Anti-Malware Audit Logs

PCI DSS 4.0.1 requires you to enable audit logging on your anti-malware tools and retain those logs according to the log-retention rules in PCI DSS Requirement 10.5.1 (PCI DSS v4.0.1 Requirement 5.3.4). Operationally, you must prove anti-malware events are captured, centrally retained, protected from tampering, and retrievable for audit and investigation.

Key takeaways:

  • Turn on anti-malware logging everywhere anti-malware is required, then forward logs to your central logging/SIEM.
  • Retain anti-malware logs per the same retention standard you use for other PCI security logs (Req. 10.5.1).
  • Auditors will ask for evidence of enablement, coverage, retention, and the ability to retrieve specific events quickly.

“Anti-malware audit logs” sounds straightforward until you sit with an assessor and realize the control has two parts: (1) the logs must exist (enabled), and (2) they must be kept under your formal retention and protection regime (tied to Requirement 10.5.1). Requirement 5.3.4 is less about buying a tool and more about running it like a security control that produces admissible operational evidence.

For most PCI programs, the hard work is not flipping the “log” switch. The hard work is making sure the right event types are captured, the logs reach a system you control, retention is enforced consistently, and you can answer basic questions fast: Which hosts are covered? What happens when a laptop is off-network? Can you show a malware detection event, its response action, and the preserved log record?

This page breaks the requirement into exam-ready actions, concrete artifacts to keep, and common failure modes that cause findings. If you’re trying to operationalize quickly, focus on: defined scope (what assets and tools), centralized collection, retention configuration aligned to 10.5.1, and a repeatable “prove it” package for assessors.

Regulatory text

Requirement: “Audit logs for the anti-malware solution(s) are enabled and retained in accordance with Requirement 10.5.1.” (PCI DSS v4.0.1 Requirement 5.3.4)

What the operator must do (what auditors expect)

You need to demonstrate, with evidence, that:

  1. Anti-malware logging is enabled for the anti-malware solution(s) in your PCI environment (and any connected systems where anti-malware is required by your PCI scoping and policy).
  2. Those logs are retained and governed under your broader PCI logging retention approach as defined by Requirement 10.5.1, including retention, protection, and retrievability. (PCI DSS v4.0.1 Requirement 5.3.4)

This requirement is usually tested by configuration review plus a live or recorded demonstration that logs are being generated and can be retrieved for a given system and timeframe.

Plain-English interpretation (what the requirement means)

If anti-malware is a control, its logs are part of your audit trail. You must be able to show what the anti-malware tool saw and did (detections, quarantine actions, update status, tamper events), and you must keep that record according to your organization’s PCI log retention standard referenced by Requirement 10.5.1.

A practical way to think about it: if malware hits a system in scope, you need a durable record of detection and response that survives endpoint rebuilds, agent reinstalls, and user tampering.

Who it applies to

Entity types

  • Merchants
  • Service Providers
  • Payment Processors
    (PCI DSS v4.0.1 Requirement 5.3.4)

Operational context (where this bites)

This control matters most in environments where:

  • You have a mix of endpoints and servers, some intermittently connected (remote workforce, stores, field devices).
  • You run more than one anti-malware product (for example, EDR on endpoints and a separate solution on servers or VDI).
  • Your SIEM/log platform coverage is uneven, or your retention differs by log source.
  • Third parties manage parts of your environment (managed detection/response, outsourced IT, hosted POS, call centers). You still need evidence that anti-malware logs are enabled and retained for systems in your PCI scope, even if a third party operates the tooling.

What you actually need to do (step-by-step)

Step 1: Inventory anti-malware “log sources” in PCI scope

Build a list that ties together:

  • Asset group (CDE systems, connected systems, admin workstations, jump hosts)
  • Anti-malware product/agent and version
  • Management plane (cloud console, on-prem manager)
  • Log export method (native syslog, API connector, SIEM app, event forwarder)

Deliverable: “Anti-malware log source inventory” (spreadsheet is fine) that your assessor can map to scope.

Step 2: Define the minimum anti-malware events you must retain

Don’t guess. Decide and document a minimum set, then configure to it consistently. Most teams include:

  • Malware detection/alert events
  • Remediation actions (quarantine, delete, block, rollback)
  • Agent health/tamper events (service stopped, uninstall attempt, policy changed)
  • Signature/engine update events and failures
  • Scan execution results (scheduled and on-demand), at least success/failure and findings summary

Deliverable: Logging standard or control procedure section for “Anti-malware audit events,” referenced by your PCI logging/retention standard.

