Remote Remediation
One of the most powerful aspects of Tanium Investigate is that you can move seamlessly from investigation to remediation without ever leaving the console. In traditional IT workflows, investigation and remediation are separate activities in separate tools -- each tool switch adds time, context loss, and friction. Tanium eliminates this gap with a single-pane investigate-fix-verify workflow.
The Investigate-Remediate-Verify Workflow
Built-In Remediation Actions
This investigate-then-remediate workflow is transformative for MTTR. Instead of a 45-minute cycle of investigating in one tool, documenting, switching to another tool, re-authenticating, and finding the endpoint again -- you can go from identification to resolution in under 5 minutes, all within a single pane of glass.
Simulated: SEV Remediation Panel
| Action | Description | RBAC Level | Status |
|---|---|---|---|
| Reboot (Scheduled) | Schedule graceful reboot for 6:00 PM today | Standard | Available |
| Windows Update Reset | Reset WU components, clear SoftwareDistribution | Standard | Available |
| Disk Cleanup Package | Clear temp files, browser cache, WU cache | Advanced | Available |
| Endpoint Isolation | Network quarantine (Tanium channel preserved) | Security | Restricted |
Built-In Actions: Details
Custom Tanium Package Deployment
When built-in actions are not sufficient, deploy custom Tanium packages directly from within Investigate. A package is a pre-built bundle containing scripts, binaries, or config files with execution instructions.
Define
Document what issue the package resolves and what conditions indicate the problem.
Script
Write a PowerShell or Bash script. Keep it idempotent -- running twice should not cause harm. Include error handling.
Package
Create the Tanium package: upload script, define parameters, set timeout, specify exit codes.
Pilot
Deploy to a single test machine first. Verify execution, check for side effects, confirm reporting.
Deploy
Deploy from SEV or Direct Connect during investigation. Monitor execution result in real time.
Well-designed packages become your team's remediation library -- a growing collection of tested, documented fixes that any authorized team member can deploy consistently. Over time, this library dramatically reduces resolution time for recurring issues.
Containment Actions
| Action | What It Does | When to Use | Impact |
|---|---|---|---|
| Endpoint Isolation | Blocks all network traffic except Tanium client-to-server communication | Suspected malware, data exfiltration, active security incident | High -- user loses all network access |
| Application Control | Blocks specific executables from running via AppLocker policies | Malicious or unauthorized application identified during investigation | Medium -- only targeted app blocked |
| Firewall Modification | Add/modify Windows Firewall rules to block specific ports, IPs, or apps | Targeted containment when full isolation is too disruptive | Low-Medium -- surgical network control |
RBAC Controls: Who Can Do What
| Role | Permissions | Typical Assignment |
|---|---|---|
| Read-Only | View all investigation data, no remediation actions | Junior analysts, auditors |
| Standard Remediation | Service restarts, process kills, scheduled reboots | Experienced help desk engineers |
| Advanced Remediation | Custom packages, file deletion, system config changes | Senior engineers, escalation teams |
| Containment | Isolation, quarantine, firewall changes | Security operations, incident response |
RBAC policies are enforced at the server level. Even if someone finds the URL or API call for a restricted action, the server rejects the request if the user's role does not permit it.
Verifying Remediation
Check Metrics
After killing a runaway process, watch CPU utilization drop in real time within seconds.
Refresh Data
After deploying disk cleanup, refresh the disk utilization view to confirm free space increased.
Re-Query
Re-run the original investigation query to confirm the problem condition no longer matches.
Check Services
After restarting a service, verify it is running and in the expected state.
Monitor
For intermittent issues, check back in 30-60 minutes to confirm the problem has not returned.
Audit Logging
Every remediation action -- built-in or custom -- is automatically logged. The log captures: the operator, target endpoint(s), specific action taken, parameters used, result (success/failure/timeout), and timestamp. This logging is non-optional and non-configurable.
Never deploy remediation actions to your full production fleet without testing on a pilot group first. Even a well-intentioned script can have unintended consequences: a disk cleanup that deletes application data, a registry fix that breaks another app, or a service restart that causes a cascade failure. Always test on 5-10 representative endpoints, verify results, then expand. The 15 minutes you spend on a pilot test can save hours of recovery work.
Match the Remediation Action to Its Use Case
For each scenario below, select the most appropriate remediation action:
A. A user's laptop has 98% disk usage due to a massive CBS.log file in the Windows temp directory.
B. Windows Update has been stuck at "Checking for updates" for 3 hours and is consuming 40% CPU via svchost.exe (wuauserv).
C. Security flags an endpoint running a suspicious executable that is making outbound connections to an unknown IP address.
D. An endpoint has been running for 45 days without a reboot and has accumulated memory leaks, pending updates, and a degraded health score of 35.
Scenario: What Would You Do?
Ticket: INC0093182
Reported by: Help desk L1, escalated to your team
Subject: "Endpoint CAEI782014 -- user says Outlook freezes every 10 minutes. L1 tried reboot, didn't help."
Your investigation: You open the SEV and see that SearchIndexer.exe is consuming 100% of one CPU core and doing heavy disk I/O. The C: drive is at 94% capacity. The endpoint has been up for 38 days.
What is your recommended remediation plan?
✍ Knowledge Check
1. What is the primary advantage of remediating directly from within Tanium Investigate instead of switching to a separate tool?
2. When an endpoint is isolated/quarantined via Tanium, what happens to the Tanium client connection?
3. Why should you always test remediation packages on a pilot group before deploying to the full fleet?
DEX Specialization Training © 2026