Version 2.4 January 28, Prepared by:

Size: px
Start display at page:

Download "Version 2.4 January 28, 2016. Prepared by:"

Transcription

1 Microsoft Windows 10 with Surface 3, Surface Pro 3, Dell Venue 8 Pro, HP Pro X2, Lenovo X1 Carbon, and Panasonic FZ-G1 Common Criteria Assurance Activities Report Version 2.4 January 28, 2016 Prepared by: Leidos Inc. (formerly Science Applications International Corporation) Common Criteria Testing Laboratory 6841 Benjamin Franklin Drive Columbia, MD Microsoft 2016 Page 1 of 213

2 Prepared for: National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme The Developer of the TOE: Microsoft Corporation Corporate Headquarters One Microsoft Way Redmond, WA The TOE Evaluation was Sponsored by: Microsoft Corporation Corporate Headquarters One Microsoft Way Redmond, WA Evaluation Personnel: Greg Beaver Dawn Campbell Gary Grainger Kevin Steiner Common Criteria Versions Common Criteria for Information Technology Security Evaluation Part 1: Introduction, Version 3.1, Revision 4, September Common Criteria for Information Technology Security Evaluation Part 2: Security Functional Components, Revision 4, September Common Criteria for Information Technology Security Evaluation Part 3: Security Assurance Components, Revision 4, September Common Evaluation Methodology Versions Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 4, September Protection Profiles Protection Profile for Mobile Device Fundamentals, Version 2.0, 17 September 2014 Microsoft 2016 Page 2 of 213

3 Table of Contents 1 Introduction Evidence Protection Profile Security Functional Requirement Assurance Activities Security Audit (FAU) Audit Data Generation (FAU_GEN.1) Security Audit Review (FAU_SAR.1) Security Audit Event Selection (FAU_SEL.1) Audit Storage Protection (FAU_STG.1) Prevention of Audit Data Loss (FAU_STG.4) Cryptographic Support (FCS) Cryptographic Key Generation (FCS_CKM.1(1)) Cryptographic Key Generation (WLAN) (FCS_CKM.1(2)) Cryptographic Key Generation (WLAN) (FCS_CKM.1(3)) Cryptographic Key Establishment FCS_CKM.2.1(1) Cryptographic Key Distribution (WLAN) FCS_CKM.2.1(2) Cryptographic Key Support (REK) FCS_CKM_EXT Extended: Cryptographic Key Support (FCS_CKM_EXT.1.4) Cryptographic Key Random Generation (FCS_CKM_EXT.2) Cryptographic Key Encryption Keys (FCS_CKM_EXT.3) Cryptographic Key Destruction (FCS_CKM_EXT.4) TSF Wipe (FCS_CKM_EXT.5) Cryptographic Salt Generation (FCS_CKM_EXT.6) Cryptographic Operation (FCS_COP.1(1)) Hashing Algorithms (FCS_COP.1(2)) Signature Algorithms (FCS_COP.1(3)) Keyed Hash Algorithms (FCS_COP.1(4)) Password-Based Key Derivation Functions (FCS_COP.1(5)) Extended: HTTPS Protocol (FCS_HTTPS_EXT.1) Microsoft 2016 Page 3 of 213

4 Initialization Vector Generation (FCS_IV_EXT.1) Random Bit Generation (FCS_RBG_EXT.1) Extended: Cryptographic Algorithm Services (FCS_SRV_EXT.1.1) Extended: Cryptographic Algorithm Services (FCS_SRV_EXT.1.2) Extended: Cryptographic Key Storage (FCS_STG_EXT.1) Extended: Encrypted Cryptographic Key Storage (FCS_STG_EXT.2) Extended: Integrity of encrypted key storage (FCS_STG_EXT.3) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.1) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.2) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.3) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.4) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.5) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.6) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.7) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.8) Extended: TLS Protocol (FCS_TLSC_EXT.2.1) Extended: TLS Protocol (FCS_TLSC_EXT.2.2) Extended: TLS Protocol (FCS_TLSC_EXT.2.3) Extended: TLS Protocol (FCS_TLSC_EXT.2.4) Extended: TLS Protocol (FCS_TLSC_EXT.2.5) Extended: TLS Protocol (FCS_TLSC_EXT.2.6) Extended: TLS Protocol (FCS_TLSC_EXT.2.7) Extended: TLS Protocol (FCS_TLSC_EXT.2.8) User Data Protection (FDP) Extended: Security Access Control (FDP_ACF_EXT.1.1) Extended: Security Access Control (FDP_ACF_EXT.1.2) Extended: Security Access Control (FDP_ACF_EXT.1.3) Extended: Limitation of Bluetooth Device Access (FDP_BLT_EXT.1) Extended: Protected Data Encryption (FDP_DAR_EXT.1) Extended: Subset information flow control (FDP_IFC_EXT.1) Extended: User Data Storage (FDP_STG_EXT.1) Microsoft 2016 Page 4 of 213

5 2.3.8 Extended: Inter-TSF user data transfer protection (FDP_UPC_EXT.1) Identification and Authentication (FIA) Authentication failure handling (FIA_AFL_EXT.1) Bluetooth Authorization and Authentication (FIA_BLT_EXT.1) Bluetooth Authorization and Authentication (FIA_BLT_EXT.1.2) Extended: Bluetooth Authentication (FIA_BLT_EXT.2) Extended: Rejection of Duplicate Bluetooth Connections FIA_BLT_EXT Port Access Entity Authentication (FIA_PAE_EXT.1) Extended: Password Management (FIA_PMG_EXT.1) Extended: Authentication Throttling (FIA_TRT_EXT.1) Protected Authentication Feedback (FIA_UAU.7) Extended: Authentication for Cryptographic Operation (FIA_UAU_EXT.1) Extended: Timing of Authentication (FIA_UAU_EXT.2) Extended: Re-Authentication (FIA_UAU_EXT.3) Extended: Validation of certificates (FIA_X509_EXT.1) Extended: X509 certificate authentication (FIA_X509_EXT.2) Extended: X509 certificate authentication (FIA_X509_EXT.2.3) Extended: X509 certificate authentication (FIA_X509_EXT.2.4) Extended: Request Validation of certificates (FIA_X509_EXT.3) Security Management (FMT) Extended: Management of Security Functions Behavior (FMT_MOF_EXT.1.1) Extended: Management of Security Functions Behavior (FMT_MOF_EXT.1.2) Extended: Specification of Management Functions (FMT_SMF_EXT.1) Extended: Specification of Remediation Actions (FMT_SMF_EXT.2) Protection of the TSF (FPT) Extended: Anti-Exploitation Services (ASLR) (FPT_AEX_EXT.1) Extended: Anti-Exploitation Services (ASLR) (FPT_AEX_EXT.1.3) Extended: Anti-Exploitation Services (ASLR) (FPT_AEX_EXT.1.4) Extended: Anti-Exploitation Services (Memory Page Permissions) (FPT_AEX_EXT.2.1) Microsoft 2016 Page 5 of 213

