Tanium Dependencies
| Component | Requirement |
|---|---|
| Tanium Client | Any supported version of Tanium Client. Using an unsupported version may result in unavailable features or stability issues that can only be resolved by upgrading. See Tanium Client Management User Guide: Client version and host system requirements for the supported version list. |
Supported Endpoint Operating Systems
The following endpoint operating systems are supported with Tanium Cloud:
- Windows
- macOS
- Linux
- Solaris
- AIX
For full Tanium Client OS support details, see Tanium Client Management User Guide: Client version and host system requirements.
Identity Provider (IdP) Requirements
Each customer must bring a SAML 2.0–compliant identity provider with two-factor authentication (2FA) enabled to use Tanium Cloud in production. Configuration of multiple identity providers for a single Tanium Cloud instance is supported.
Supported identity providers include:
- Microsoft Entra ID
- Okta
- Microsoft Active Directory Federation Services (ADFS)
- OneLogin
- Auth0
Port and Network Requirements
The following ports and destinations are required for Tanium Cloud communication. The <customerURL> variable represents the subdomain specified during initial provisioning of your Tanium Cloud service instance.
| Source | Destination | Port | Protocol | Purpose |
|---|---|---|---|---|
| Tanium Client | Peer Clients | 174721 | TCP | Peer-to-peer communication between Tanium Clients |
| Tanium Client | Tanium Cloud Client Edge URLs2 | 174721 | TCP | Communication between the Tanium Client and Tanium Cloud |
| Tanium Client | Tanium Client (loopback) | 17473 | TCP | Tanium Client API. Used with the loopback interface only — does not typically require a firewall rule. |
| Tanium Client | Tanium Cloud Client Edge URLs2 | 17486 | TCP | Outbound communication from the Tanium Client and inbound communication to Tanium Cloud for Direct Connect endpoint connections |
| Tanium Client | Tanium Cloud:distribute.cloud.tanium.com*.distribute.cloud.tanium.comTanium Cloud for U.S. Government: N/A | 443 | TCP (HTTPS) | Content Delivery Network (CDN) downloads3 |
| Endpoints installing Tanium Client via Azure VM extension | content.tanium.com | 443 | TCP (HTTPS) | Endpoint downloads the Tanium Client installer. See Tanium Client Management User Guide: Deploy the Tanium Client in Microsoft Azure environments using the Tanium Client VM extension. |
| Endpoints accessing Tanium Console | Tanium Cloud:<customerURL>.cloud.tanium.com4,5Tanium Cloud for U.S. Government: <customerURL>.cloud.taniumfed.com4,5 | 443 | TCP (HTTPS) | Browser access to the Tanium Console |
| Endpoints accessing Tanium API | Tanium Cloud:<customerURL>-api.cloud.tanium.com5Tanium Cloud for U.S. Government: <customerURL>-api.cloud.taniumfed.com5 | 443 | TCP (HTTPS) | Tanium API access. See API Access section below. |
| Endpoints accessing Tanium Account | Tanium Cloud:account.tanium.com*.cloud.tanium.comTanium Cloud for U.S. Government: N/A | 443 | TCP (HTTPS) | Browser access to Tanium Account for managing your Tanium Cloud instance |
1 The port Clients use for peer communication can be changed. See Tanium Client Management User Guide: Customize listening ports.
2 Tanium Clients connect to the Client Edge URLs shown in your Tanium Account. See View administration information and configure administrative settings and Tanium Client Management User Guide: Configuring connections to the Tanium Core Platform. For Tanium Cloud for U.S. Government, Client Edge URLs are provided during initial provisioning.
3 All endpoints using CDN downloads must allow this HTTPS communication and connect directly to the destination without interference. This communication is bidirectional but always initiated from the Tanium Client — no inbound rule is required on the Client side. If wildcards are not permitted, you must create a rule for each <n>.distribute.cloud.tanium.com FQDN where <n> represents numerals 1–20. See Tanium Console User Guide: Managing bandwidth throttles and CDN downloads.
4 These URLs are publicly searchable.
5 The <customerURL> component is determined during initial provisioning. See Make initial elections.
CDN Connectivity
Tanium Client 7.6 and later (USA region) and Tanium Client 7.8 and later (all other regions) support the Tanium Content Distribution Network (CDN) for optimized action package delivery. The CDN routes Client connections through the shortest and most efficient path among CDN entry points.