Step 3: Enable logging in each anti-malware console and on endpoints/servers

Turn on:

  • Local event generation (endpoint telemetry)
  • Central console logging/audit logs (admin actions, policy changes)
  • Export/forwarding from the console or collectors to your log platform

Operator tip: Assessors often ask for proof that management console admin actions are logged, not just malware detections. Capture both.

Deliverable: Screenshots or exported configuration showing audit logging enabled per product.

Step 4: Centralize collection and normalize retention to your Req. 10.5.1 approach

Requirement 5.3.4 explicitly ties retention to Requirement 10.5.1 (PCI DSS v4.0.1 Requirement 5.3.4). In practice, you should:

  • Forward anti-malware logs to your SIEM or central log repository that is governed by your PCI log retention controls.
  • Apply the same retention policy and protections you use for other PCI security logs, rather than relying on endpoint-local storage.
  • Ensure logs remain searchable and exportable for investigations and audit sampling.

Deliverable: Evidence of log ingestion (SIEM data source status, sample events, parsing rules).

Step 5: Protect integrity and access to anti-malware logs

Even if your SIEM handles most of this, confirm:

  • Only authorized roles can modify log retention settings and delete logs.
  • Admin actions in the anti-malware console are audited.
  • Logs are protected from endpoint users (local admin) as much as feasible, and critical records are preserved centrally.

Deliverable: Role-based access control (RBAC) screenshots, audit trail for console admin actions, and log platform access controls.

Step 6: Test retrieval with an audit-ready “show me” script

Create a repeatable test that produces:

  • A known benign test detection (where safe and approved) or a controlled policy event (for example, EICAR file if allowed by your internal policy).
  • Proof that the endpoint/host generated the event.
  • Proof that the central platform received it.
  • Proof that you can retrieve it by hostname, user, timestamp, and event type.

Deliverable: A short retrieval runbook plus one completed test record (ticket or change record) showing end-to-end logging.

Step 7: Operationalize monitoring and exceptions

Define how you handle:

  • Hosts that stop reporting (agent offline)
  • Log forwarder failures
  • Licensing/agent expiry
  • Third-party managed endpoints where you do not administer the console

Deliverable: Exception register and an operational queue (tickets) for non-reporting endpoints and failed log exports.

Required evidence and artifacts to retain

Use this as an audit binder checklist:

  • Anti-malware tool list and scope map (systems in PCI scope and which product covers them)
  • Logging configuration evidence (console settings, endpoint policy settings)
  • Central logging proof (SIEM connector configuration, ingestion health dashboards, sample raw events)
  • Retention configuration evidence aligned to your Requirement 10.5.1 implementation (policy excerpts, SIEM retention settings, storage tier rules)
  • Access control evidence (RBAC for console and log platform, admin audit trails)
  • Retrieval test record (query screenshots/exported results, date/time, investigator name, system name)
  • Exception handling (tickets for agent offline/logging gaps, documented compensating steps)

Common exam/audit questions and hangups

Assessors tend to probe these areas:

  • “Show me the logs.” Provide a live SIEM query for a specific endpoint and date range, plus raw event details.
  • Coverage gaps: “How do you know every in-scope host is logging?” Expect requests for an asset list crosswalked to agent status and log ingestion.
  • Console vs endpoint logs: “Do you log admin actions and policy changes?” Many teams only capture detections.
  • Retention alignment: “Where is the evidence you retain these logs according to 10.5.1?” You need to point to your retention configuration and policy, not verbal assurance.
  • Third party operations: “If your MDR/IT outsourcer runs the tool, how do you access logs and prove retention?” Have contract language, reports, or portal access evidence ready.

Frequent implementation mistakes (and how to avoid them)

  1. Relying on endpoint-local logs only. Endpoints get rebuilt and users can tamper with local records. Forward to central logging and retain there.
  2. Logging detections but not admin actions. Enable management-console audit logs and ship them to the same retention-controlled platform.
  3. No proof of retention configuration. A written policy alone is not evidence. Keep screenshots/exports of the actual retention settings in the log platform.
  4. No asset-to-log-source mapping. Without a crosswalk, you can’t prove coverage. Maintain a living inventory tied to CMDB or endpoint management.
  5. Silent failures in log forwarding. Put ingestion health alerts in place (connector down, event volume drops) and track remediation in tickets.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement. From a risk standpoint, failing 5.3.4 typically shows up as an audit finding because you cannot prove anti-malware operated effectively over time, and you lose investigative capability after an incident. The operational risk is higher than the wording suggests: anti-malware without retained logs becomes “security theater” during incident response and PCI assessments.

Practical 30/60/90-day execution plan

First 30 days (stabilize and prove enablement)

  • Build the in-scope asset list and anti-malware product inventory.
  • Turn on endpoint and console audit logging where it is currently disabled.
  • Start forwarding logs to the central logging platform for the highest-risk in-scope systems.
  • Create a one-page “anti-malware log retrieval” runbook and run one test to confirm end-to-end visibility.