6 2.6.5 Extended: Anti-Exploitation Services (Memory Page Permissions) (FPT_AEX_EXT.2.2) Extended: Anti-Exploitation Services (Overflow Protection) (FPT_AEX_EXT.3) Extended: Anti-Exploitation Services (Overflow Protection) (FPT_AEX_EXT.3.2) Extended: Domain Isolation (FPT_AEX_EXT.4) Application Processor Mediation (FPT_BBD_EXT.1) Extended: Limitation of Bluetooth Profile Support (FPT_BLT_EXT.1) Extended: Key Storage (FPT_KST_EXT.1) Extended: No Key Transmission (FPT_KST_EXT.2) Extended: No Plaintext Key Export (FPT_KST_EXT.3) Extended: Self-Test Notification (FPT_NOT_EXT.1) Extended: Self-Test Notification (FPT_NOT_EXT.1.2) Extended: Self-Test Notification (FPT_NOT_EXT.1.3) Reliable Time Stamps (FPT_STM.1) Extended: TSF Cryptographic Functionality Testing (FPT_TST_EXT.1) Extended: TSF Integrity Testing (FPT_TST_EXT.2.1) Extended: TSF Integrity Testing (FPT_TST_EXT.2.2) Extended: Trusted Update: TSF Version Query (FPT_TUD_EXT.1) Extended: Trusted Update Verification (FPT_TUD_EXT.2) Extended: Trusted Update Verification (FPT_TUD_EXT.2.4) Extended: Trusted Update Verification (FPT_TUD_EXT.2.5) Extended: Trusted Update Verification (FPT_TUD_EXT.2.6) Extended: Trusted Update Verification (FPT_TUD_EXT.2.7) TOE Access (FTA) Extended: TSF- and User-initiated locked state (FTA_SSL_EXT.1) Default TOE Access Banners (FTA_TAB.1) Extended: Wireless Network Access (FTA_WSE_EXT.1) Trusted Path/Channels (FTP) Extended: Trusted channel Communication (FTP_ITC_EXT.1) Microsoft 2016 Page 6 of 213

7 3 Security Assurance Requirements Class ADV: Development ADV_FSP.1 Basic Functional Specification Class AGD: Guidance Documents AGD_OPE.1 Operational User Guidance AGD_PRE.1 Preparative Procedures Class ALC: Life-Cycle Support ALC_CMC.1 Labeling of the TOE Assurance Activity ALC_CMS.1 TOE CM Coverage Assurance Activity Timely Security Updates (ALC_TSU_EXT) Assurance Activity ATE_IND.1 Independent Testing Conformance ATE_IND.1 Assurance Activity Cryptographic Algorithm Validation Programming Testing Class AVA: Vulnerability Assessment AVA_VAN.1 Assurance Activity Microsoft 2016 Page 7 of 213

8 1 INTRODUCTION This document presents assurance activity evaluation results of the Microsoft Windows 10 evaluation. There are three types of assurance activities and the following is provided for each: 1. TOE Summary Specification (TSS) an indication that the required information is in the TSS section of the Security Target 2. Guidance a specific reference to the location in the guidance is provided for the required information 3. Test a summary of the test procedure and result is provided for each required test activity. This Assurance Activities Report contains sections for each functional class and family and sub-sections addressing each of the SFRs specified in the Security Target. 1.1 Evidence [ST] Microsoft Windows 10 Security Target, v1.0, January 26, 2016 [Guide] [TPM 1.2 Design] Microsoft Windows 10 Mobile Device Operational Guidance, V1.0, January 12, 2016 TPM Main Part 1: Design Principles, Specification Version 1.2, Revision 116, 1 March 2011 [TPM 1.2 Commands] TPM Main Part 3: Commands, Specification Version 1.2, Revision 116, 1 March 2011 [TPM 2.0 Arch] Trusted Platform Module Library Part 1: Architecture, Family 2.0, Level 00, Revision 01.16, October 30, 2014 [TPM 2.0 Commands] Trusted Platform Module Library Part 3: Commands, Family 2.0, Level 00, Revision 01.16, October 30, Protection Profile [PP MDF] Protection Profile for Mobility Device Fundamentals, Version 2.01, 17 September SECURITY FUNCTIONAL REQUIREMENT ASSURANCE ACTIVITIES This section describes the assurance activities associated with the SFRs defined in the ST and the results of those activities as performed by the evaluation team. The assurance activities are derived from the [PP MDF]. 2.1 Security Audit (FAU) Audit Data Generation (FAU_GEN.1) TSS Assurance Activities Microsoft 2016 Page 8 of 213

9 Guidance Assurance Activities The evaluator shall check the administrative guide and ensure that it lists all of the auditable events and provides a format for audit records. Each audit record format type must be covered, along with a brief description of each field. The evaluator shall check to make sure that every audit event type mandated by the PP is described and that the description of the fields contains the information required in FAU_GEN.1.2. [Guide] Section 3.1 Audit Events identifies the auditable events. Requirement FAU_GEN.1 Description Start-up and shutdown of the audit functions Additional Record Contents Log: Event Id Windows Logs/Security: 4608, Windows Logs -> Security Subcategory: Security State Change Startup of audit functions Logged: <Date and time of event> Task category: <type of event> Keywords: <Outcome as Success or Failure> FAU_GEN.1 Startup and shutdown of the OS and kernel 1100 Windows Logs -> Security Subcategory: Security State Change The event logging service has shut down Logged: <Date and time of event> Keywords: <Outcome as Success> Windows Logs/Security: 4608, Windows Logs -> Security Subcategory: Security State Change Startup of audit functions Logged: <Date and time of event> Task category: <type of event> Keywords: <Outcome as Success or Failure> FAU_GEN.1 Insertion or removal of removable media 1100 Windows Logs -> Security Subcategory: Security State Change The event logging service has shut down Logged: <Date and time of event> Keywords: <Outcome as Success> Microsoft- Windows-Kernel-PnP/Device Configuration: 410 Windows 10 audits insertion of removable media, winch meets the condition insertion or removal. 410 Applications and Services Logs -> Microsoft -> Windows -> Microsoft 2016 Page 9 of 213

10 Requirement FAU_GEN.1 Description Establishment of a synchronizing connection Additional Record Contents Log: Event Id Kernel-PnP -> Device Configuration Device < DeviceInstanceId> was started Logged: <Date and time of event> Security ID: <user identity> DeviceInstanceId: <Device path and volume GUID of inserted removable media> Windows Logs -> System Source: Schannel : Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Windows Logs -> System Source: Schannel An SSL client handshake completed successfully. The negotiated cryptographic parameters are as follows. Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> FAU_GEN.1 FAU_SEL.1 Audit records reaching an administratorconfigurable percentage of audit capacity All modifications to the audit configuration that occur while the audit collection functions are operating. No additional Information. 11 Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Windows Logs/Security: 1103 The security audit log is now <the configured value > percent full. Logged: <Date and time of event> Keywords: <Outcome as Success> Windows Logs/Security: Windows Logs -> Security Subcategory: Audit Policy Change System audit policy was changed Logged: <Date and time of event> Task category: <category of audit> Task Subcategory: <subcategory of audit> Subcategory GUID: <subcategory GUID name> Security ID: <user identity> Account Name: <account name> Account Domain: <account domain> Microsoft 2016 Page 10 of 213

11 Requirement Description Additional Record Contents Log: Event Id Login ID: <login Id> Changes: <Success/Failure changes> Keywords: <Outcome as Success or Failure> FCS_CKM_EXT.1 generation of a REK No additional Information. Windows Logs/System: Windows Logs -> System Source: TPM Logged: <Date and time of event> FCS_CKM_EXT.5 Success or failure of the wipe. No additional Information. Windows Logs/System: Success: 12 Failure: Windows Logs -> System 12Logged: <Date and time of OS startup>(this event along with no other earlier events indicates a wipe has occurred.) FCS_CKM.1(1) FCS_HTTPS_E XT.1 FCS_RBG_EXT. 1 Failure of key generation activity for authentication keys. Failure of the certificate validity check. Failure of the randomization process. No additional Information. Issuer Name and Subject Name of certificate. [No additional information]. No additional information Microsoft-Windows-ResetEngAttempt to restore the system to original condition has failed. Changes to the system have been undone. Logged: <Date and time of event> Microsoft-Windows-Crypto-NCrypt: 4 Logged: <Date and time of event> Provider Name: <Key storage provider name> Key Name: <Unique name for key> Algorithm Name: <Key algorithm name> Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > (Error 20 indicates an untrusted root in the certificate chain) Windows Logs -> System: Windows Logs -> System Source: Kernel-Boot The last boot s success was <LastBootGood event data>. Logged: <Date and time of event> LastBootGood: <Outcome as true or false indicating if the Microsoft 2016 Page 11 of 213

12 Requirement Description Additional Record Contents Log: Event Id kernel-mode cryptographic self-tests and RNG initialization succeeded or failed> FCS_STG_EXT. 1 Import or destruction of key. [No other events] Identity of key. Role and identity of requestor. Import: Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient/Lifecycle-System: 1006 Destruction: Windows Logs/System: Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient-Lifecycle-User -> Operational Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient-Lifecycle-System -> Operational A new certificate has been installed. Logged: <Date and time of event> Subject: <Certificate subject name, CN, etc.> Thumbprint: <Certificate thumbprint> FCS_STG_EXT. 3 Failure to verify integrity of stored key. Identity of key being verified. 12 Windows Logs -> System 12 Logged: <Date and time of OS startup> This event along with no other earlier events indicates a wipe has occurred. Bitlocker recovery Bitlocker recovery System event Id 20 is recorded by source Kernel-Boot indicating event data LastBootGood as false. This event together with the indication of the TSF executable causing the failed boot on the Recovery screen. FCS_TLSC_EX T.1 Failure to establish an EAP-TLS session. 20 Windows Logs -> System Source: Kernel-Boot The last boot s success was <LastBootGood event data>. Logged: <Date and time of event> LastBootGood: <Outcome as true or false indicating if the kernel-mode cryptographic self-tests and RNG initialization succeeded or failed> Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 11 System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Error 20 indicates an untrusted root in the certificate chain. Microsoft 2016 Page 12 of 213

13 Requirement Description Additional Record Contents Log: Event Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 41 System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyRevocation -> Certificate -> subjectname: <certificate subject name> UserData -> RevocationStatus -> error: <error code > Error code 0x indicates The revocation function was unable to check revocation because the revocation server was offline. Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 30 Verify Chain Policy System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyCertificateChainPolicy -> Certificate - > subjectname: <certificate subject name> UserData -> Result value -> error: <error code> Error 0x800B010F: The certificate s CN name does not match the passed value Windows Logs -> System Source: Schannel A fatal alert was generated and sent to the remote endpoint. This may result in termination of the connection. The TLS protocol defined fatal error code is %1. Description Error Code Value Unexpected message 10 Bad record MAC 20 Record overflow 22 Decompression fail 30 Handshake failure 40 Illegal parameter 47 Unknown CA 48 Access denied 49 Decode error 50 Decrypt error 51 Protocol version 70 Insufficient security 71 Internal error 80 Microsoft 2016 Page 13 of 213

14 Requirement Description Additional Record Contents Unsupported extension Log: Event Id 110 Establishment/termin ation of an EAP-TLS session. Windows Logs -> System : Windows Logs -> System Source: Schannel An SSL client handshake completed successfully. The negotiated cryptographic parameters are as follows. Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> Termination : Applications and Services Logs -> Microsoft -> Windows -> SChannel-Events -> Perf: 1793 <This event indicates that the TLS connection was terminated> FCS_TLSC_EX T.2 Failure to establish a TLS session. Reason for failure. Logged: <Date and time of event> Windows Logs -> System : Windows Logs -> System Source: Schannel A fatal alert was generated and sent to the remote endpoint. This may result in termination of the connection. The TLS protocol defined fatal error code is %1. Description Error Code Value Unexpected message 10 Bad record MAC 20 Record overflow 22 Decompression fail 30 Handshake failure 40 Illegal parameter 47 Unknown CA 48 Access denied 49 Decode error 50 Decrypt error 51 Protocol version 70 Insufficient security 71 Internal error 80 Unsupported 110 extension Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Microsoft 2016 Page 14 of 213

