This app is archived. Learn more
Gathers wireless status from the OS and makes it's CIM compliant for Splunk ES/PCI. Includes some useful tags. Tested on centOS5, 6, 7 and Windows 7/2012. Solves some of your PCI 3.2 requirements - 11.1.b Verify that the methodology is adequate to detect and identify any unauthorized wireless access points, including at least the following: - WLAN cards inserted into system components - Portable or mobile devices attached to system components to create a wireless access point (for example, by USB, etc.)
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources