Skip to main content

Audit Policy settings for PCI Compliance

This article describes the audit policy required for PCI Compliance.

Required Audit Policy

The following Audit Policy is required for PCI Compliance:

  • Account Logon EventsSuccess and Failure
  • Account Management EventsSuccess and Failure
  • Directory Service Access EventsFailure
  • Logon EventsSuccess and Failure
  • Object Access EventsSuccess and Failure
  • Policy Change EventsSuccess and Failure
  • Privilege Use Events - Failure
  • Process TrackingNo Auditing
  • System EventsSuccess and Failure

Directory Service Access Events are available on a Domain Controller only.
Object Access – used in conjunction with Folder and File Auditing. Auditing Failure reveals attempted access to forbidden secure objects which may be an attempted security breach. Auditing Success is used to provide an audit trail of all access to secured data, for example, card data in a settlement/transaction file or folder.

Recommendations

  1. Use Netwrix File Server Change Reporter to monitor file changes; do not enable this audit policy for Event Log Manager.
  2. NOTE: When using Windows Server 2008 / Windows 7 or later, there is an Advanced Audit Policy Configuration option available which allows more precise application of auditing of Object Access events and is useful in eliminating unwanted events. If available, enable the Audit File System option only for Success, and optionally Failure, but leave other settings as Not Configured.
  3. Process Tracking – not recommended, as this will generate a large number of events.

You should configure the following policies and leave the other policies as is:

  • System EventsSuccess and Failure
  • Policy Change EventsSuccess and Failure
  • Account Management EventsSuccess and Failure
  • Account Logon EventsSuccess and Failure
  • Logon EventsSuccess and Failure
  • Privilege UseNo auditing