15 Requirement Description Additional Record Contents Log: Event Id System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Error 20 indicates an untrusted root in the certificate chain. Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyRevocation -> Certificate -> subjectname: <certificate subject name> UserData -> RevocationStatus -> error: <error code > Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 30 Verify Chain Policy Failure to verify presented identifier. Establishment/termin ation of a TLS session Presented identifier and reference identifier. Non-TOE endpoint of connection. 30 System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyCertificateChainPolicy -> Certificate - > subjectname: <certificate subject name> UserData -> Result value -> error: <error code> Error 0x800B010F: The certificate s CN name does not match the passed value. Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 11 System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > (Error 20 indicates an untrusted root in the certificate chain) Windows Logs -> System : Windows Logs -> System Source: Schannel An SSL client handshake completed successfully. The negotiated cryptographic parameters are as follows. Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> Microsoft 2016 Page 15 of 213

16 Requirement Description Additional Record Contents Log: Event Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Termination : Applications and Services Logs -> Microsoft -> Windows -> SChannel-Events -> Perf: 1793 <This event indicates that the TLS connection was terminated> Logged: <Date and time of event> FDP_DAR_EXT.1 FDP_STG_EXT. 1 Failure to encrypt/decrypt data. Addition or removal of certificate from Trust Anchor Database. No additional information. Subject name of certificate. Windows Logs -> System : Logged: <Date and time of event> Volume: <encrypted volume letter> Applications and Services Logs -> Microsoft -> Windows: Import: : CAPI2: 90 Removal: CertificateServicesClient-Lifecycle-System / Operational Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational <un-named>logged: <Date and time of event> Security UserID: <SID of user account that imported the certificate/secrets> Subject: <Certificate subject name, CN, etc.> 1004 Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient-Lifecycle-User -> Operational Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient-Lifecycle-System -> Operational A certificate has been deleted Logged: <Date and time of event> Security ID: <SID of user account that deleted the certificate/secrets> SubjectNames: <Deleted certificate subject name> Thumbprint: <Deleted certificate thumbprint> EKUs: <Deleted certificate EKUs> NotValidAfter: :<Deleted certificate expiration date> Microsoft 2016 Page 16 of 213

17 Requirement FDP_UPC_EXT. 1 Description Application initiation of trusted channel. Additional Record Contents Name of application. Trusted channel protocol. Log: Event Id TLS: Windows Logs -> System Source: Schannel and Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational 11 Non-TOE endpoint of connection. Bluetooth: Windows Logs -> System: 8 Windows Logs -> System : Windows Logs -> System Source: Schannel An SSL client handshake completed successfully. The negotiated cryptographic parameters are as follows. Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > FIA_AFL_EXT. 1 Excess of authentication failure limit. No additional information. 8 Windows Logs -> System Source: BTHUSB The remote adapter < remote bluetooth radio address> was successfully paired with the local adapter. Logged: <Date and time of event> EventData: <remote bluetooth radio address> Exceeding failure limit: Windows Logs/Security: Logged: <Date and time of event> Security ID: <SID of locked account> Account Name: <name of locked account> Account Domain: <domain of locked account> FIA_BLT_EXT. 1 User authorization of Bluetooth device. User authorization User authorization decision. Windows Logs/System (BTHUSB): 8 Windows Logs/System (UserPnp): Microsoft 2016 Page 17 of 213

18 Requirement FIA_BLT_EXT. 2 FIA_UAU_EXT. 2 Description for local Bluetooth service. Initiation of Bluetooth connection. Failure of Bluetooth connection. Action performed before authentication. Additional Record Contents Bluetooth address and name of device. Bluetooth profile. Identity of local service. Bluetooth address and name of device. Reason for failure. No additional information. Log: Event Id 8 Windows Logs -> System Source: BTHUSB The remote adapter < remote bluetooth radio address> was successfully paired with the local adapter. Logged: <Date and time of event> EventData: <remote bluetooth radio address> Windows Logs -> System Source: UserPnP Driver Manager concluded the process to install driver <driver name> for Device Instance ID <ID value include device address> Logged: <Date and time of event> Security UserID: <SID of user> DeviceInstanceID: <instance ID (including remote device address)> SetupClass: <Bluetooth service/profile GUID> Windows Logs/System (BTHUSB): 8 8 Windows Logs -> System Source: BTHUSB The remote adapter < remote bluetooth radio address> was successfully paired with the local adapter. Logged: <Date and time of event> EventData: <remote bluetooth radio address> Windows Logs/System (BTHUSB): Windows Logs -> System Source: BTHUSB The mutual authentication between the local Bluetooth adapter and a device with Bluetooth adapter address <device address> failed.logged: <Date and time of event> Data: <remote device address> N/A due to no selection in Security Target FIA_UAU_EXT. 3 FIA_X509_EXT. 1 User changes Password Authentication Factor. Failure to validate X.509v3 certificate. No additional information. Reason for failure of validation. Windows Logs/Security: Windows Logs -> Security Subcategory: User Account Management A user account was changed Logged: <Date and time of event> Security ID: <user identity> Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Microsoft 2016 Page 18 of 213

19 Requirement FIA_X509_EXT. 2 FMT_SMF_EXT.1 Description Failure to establish connection to determine revocation status. Change of settings. Success or failure of function. Initiation of software update. Initiation of application installation or update. Additional Record Contents No additional information. Role of user that changed setting. Value of new setting. Role of user that performed function. Function performed. Reason for failure Version of update. Name and version of application. Log: Event Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Verify Revocation System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyRevocation -> Certificate -> subjectname: <certificate subject name> UserData -> RevocationStatus -> error: <error code > Error code 0x indicates The revocation function was unable to check revociation because the revocation server was offline. See AAR Table below : Administrative Actions audits See AAR Table below : Administrative Actions audits Windows Logs/System: Windows Logs -> System Installation Successful: Windows successfully installed the following update: <app/update name> Logged: <Date and time of event> Security ID: <SID of user account that installed the app> updatetitle: <app/update name> updateguid: <app/update Guid> serviceguid: <app/service GUID> updaterevisionnumber: <app version> Microsoft-Windows-AppXDeploymentServer/Operational: 400 Microsoft 2016 Page 19 of 213

