Gathers wireless status from the OS and makes it's CIM compliant for Splunk ES/PCI. Includes some useful tags.
Tested on centOS5, 6, 7 and Windows 7/2012.
Solves some of your PCI 3.2 requirements -
11.1.b Verify that the methodology is adequate to detect and identify any unauthorized wireless access points, including at least the following:
- WLAN cards inserted into system components
- Portable or mobile devices attached to system components to create a wireless access point (for example, by USB, etc.)