If a CDN connection is unavailable (for example, due to network restrictions), Clients automatically fall back to downloading package files directly from Tanium Cloud.
distribute.cloud.tanium.com or associated IP addresses is not required in that environment.Use one of the following methods to allow CDN communication, depending on your security policies and firewall capabilities:
- Create an ACL or firewall rule referencing
https://distribute-info.cloud.tanium.com/ip-ranges/ip-ranges.jsonto allow communication from the Tanium Client to the IP address ranges in that file. - Allow communication from the Tanium Client to the URL pattern
*.distribute.cloud.tanium.com. - Explicitly allow communication from the Tanium Client to each URL
<n>.distribute.cloud.tanium.com, where<n>represents numerals 1–20 (e.g.,1.distribute.cloud.tanium.com,2.distribute.cloud.tanium.com, etc.). - Create an ACL or firewall rule that explicitly allows the IP address ranges listed in the file above, and schedule regular updates to keep the ACL current as IP ranges change over time.
An up-to-date list of CDN IP address ranges is always available at:https://distribute-info.cloud.tanium.com/ip-ranges/ip-ranges.json
Firewall and Proxy Support
Firewall
Tanium Cloud supports Clients behind a firewall (direct route), as long as the Clients can reach two internet IP addresses on two TCP ports.
Proxy
Tanium Cloud supports Clients behind an HTTPS proxy (indirect route), as long as the Clients can reach two internet IP addresses on two TCP ports. For configuration details, see Tanium Client Management User Guide: Connect through an HTTPS forward proxy server.
API Access
To access the Tanium Cloud APIs, you must first create an API Token. See Tanium Console User Guide: Create API tokens.
<customerURL>-api.cloud.tanium.com<customerURL>-api.cloud.taniumfed.comThe <customerURL> variable is the subdomain specified during initial provisioning. See Make initial elections.
Network Egress
To allow outbound communications from Tanium Cloud to specific destinations, you can configure network egress allow list rules. See Configuring network egress for Tanium Cloud for details.
Solution-Specific Port Requirements
The following Tanium modules and shared services have their own port requirements. Modules marked No additional ports require only the base Tanium Cloud ports documented above.
- AssetNo additional ports
- AutomateNo additional ports
- BenchmarkNo additional ports
- Certificate ManagerNo additional ports
- Client ManagementSee module guide
- Cloud WorkloadsNo additional ports
- ComplySee module guide
- ConnectSee module guide
- CriticalitySee module guide
- DeployNo additional ports
- Direct ConnectSee module guide
- Directory QuerySee module guide
- DiscoverSee module guide
- Endpoint ConfigurationNo additional ports
- Endpoint Management for MobileSee module guide
- End-User NotificationsNo additional ports
- EnforceSee module guide
- EngageSee module guide
- GatewayNo additional ports
- GuideNo additional ports
- Health CheckSee module guide
- ImpactSee module guide
- Integrations GallerySee module guide
- Integrity MonitorNo additional ports
- InteractNo additional ports
- InvestigateSee module guide
- Jump GateNo additional ports
- Mac Device EnrollmentSee module guide
- PatchNo additional ports
- PerformanceSee module guide
- ProvisionSee module guide
- ReportingNo additional ports
- ReputationNo additional ports
- RevealSee module guide
- Threat ResponseSee module guide
- TrendsNo additional ports
- Zero TrustSee module guide
For modules marked See module guide, click the module name in the Tanium documentation portal to access port requirements specific to that solution.
Security Exclusions
If antivirus (AV) or other security software is present in the environment to monitor and block unknown host system processes, a security administrator must create exclusions to allow Tanium processes to run without interference. This includes security software bundled with the endpoint OS — for example, fapolicyd on some Linux distributions, or Microsoft Defender on Windows.
For the complete list of security exclusions to define across Tanium, see Tanium Client Management Guide: Reference: Endpoint security exclusions. For product-specific guidance, see the related articles below.
User Role Requirements
Tanium Account User Roles
User roles in your Tanium Account determine which users can manage the configuration of your Tanium Cloud service instance. See Tanium Account User Guide: Tanium Account user roles for role definitions and permissions.
Tanium Core Platform User Roles
For information about role permissions and associated content sets in Tanium Core Platform, see Tanium Core Platform User Guide: Managing RBAC.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article