20 Requirement FMT_SMF_EXT.2 Description Unenrollment. Additional Record Contents Identity of administrator. Remediation action performed. Log: Event Id 400 Applications and Services Logs -> Microsoft -> Windows -> AppXDeployment-Server -> Microsoft-Windows- AppXDeployment-Server/Operational Deployment Add operation on Package <package Id> from: (<.appx pathname> ) finished successfully Logged: <Date and time of event> Security ID: <SID of user account that installed the app> PackageFullName: <package Id> Path: <.appx pathname> Un-enroll: Microsoft-Windows- SystemSettingsThreshold/Operational: 511 Wipe protected data: Windows Logs/System: 12 Un-enroll: Microsoft-Windows- SystemSettingsThreshold/Operational: 511 Attempted to turn off workplace device management. Result is <result code> Logged: <Date and time of event> Security: <user identity> Remediation action removed Enterprise apps. FPT_NOT_EXT. 1 [Measurement of TSF software]. [Integrity verification value]. Wipe protected data: Windows Logs/System: 12 (Logged: <Date and time of OS startup> (This event along with no other earlier events indicates a wipe has occurred.) HealthAttestation log fileresponse <See section Managing Health Attestation for more information> FPT_TST_EXT. 1 FPT_TST_EXT. 2 Initiation of self-test. Failure of self-test. See topic Take appropriate policy action based on evaluation results in online guidance for list of measurements and verification. None Windows Logs/System: 20 Start-up of TOE. Boot Mode. Windows Logs/System: Windows Logs -> System Source: Kernel-Boot The last boot s success was <LastBootGood event data>. Logged: <Date and time of event> LastBootGood: <Outcome as true or false indicating if the kernel-mode cryptographic self-tests and RNG initialization succeeded or failed> 21 Windows Logs -> System Source: Kernel-Boot The OS loader advanced options menu was displayed and the user selected option <boot mode> Logged: <Date and time of event> OptionSelected: <auxililiary boot mode> Note: this event is recorded if the operating system was started in an auxiliary boot mode whereas its absence indicates the operating system started in normal boot mode. Microsoft 2016 Page 20 of 213

21 Requirement FPT_TUD_EXT. 2 Description [Detected integrity violations]. Success or failure of signature verification for software updates. Additional Record Contents [The TSF code that caused the integrity violation]. Recovery Screen Log: Event Id System event Id 20 is recorded by source Kernel-Boot indicating event data LastBootGood as false. This event together with the indication of the TSF executable causing the failed boot on the Recovery screen. Since the OS is often not functional in this scenario, the reason cannot be recorded. Windows Logs/Setup: 1, 2, 3 1 Windows Logs -> Setup Initiating changes for package Logged: <Date and time of event> PackageIdentifier: <KB package Id> InitialPackageState: Resolved IntendedPackageState: Installed ErrorCode: <success outcome indicated by 0x0> 2 Windows Logs -> Setup Package was successfully changed to the Installed state Logged: <Date and time of event> PackageIdentifier: <KB package Id> IntendedPackageState: Installed ErrorCode: <success outcome indicated by 0x0> Success or failure of signature verification for applications. 3 Windows Logs -> Setup Windows update could not be installed because The data is invalid Logged: <Date and time of event> Commandline: <KB package Id> ErrorCode: <install failure indicated by 0x800700D ( )> Microsoft-Windows-AppXDeploymentServer/Operational Id 400/404 for success/failure 400 Applications and Services Logs -> Microsoft -> Windows -> AppXDeployment-Server -> Microsoft-Windows- AppXDeployment-Server/OperationalDeployment Add operation on Package <package Id> from: (<.appx pathname> ) finished successfullylogged: <Date and time of event> Security ID: <SID of user account that installed the app> PackageFullName: <package Id> Path: <.appx pathname> 404 AppX Deployment operation failed for package <app package identity> with error <error code>. The specific error text for this failure is: <failure text>. Logged: <Date and time of event> User ID: <SID of user account that installed the app> Microsoft 2016 Page 21 of 213

22 Requirement Description Additional Record Contents Log: Event Id PackageFullName: <package Id> FTA_TAB.1 FTA_WSE_EXT.1 Change in banner setting. All attempts to connect to access points. No additional information. Identity of access point. Windows Logs/Security: Windows Logs -> Security Subcategory: Registry A handle to an object was requested. Logged: <Date and time of event> Security ID: <SID of locked account> Object Name: <Name of the object changed> Accesses: <Access granted> Access Mask: <Access requested> Microsoft-Windows-WLAN-AutoConfig/Operational log event Id 8000, Microsoft-Windows-WLAN-AutoConfig/Operational WLAN AutoConfig service started a connection to a wireless networklogged: <Date and time of event> Network Adapter: <adapter device name> FTP_ITC_EXT.1 Initiation and termination of trusted channel. Trusted channel protocol. Non-TOE endpoint of connection Microsoft-Windows-WLAN-AutoConfig/Operational WLAN AutoConfig service has successfully disconnectd from a wireless network Logged: <Date and time of event> Network Adapter: <adapter device name> IPSec: Windows Logs/Security: Initiation: 4651, 5451, Termination: 4655, 5452 HTTP/TLS: Windows Logs -> System: EAP-TLS/802.1x/ : Microsoft-Windows-WLAN- AutoConfig/Operational: 8001, Windows Logs -> Security Subcategory: IPsec Main ModeIpsec main mode security association was established. A certificate was used for authentication. Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address> Remote Endpoint: <Subject identity as IP address of non-toe endpoint of connection > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Local Certificate: <The entry in the SPD that applied to the decision as certificate SHA Thumbprint> Remote Certificate: <The entry in the SPD that applied to the decision as certificate SHA Thumbprint> Cryptographic Information: <The entry in the SPD that applied to the decision as MM SA Id and cryptographic parameters established in the SA> Microsoft 2016 Page 22 of 213

23 Requirement Description Additional Record Contents Log: Event Id Keywords: <Outcome as Success> 5451 Windows Logs -> Security Subcategory: IPsec Quick ModeIPsec quick mode security association was established Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port> Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Cryptographic Information: <The entry in the SPD that applied to the decision as MM SA Id, QM SA Id, Inbound SPI, Outbound SPI and cryptographic parameters established in the SA > Keywords: <Outcome as Success> 4655 Windows Logs -> Security Subcategory: IPsec Main Mode IPsec main mode security association ended Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port > Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection/channel > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Keywords: <Outcome as Success> 5452 Windows Logs -> Security Subcategory: IPsec Quick ModeIPsec quick mode security association ended Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port> Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection > Cryptographic Information: <The entry in the SPD that applied to the decision as the QM SA Id, Tunnel Id, Traffic Selector Id> Keywords: <Outcome as Success> HTTP/TLS: Applications and Services Windows Logs -> System Source: Schannel : Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> Microsoft 2016 Page 23 of 213

