Endpoint Protection

 View Only
Expand all | Collapse all

SEP to Test for the presence of wireless access points and detect unauthorized wireless access points.

  • 1.  SEP to Test for the presence of wireless access points and detect unauthorized wireless access points.

    Posted Aug 07, 2012 12:09 AM

    Hi All,

    I wonder if SEP cleint v 12.1 can do the following requirement for the Banking & Financial industry standard (PCI):

    Test for the presence of wireless access points and detect unauthorized wireless access points on a quarterly basis.

    how to achieve that in SEP deployment ?

    Thanks



  • 2.  RE: SEP to Test for the presence of wireless access points and detect unauthorized wireless access points.

    Posted Aug 07, 2012 12:11 AM

    Here's the thing that I'd like to try it on

     

    PCI-DSS v2.0 Requirements

    Testing Procedures

    11.1 Test for the presence of wireless access points and detect unauthorized wireless access points on a quarterly basis.

    Note: Methods that may be used in the process include but are not limited to wireless network scans, physical/logical inspections of system components and infrastructure, network access control (NAC), or wireless IDS/IPS.

    Whichever methods are used, they must be sufficient to detect and identify any unauthorized devices. 

    11.1.a Verify that the entity has a documented process to detect and identify wireless access points on a quarterly basis. 

     

    11.1.b Verify that the methodology is adequate to detect and identify any unauthorized wireless access points, including at least the following:
    * WLAN cards inserted into system components
    * Portable wireless devices connected to system components (for example, by USB, etc.)
    * Wireless devices attached to a network port or network device

     

    11.1.c Verify that the documented process to identify unauthorized wireless access points is performed at least quarterly for all system components and facilities.

     

    11.1.d If automated monitoring is utilized (for example, wireless IDS/IPS, NAC, etc.), verify the configuration will generate alerts to personnel. 

     

    11.1.e Verify the organization’s incident response plan (Requirement 12.9) includes a response in the event unauthorized wireless devices are detected.