Ensure that time synchronization is configured and secured properly |
Time synchronization technology allows the clocks of all systems to be the same. This make it much easier to analyze the log files when a cross match between different systems is required. Attackers may tamper with time synchronization to complicate log analysis. Action1 helps to automate assessments of time sync configuration to demonstrate your compliance with this section of PCI DSS.
10.4.1.b: Time Settings
Ensure that all endpoints have correct and consistent time
10.4.2: Time Protection
Verify that any changes to time settings are logged
Sign-up for Action1 Free Edition to receive real-time alerts and view instant data from your endpoints, such as alert on 10.4: Time Synchronization Configuration created, deleted or modified or run live or scheduled queries with the ability to export to CSV or Excel. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.
Endpoint configuration management in the Cloud
Manage endpoint configuration using plain English from the Cloud. Such as type 'Windows services' or 'reboot computer'.
Get results instantly from live systems and run automated actions.
Find more information on 10.4: Time Synchronization Configuration
at Microsoft TechNet.