24 Requirement Description Additional Record Contents Log: Event Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 11 (Note: The event identifies the Non-TOE endpoints) 11 System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Applications and Services Logs -> Microsoft -> Windows -> SChannel-Events -> Perf: <This event indicates that the TLS connection was terminated> Logged: <Date and time of event> EAP-TLS/802.1x/ : 8001 Logged: <Date and time of event> SSID: <Wireless network name> (non-toe endpoint of connection) Authentication: WPA2-Enterprise (protocol) 802.1x Enabled: Yes (protocol) 8003 Logged: <Date and time of event> SSID: < Wireless network name> (non-toe endpoint of connection) The evaluator shall also make a determination of the administrative actions that are relevant in the context of this PP including those listed in the Management section. The evaluator shall examine the administrative guide and make a determination of which administrative commands are related to the configuration (including enabling or disabling) of the mechanisms implemented in the TOE that are necessary to enforce the requirements specified in the PP. The evaluator shall document the methodology or approach taken while determining which actions in the administrative guide are security relevant with respect to this PP. The evaluator may perform this activity as part of the activities associated with ensuring the AGD_OPE guidance satisfies the requirements. [Guide] Section 3.1 Audit Events identifies the administrative operations with their associated audits. The evaluator examined the management functions identified in the security target FMT_SMF_EXT.1 to determine which actions are security relevant. Microsoft 2016 Page 24 of 213

25 Administrative Actions audits Administrative Action 1. configure password policy: a. minimum password length b. minimum password complexity c. maximum password lifetime 2. configure session locking policy: a. screen-lock enabled/disabled b. screen lock timeout c. number of authentication failures 3. enable/disable the VPN protection: a. across device [b. on a per-app basis c. no other method] Windows Logs/Security: Windows Logs -> Security Audit Log Id Subcategory: Authentication Policy Change Domain Policy was changed. Logged: <Date and time of event> Security ID: <SID of user account making audit policy change> Account Name: <name of user account making audit policy change > Account Domain: <domain of user account making audit policy change if applicable, otherwise computer> Category: <Audit category that was changed.> Subcategory: <Audit subcategory that was changed.> Changes: <Change to audit policy.> Windows Logs/Security: Windows Logs -> Security Subcategory: Authentication Policy Change Domain Policy was changed. Logged: <Date and time of event> Security ID: <SID of user account making audit policy change> Account Name: <name of user account making audit policy change > Account Domain: <domain of user account making audit policy change if applicable, otherwise computer> Category: <Audit category that was changed.> Subcategory: <Audit subcategory that was changed.> Changes: <Change to audit policy.> Windows Logs/Security: Enable: 4651, 5451 Disable: 4655, Windows Logs -> Security Subcategory: IPsec Main ModeIpsec main mode security association was established. A certificate was used for authentication. Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address> Remote Endpoint: <Subject identity as IP address of non-toe endpoint of connection > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Local Certificate: <The entry in the SPD that applied to the decision as certificate SHA Thumbprint> Remote Certificate: <The entry in the SPD that applied to the decision as certificate SHA Thumbprint> Cryptographic Information: <The entry in the SPD that applied to the decision as MM SA Id and cryptographic parameters established in the SA> Keywords: <Outcome as Success> Microsoft 2016 Page 25 of 213

26 Administrative Action Audit Log Id 5451 Windows Logs -> Security Subcategory: IPsec Quick ModeIPsec quick mode security association was established Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port> Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Cryptographic Information: <The entry in the SPD that applied to the decision as MM SA Id, QM SA Id, Inbound SPI, Outbound SPI and cryptographic parameters established in the SA > Keywords: <Outcome as Success> 4655 Windows Logs -> Security Subcategory: IPsec Main Mode IPsec main mode security association ended Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port > Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection/channel > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Keywords: <Outcome as Success> 4. enable/disable [GPS, Wi-Fi, Bluetooth, mobile broadband] 5452 Windows Logs -> Security Subcategory: IPsec Quick ModeIPsec quick mode security association ended Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port> Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection > Cryptographic Information: <The entry in the SPD that applied to the decision as the QM SA Id, Tunnel Id, Traffic Selector Id> Keywords: <Outcome as Success> GPS: Windows Logs/Security: Windows Logs -> Security Subcategory: Registry Registry entry change Logged: <Date and time of event> Task category: <type of event> Security ID: <user identity> Object name: <key path> Changes: <old and new registry values> Keywords: <Outcome as Success or Failure> Microsoft 2016 Page 26 of 213

27 Administrative Action Audit Log Id WiFi: Microsoft-Windows-WLAN-AutoConfig/Operational Id (enable) (disable) Microsoft-Windows-WLAN-AutoConfig/Operational Wireless network association succeededlogged: <Date and time of event> Network Adapter: <adapter device name> Local MAC address: <Wi-Fi address> Microsoft-Windows-WLAN-AutoConfig/Operational Wireless security stopped Logged: <Date and time of event> Network Adapter: <adapter device name> Local MAC address: <Wi-Fi address> Bluetooth: Windows Logs/Security: Windows Logs -> Security Subcategory: Registry Registry entry change Logged: <Date and time of event> Task category: <type of event> Security ID: <user identity> Object name: <key path> Changes: <old and new registry values> Keywords: <Outcome as Success or Failure> Mobile Broadband: WWAN-SVC-EVENTS/WWAN Operational Channel: Received ContextState Logged: <Date and time of event> State: <WwanActivatinoStateActivated> State: <WwanActivatinoStateDeActivated> 5. enable/disable [camera, microphone]: a. across device [ b. on a per-app basis c. no other method] 6. specify wireless networks (SSIDs) to which the TSF may connect Windows Logs/Security: Windows Logs -> Security Subcategory: Registry Registry entry change Logged: <Date and time of event> Task category: <type of event> Security ID: <user identity> Object name: <key path> Changes: <old and new registry values> Keywords: <Outcome as Success or Failure> Windows Logs/Security: Windows Logs -> Security Subcategory: Registry A handle to an object was requested. Logged: <Date and time of event> Security ID: <SID of locked account> Microsoft 2016 Page 27 of 213

