\* | Covers both 32-bit and 64-bit client installs. Include all subfolders. |
| Linux | /opt/Tanium/TaniumClient/** | Include leading forward slash. Covers all subfolders and files. |
| macOS | /Library/Tanium/TaniumClient/** | Include leading forward slash. Covers all subfolders and files. |
Create a Path Exclusion
Steps
- Log in to the SentinelOne management console and navigate to Sentinels > Exclusions.
- Click New Exclusion and select Path as the exclusion type.
- Enter the appropriate path for your platform from the table above.
- Set the Exclusion Mode to Performance Focus. Use Performance Focus Extended only if Performance Focus does not resolve the issue.
- Select the appropriate Operating System to scope the exclusion.
- Add a description — for example: Tanium Client folder – MSP exclusion.
- Assign the exclusion to the correct Site or Group scope for your environment.
- Click Save to apply.
- Repeat for each additional platform (Windows, Linux, macOS) as needed.
Measurable Benefits of Exclusions
CPU Usage
- Without exclusions, SentinelOne has been observed causing frequent CPU usage of 60–80% with sustained peaks up to 100% during Tanium module activity — including Patch and Comply scans that may fail to run entirely.
- With Performance Focus exclusions in place, a reduction of 30–50% in CPU usage has been consistently observed across affected endpoints.
Memory Usage
- SentinelOne kernel mode drivers have been observed consuming 2–6 GB of RAM whenever they actively scan a Tanium module operation such as a Patch or Comply scan. This is particularly impactful on VDIs, web farms, and any endpoint with less than 6 GB of free RAM.
- Example: On a Windows Server with 8 GB RAM and 6 GB of workload (2 GB free), SentinelOne consumed over 1.7 GB of RAM during a daily Tanium Patch scan — causing significant performance issues multiple times per day. The heavy memory consumption was completely resolved once the required Tanium exclusions were applied.
Why Folder-Level Exclusions Are Recommended
Tanium is a platform for sensors and packages. Any script or action can be deployed to endpoints by a customer's Security or Operations team, meaning a deployment can accumulate 20–40 custom packages over time. Each Tanium action also launches from a dynamically named subfolder (Action_####) under the Tanium Downloads directory, making individual process exclusions impractical to maintain at scale.
Rather than requiring 45–95+ individual AV exclusions for Tanium processes alone, folder-level exclusions covering the paths below represent a balanced, maintainable approach:
\Program Files (x86)\Tanium\*\Program Files\Tanium\*/opt/Tanium/TaniumClient/**/Library/Tanium/TaniumClient/**
Frequently Asked Questions
Q: How can Tanium be secure if SentinelOne is not actively inspecting it?
A: Tanium has multiple layers of tamper protection that operate independently of AV scanning:
- Tanium files are digitally signed — if modified or tampered with in any way, they will not load.
- Tanium NTFS folder permissions are restricted to Local System only, preventing unauthorized modification by non-administrative processes.
- All Tanium message traffic is signed. Tampered messages are detected and refused, meaning Tanium cannot be used as a vector for man-in-the-middle attacks.
- An attacker attempting to exploit Tanium would already need Local Administrator access — at which point they have full control of the endpoint through the OS itself, independent of Tanium.
- Threat actors are far more likely to target user credentials and sensitive data directly rather than attempting to brute-force security tooling.
Q: Why are folder-level exclusions recommended instead of individual process exclusions?
A: Some antivirus software requires excluding the installation directories of the Tanium Client and (for Windows deployments) Tanium Core Platform servers from real-time inspection. Folder exclusions are the recommended best practice for SentinelOne to allow full Tanium functionality.
Because Tanium actions launch from dynamically named subfolders (Action_####) and because customers commonly deploy their own custom scripts and packages over time, individual process exclusions cannot be maintained at scale. A folder-level exclusion covering the Tanium installation directory is the only practical long-term approach.
Q: Why does Tanium require so many exclusions?
A: Tanium is ultimately a platform for sensors and packages. Any script or action a customer's Security or Operations team needs can be pushed to endpoints — custom Python scripts, PowerShell diagnostics, compliance checks, and more. Over time this can result in 20–40 customer-specific packages that must be excluded in addition to Tanium's built-in executables. Folder-level exclusions eliminate the need to maintain an ever-growing list of individual process exclusions in your AV policy.
Q: What if Tanium scripts are still failing after adding exclusions?
A: If Tanium Patch, Comply, or custom scripts continue to fail after adding Performance Focus exclusions, first verify the path syntax is correct for the target OS. Then confirm the exclusion is scoped to the correct Site or Group in SentinelOne. If issues persist, upgrade the exclusion mode to Performance Focus Extended and retest. If problems continue, check whether Tamper Protection settings in SentinelOne are blocking Tanium processes independently of path exclusions.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article