Free Tool: 1.4: Personal Firewall Software


Install personal firewall on devices that connect to the Internet outside of internal network, but also used to access the CDE









Action1 Customers

Portable computing devices that are allowed to connect to the Internet from outside the corporate firewall and then used to access the cardholder data environment (CDE) are more vulnerable to Internet-based threats. This PCI requirement mandates that personal (desktop) firewall must be installed on all portable devices used by employees to connect to the Internet outside of organization's network, which are also used to access the CDE. This includes devices owned by organization and employees. This section requires specific firewall configuration settings to be defined, and also firewall must be active and restricted from reconfiguration (so users cannot alter its settings or deactivate it).

1.4.a: Personal Firewall Status
    Examine desktop firewall configurations to verify that the it is installed, configured, active and not alterable by users

Sign-up for Action1 Free Edition to install/uninstall software and patches, receive real-time alerts and view instant data from your endpoints, or run live or scheduled queries with the ability to export to CSV or Excel. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.



Hundreds of Organizations Worldwide Use Action1 Platform


Community College in Texas

Our students love technology. But sometimes they break it too. Action1 allows us to understand all abnormal activities happening on college computers.

Community College in Texas

European Construction Conglomerate

Action1 plays a critical role in our cybersecurity strategy. The ability to instantly understand what is happening on your endpoints is priceless.

European Construction Conglomerate

City Government in Georgia

Our city prides on being one of the most digititally transformed cities in the region. Without Action1, the risks of managing the infrastructure were too high.

City Government in Georgia



Find more information on 1.4: Personal Firewall Software at Microsoft TechNet.