28 Administrative Action 7. configure security policy for each wireless network: a. [selection: specify the CA(s) from which the TSF will accept WLAN authentication server certificate(s), specify the FQDN(s) of acceptable WLAN authentication server certificate(s)] b. security type c. authentication protocol d. client credentials to be used for authentication 8. transition to the locked state 9. TSF wipe of protected data Audit Log Id Object Name: <Name of the object changed> Accesses: <Access granted> Access Mask: <Access requested> Windows Logs/Security: Windows Logs -> Security Subcategory: Registry A handle to an object was requested. Logged: <Date and time of event> Security ID: <SID of locked account> Object Name: <Name of the object changed> Accesses: <Access granted> Access Mask: <Access requested> Windows Logs/Security: Windows Logs -> Security Subcategory: Logoff The workstation was locked. Logged: <Date and time of event> Security UserID: <SID of logon user> Account Name: <name of logon account> Account Domain: <domain of logon account> Success: System: 12 Failure: Wipe Failure Screen System: Windows Logs -> System The operating system started at system time <time>. Logged: <Date and time of OS startup> This event along with no other earlier events indicates a wipe has occurred. 10. configure application installation policy by [selection: a. restricting the sources of applications, b. specifying a set of allowed applications based on [assignment: application characteristics] (an application whitelist), 4502 Microsoft-Windows-ResetEng Attempt to restore the system to original condition has failed. Changes to the system have been undone. Logged: <Date and time of event> Windows Logs/Security: Windows Logs -> Security Subcategory: Registry A handle to an object was requested. Logged: <Date and time of event> Security ID: <SID of locked account> Object Name: <Name of the object changed> Accesses: <Access granted> Access Mask: <Access requested> Microsoft 2016 Page 28 of 213

Protection Profile for Mobile Device Management

Protection Profile for Mobile Device Management 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes and clarifications to front-matter 2.0 31 December 2014

More information

Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target

Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target Version 0.6 2015/05/08 Prepared for: Samsung SDS 123, Olympic-ro 35-gil, Songpa-gu, Seoul, Korea 138-240 Prepared By: www.gossamersec.com

More information

Protection Profile for Mobile Device Management

Protection Profile for Mobile Device Management Protection Profile for Mobile Device Management 7 March 2014 Version 1.1 1 Revision History Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 March 2014 Typographical changes and clarifications

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Protection Profile for Software Full Disk Encryption, Version 1.1 Report Number: CCEVS-VR-PP-0003

More information

Extended Package for Mobile Device Management Agents

Extended Package for Mobile Device Management Agents Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes

More information

Mobile Billing System Security Target

Mobile Billing System Security Target Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing

More information

Protection Profile for Server Virtualization

Protection Profile for Server Virtualization Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental

More information

Protection Profile for Wireless Local Area Network (WLAN) Access Systems

Protection Profile for Wireless Local Area Network (WLAN) Access Systems Protection Profile for Wireless Local Area Network (WLAN) Access Systems Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP... 1 1.1 PP Overview of

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 November 2015 Update Document Information Version Number 1.0 Updated On June 10, 2016 Microsoft 2016 Page 1 of 164 This is a preliminary

More information

Client Error Messages

Client Error Messages Junos Pulse Client Error Messages Release 5.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net December 2013 Juniper Networks, Junos,

More information

How To Test A Toe For Security

How To Test A Toe For Security Supporting Document Mandatory Technical Document Evaluation Activities for Network Device cpp September-2014 Version 0.1 CCDB- Foreword This is a supporting

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

3e Technologies International 3e-636 Series Network Security Device. Security Target

3e Technologies International 3e-636 Series Network Security Device. Security Target 3e Technologies International 3e-636 Series Network Security Device Security Target 45040-007-01 Revision J March 12, 2015 Version 1.0 Page 1 2015 3e Technologies International, Inc. All rights reserved.

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8.1 Microsoft Windows Phone 8.1 Document Information Version Number 1.01 Updated On March 22, 2016 Microsoft 2016 Page 1 of 153 Version History

More information

collaborative Protection Profile for Network Devices

collaborative Protection Profile for Network Devices collaborative Protection Profile for Network Devices Version 0.1 05-Sep-2014 Acknowledgements This collaborative Protection Profile (cpp) was developed by the Network international Technical Community

More information

Dell Networking Switches Security Target. Version 1.0 January 22, 2015

Dell Networking Switches Security Target. Version 1.0 January 22, 2015 Version 1.0 January 22, 2015 Revision History Date Version Author Description 06/16/2014 0.1 Cygnacom Solutions First Draft 08/01/2014 0.2 Cygnacom Solutions Vendor review & OS v9.6 updates 08/31/2014

More information

Common Criteria NDPP SIP Server EP Assurance Activity Report

Common Criteria NDPP SIP Server EP Assurance Activity Report Common Criteria NDPP SIP Server EP Assurance Activity Report Pascal Patin ISSUED BY Acumen Security, LLC. 1 Revision History: Version Date Changes Initial Release 7/20/2015 Initial Release Version 1.0

More information

[SMO-SFO-ICO-PE-046-GU-

[SMO-SFO-ICO-PE-046-GU- Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction

More information

HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target

HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target Version 1.0 February 12, 2014 Prepared for: Hewlett-Packard Long Down Avenue Stoke Gifford Bristol BS34 8QZ UK Prepared By: Leidos

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Security Requirements for Voice Over IP Application Protection Profile for Mobility Voice

More information

Chapter 4 Virtual Private Networking

Chapter 4 Virtual Private Networking Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between

More information

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client A P P L I C A T I O N N O T E Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client This application note describes how to set up a VPN connection between a Mac client and a Sidewinder

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Mapping Between Collaborative Protection Profile for Network Devices, Version 1.0, 27-Feb-2015 and NIST SP 800-53 Revision 4

Mapping Between Collaborative Protection Profile for Network Devices, Version 1.0, 27-Feb-2015 and NIST SP 800-53 Revision 4 Mapping Between Collaborative Protection Profile for Network Devices, Version 1.0, 27-Feb-2015 and NIST SP 800-53 Revision 4 Introduction Several of the NIST SP 800-53/CNSS 1253 controls are either fully

More information

Assurance Activities Report for a Target of Evaluation. Security Target (Version 0.9)

