If:
a. terminal can reach web
b. infected with keylogger
c. router protocols have not been locked down
d. content filtering (port 80) has not been locked down.
terminal can transmit card data out of the network, not pci compliant.
If:
a. terminal running current def's on background virus scanner.
b. probably not infected with keylogger.
c. router protocols not capable of being locked down.
d. router does not support content filtering.
card data probably won't be compromised, but not pci compliant.
I think they are looking at potential configuration errors accross the board.
pci compliance 2.0 is no joke, it covers a lot including lan vulnerability scanning, not just the public IP, monitoring of changes to OS (including terminals), local policy configuration such as local account password expiration and complexity, etc.
a. terminal configured to access web
b. terminal has current def's with background virus scanner.
c. terminal has ManageEngine SMP pro install with compliant config on server
d. terminal has had local policy modified to support password complexity and expiration, NTLMv2 disabled, guest acct toast etc.
e. router protocols configured to support only required communication by employing deny all rule.
f. router content filtering employed to support only required credit card processing sites.
terminal is pci compliant, unlikely to transmit cc data.
-except when you add a dvr on the same lan segment.
As far as I know, Radiant's terminals do not encrypt MSR data, unless you purchase a secure MSR, encode a shared encrytion key at firmware level in the MSR, and the target app, be it Matre'D, Aloha, etc... But if you use OPOS, Aloha doesn't seem to complain, and I don't think using OPOS magically turns off keyboard wedge functions at the MSR.
And here's one for ya, use of RFS: supposedly makes Aloha pci compliant, yet it uses the M$ ACL with NETBIOS LANA segment locking for CTL, runs as a service based DCOM package (not a tray applet), and defeats M$ EULA 10 connection limit technically violating every terminal EULA out there in effect rendering end users from being able to continue to use Windows. They say it must be used under Aloha to be pci compliant, so does pci compliance actually exist in Aloha? Well, the BSA hasn't raided yet, but I'm not counting chickens.
To my understanding, antivirus on terminals was not entirely clear, but is a requirement on BOH, if you are still allowed to use Windows.