By 60 days (close coverage gaps and align retention)

  • Expand log forwarding to all in-scope systems and all anti-malware products.
  • Implement and document your minimum anti-malware event set.
  • Align retention configuration in the SIEM/log platform to your Requirement 10.5.1 implementation, and collect evidence (screenshots/exports).
  • Add monitoring for agent health and ingestion failures, and route exceptions into ticketing.

By 90 days (make it durable and auditable)

  • Automate the coverage crosswalk (asset inventory vs agent status vs SIEM ingestion).
  • Formalize roles and access reviews for anti-malware console and log platform.
  • Add a recurring internal control check: sample endpoints, pull anti-malware events, confirm retention and integrity controls remain in place.
  • If a third party operates the tool, ensure you have documented access to logs, retention assurances, and an audit-evidence package you can produce on demand.

Where Daydream fits (practical use, not hype)

If you’re coordinating this across IT, SecOps, and one or more third parties, the control often fails on evidence collection and repeatability. Daydream can act as the system of record for the requirement: track which anti-malware solutions are in scope, store configuration exports and SIEM ingestion proof, assign remediation tasks for coverage gaps, and keep an assessor-ready evidence packet tied directly to PCI DSS 4.0.1 Requirement 5.3.4.

Frequently Asked Questions

Do anti-malware logs have to be in a SIEM to meet the anti-malware audit logs requirement?

PCI DSS 5.3.4 requires logs are enabled and retained per Requirement 10.5.1 (PCI DSS v4.0.1 Requirement 5.3.4). A SIEM is a common way to centralize retention and retrieval, but the key is that retention, protection, and access match your 10.5.1 approach.

What anti-malware events should we retain?

Retain enough to prove detection and response: detections, remediation actions, update status/failures, scan results, and console admin actions. Document the event set and show it is enabled consistently across in-scope systems.

Our endpoints are sometimes offline. How do we stay compliant with log retention?

Configure the endpoint agent to buffer locally and forward when it reconnects, then confirm the central platform receives delayed events. Track “not reporting” endpoints as exceptions with tickets and follow-up actions.

If a third party manages our anti-malware console, can we rely on their logs?

You can, but you still need evidence that logging is enabled and retained per your PCI logging retention requirements (PCI DSS v4.0.1 Requirement 5.3.4). Ensure you can retrieve logs (directly or via reports) and keep copies of the evidence you would show an assessor.

What’s the fastest way to satisfy an assessor during testing?

Prepare a short demo: pick one in-scope host, show its agent status, generate or identify a recent benign event, then query the central log platform for that event and export the record. Pair it with saved configuration evidence that logging and retention are set as required.

Are console “audit logs” different from malware detection logs?

Yes. Console audit logs track admin actions like policy changes and user logins, while detection logs capture malware and remediation events. Assessors often expect both, because both demonstrate control operation and accountability.

Frequently Asked Questions

Do anti-malware logs have to be in a SIEM to meet the anti-malware audit logs requirement?

PCI DSS 5.3.4 requires logs are enabled and retained per Requirement 10.5.1 (PCI DSS v4.0.1 Requirement 5.3.4). A SIEM is a common way to centralize retention and retrieval, but the key is that retention, protection, and access match your 10.5.1 approach.

What anti-malware events should we retain?

Retain enough to prove detection and response: detections, remediation actions, update status/failures, scan results, and console admin actions. Document the event set and show it is enabled consistently across in-scope systems.

Our endpoints are sometimes offline. How do we stay compliant with log retention?

Configure the endpoint agent to buffer locally and forward when it reconnects, then confirm the central platform receives delayed events. Track “not reporting” endpoints as exceptions with tickets and follow-up actions.

If a third party manages our anti-malware console, can we rely on their logs?

You can, but you still need evidence that logging is enabled and retained per your PCI logging retention requirements (PCI DSS v4.0.1 Requirement 5.3.4). Ensure you can retrieve logs (directly or via reports) and keep copies of the evidence you would show an assessor.

What’s the fastest way to satisfy an assessor during testing?

Prepare a short demo: pick one in-scope host, show its agent status, generate or identify a recent benign event, then query the central log platform for that event and export the record. Pair it with saved configuration evidence that logging and retention are set as required.

Are console “audit logs” different from malware detection logs?

Yes. Console audit logs track admin actions like policy changes and user logins, while detection logs capture malware and remediation events. Assessors often expect both, because both demonstrate control operation and accountability.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
PCI DSS 4.0 Anti-Malware Audit Logs: Implementation Guide | Daydream