Since the upgrade, I no longer have the report template for PCI Compliance that I had in MR3. While there is a Wireless PCI Compliance template, can somebody help me figure out how to either find the old one or customize one of the others to continue reporting?
I do the vulnerability scans from a FGT-620B and the FA-1000 runs the reports.
What have you noticed missing from the new report format that you used to have in the old one?
I also upgraded to v5.0.7 and I have had to produce a custom dataset to get what I want.
Happy to share what I have written if it can help you.
Here is the SQL that I am using to get a list of Unclassified APs where the Signal Strength indicates that the AP might be close to (or even inside) our building:
max(signal) as strength,
onwire as on_wire,
(case apstatus when 0 then ' unclassified' when 1 then ' rogue' when 2 then ' accepted' when 3 then ' suppressed' else ' others' end) as ap_full_status
and bssid is not null
and onwire=' no'
and logid=' 43521'
and signal > -75
group by ssid,
order by strength desc
Thanks for the response.
It is great to see what you have done as I suspect that I will have to use some of your work. The report was a PCI Compliance report and was separate from the PCI Wireless Compliance report that remains. The scanner would allow you to run against some hosts for known issues. Combined with the log files, you could get a pretty nice report.
I suspected that it would be custom - posting was an effort to see if anyone else had seen it go missing.
I've had a look back at the reports that I used to get prior to our upgrade. The one I was thinking of was called "Wireless PCI Report".
So maybe we are a bit at cross-purposes. I have a vague recollection of another kind of PCI report, but maybe my memory is faulty. Despite searching my mail archives, I can't locate one to compare with.
Would you like to swap report examples (PDF) via email and see if that triggers anything useful?
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.