Assurance Activities Report for a Target of Evaluation. Security Target (Version 0.9) Assurance Activities Report for a Target of Evaluation Cisco Integrated Services Router (ISR) 800 Series Security Target (Version 0.9) Assurance Activities Report (AAR) Version 1.0 10/31/2014 Evaluated

More information

AAR Test Summary. FireEye CM, FX, EX, and NX Series Appliances

AAR Test Summary. FireEye CM, FX, EX, and NX Series Appliances AAR Test Summary FireEye CM, FX, EX, and NX Series Appliances FireEye CM, FX, EX, and NX Series Appliances Series Security Target, version 1.0 Protection Profile for Network Devices (NDPP), version 1.1,

More information

Policy and Profile Reference Guide

Policy and Profile Reference Guide BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team

Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx

More information

Security Requirements for Network Devices

Security Requirements for Network Devices Security Requirements for Network Devices Information Assurance Directorate 10 December 2010 Version 1.0 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM

More information

Chapter 8 Virtual Private Networking

Chapter 8 Virtual Private Networking Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted

More information

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment

More information

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target

Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,

More information

Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1

Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 October 15, 2012 The following user messages appear on the AnyConnect client GUI. A description follows each message, along with recommended

More information

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...

More information

Protection Profile for Network Devices

Protection Profile for Network Devices Protection Profile for Network Devices Information Assurance Directorate 08 June 2012 Version 1.1 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM DESCRIPTION...

More information

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows RT Microsoft Windows Server 2012 IPsec VPN Client Security Target Document Information Version Number 1.0 Updated On January

More information

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%

More information

Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance

Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance Microsoft Windows Common Criteria Evaluation Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance Microsoft

More information

NIST SP 800-53 Revision 4 Mapping: Protection Profile for Application Software Version 1.0 2014-10-15

NIST SP 800-53 Revision 4 Mapping: Protection Profile for Application Software Version 1.0 2014-10-15 Introduction NIST SP 800-53 Revision 4 Mapping: Protection Profile for Application Software Version 1.0 2014-10-15 Several of the NIST SP 800-53/CNSS 1253 s are either fully or partially addressed by compliant

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.

GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0. GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented

More information

Certification Report

Certification Report Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report 3eTI 3e-636 Series Network Security Devices Report Number: CCEVS-VR-VID10580 Dated: March 25,

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Dell OpenManage Mobile Version 1.4 User s Guide (Android)

Dell OpenManage Mobile Version 1.4 User s Guide (Android) Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification

EXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Doc Ref RD/JL/069 Replaces: N/A EXTOL epassport Suite v2.5 ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Extol Corporation (M) Sdn Bhd (121135-U) (643683-U) Extol Group www.extolcorp.com Unit G1,

More information

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1 Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Smart Card Authentication. Administrator's Guide

Smart Card Authentication. Administrator's Guide Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5

More information

Technical Certificates Overview

Technical Certificates Overview Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

Communication Systems SSL

Communication Systems SSL Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security

More information

Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0

Security Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0 Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX

More information

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015 Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is

More information

Lesson Plans Administering Security in a Server 2003 Network

Lesson Plans Administering Security in a Server 2003 Network Lesson Plans Administering Security in a Server 2003 Network (Exam 70-299) Version 2.0 Table of Contents Table of Contents... 1 Course Overview... 2 Section 1.1: Course Introduction... 4 Section 1.2: Active

More information

collaborative Protection Profile for Full Drive Encryption Authorization Acquisition January 26, 2015

collaborative Protection Profile for Full Drive Encryption Authorization Acquisition January 26, 2015 PP Reference: collaborative Protection Profile for Full Drive Encryption Authorization Acquisition collaborative Protection Profile for Full Drive Encryption Authorization Acquisition January 26, 2015

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

JMCS Northern Light Video Conferencing System Security Target

JMCS Northern Light Video Conferencing System Security Target JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2

More information

Microsoft Windows Common Criteria Evaluation

Microsoft Windows Common Criteria Evaluation Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Full Disk Encryption Security Target Document Information Version Number 1.0 Updated On April 3, 2014 Microsoft

More information

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel between a WatchGuard Firebox Vclass appliance (Vcontroller version

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle

More information

Security Guide. BES12 Cloud. for BlackBerry

Security Guide. BES12 Cloud. for BlackBerry Security Guide BES12 Cloud for BlackBerry Published: 2015-03-31 SWD-20150317085646346 Contents Introduction... 7 About this guide...8 What is BES12 Cloud?... 9 Key features of BES12 Cloud...10 Security

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security

More information

Apple Inc. Apple ios 9.2 MDFPPv2. Common Criteria Guide

Apple Inc. Apple ios 9.2 MDFPPv2. Common Criteria Guide Apple Inc. Apple ios 9.2 MDFPPv2 Common Criteria Guide Version: 1.6 Last Update: 2016-01-19 Prepared for: Apple Inc. 1 Infinite Loop Cupertino, CA 95014 www.apple.com Prepared by: atsec information security

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for BlackBerry Version 12.0 Published: 2014-11-12 SWD-20141106140037727 Contents Introduction... 7 About this guide...8 What is BES12?...9 Key features of

More information

Setting Up SSL on IIS6 for MEGA Advisor

Setting Up SSL on IIS6 for MEGA Advisor Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority

More information

Guidance End User Devices Security Guidance: Apple OS X 10.9

Guidance End User Devices Security Guidance: Apple OS X 10.9 GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

SAMSUNG SDS FIDO Server Solution V1.1 Certification Report

SAMSUNG SDS FIDO Server Solution V1.1 Certification Report KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised

More information

3eTI Technologies International 3e-525/523 Series Wireless Network Access Points. Security Target

3eTI Technologies International 3e-525/523 Series Wireless Network Access Points. Security Target 3eTI Technologies International 3e-525/523 Series Wireless Network Access Points Security Target Version 1.0 Revision I October 8 th, 2015 Page 1 2015 3e Technologies International, Inc. All rights reserved.

More information

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

CrashPlan Security SECURITY CONTEXT TECHNOLOGY TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

Xceedium GateKeeper Version 5.2.1 Security Target

Xceedium GateKeeper Version 5.2.1 Security Target ceedium GateKeeper Version 521 Security Target February 3, 2011 Prepared for: ceedium, Inc 30 Montgomery Street Jersey City, NJ 07302 Prepared By: Science Applications International Corporation Common

More information

Application Note: Onsight Device VPN Configuration V1.1

Application Note: Onsight Device VPN Configuration V1.1 Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information