Version 2.4 January 28, Prepared by:
|
|
- Martha Clark
- 7 years ago
- Views:
Transcription
1 Microsoft Windows 10 with Surface 3, Surface Pro 3, Dell Venue 8 Pro, HP Pro X2, Lenovo X1 Carbon, and Panasonic FZ-G1 Common Criteria Assurance Activities Report Version 2.4 January 28, 2016 Prepared by: Leidos Inc. (formerly Science Applications International Corporation) Common Criteria Testing Laboratory 6841 Benjamin Franklin Drive Columbia, MD Microsoft 2016 Page 1 of 213
2 Prepared for: National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme The Developer of the TOE: Microsoft Corporation Corporate Headquarters One Microsoft Way Redmond, WA The TOE Evaluation was Sponsored by: Microsoft Corporation Corporate Headquarters One Microsoft Way Redmond, WA Evaluation Personnel: Greg Beaver Dawn Campbell Gary Grainger Kevin Steiner Common Criteria Versions Common Criteria for Information Technology Security Evaluation Part 1: Introduction, Version 3.1, Revision 4, September Common Criteria for Information Technology Security Evaluation Part 2: Security Functional Components, Revision 4, September Common Criteria for Information Technology Security Evaluation Part 3: Security Assurance Components, Revision 4, September Common Evaluation Methodology Versions Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Version 3.1, Revision 4, September Protection Profiles Protection Profile for Mobile Device Fundamentals, Version 2.0, 17 September 2014 Microsoft 2016 Page 2 of 213
3 Table of Contents 1 Introduction Evidence Protection Profile Security Functional Requirement Assurance Activities Security Audit (FAU) Audit Data Generation (FAU_GEN.1) Security Audit Review (FAU_SAR.1) Security Audit Event Selection (FAU_SEL.1) Audit Storage Protection (FAU_STG.1) Prevention of Audit Data Loss (FAU_STG.4) Cryptographic Support (FCS) Cryptographic Key Generation (FCS_CKM.1(1)) Cryptographic Key Generation (WLAN) (FCS_CKM.1(2)) Cryptographic Key Generation (WLAN) (FCS_CKM.1(3)) Cryptographic Key Establishment FCS_CKM.2.1(1) Cryptographic Key Distribution (WLAN) FCS_CKM.2.1(2) Cryptographic Key Support (REK) FCS_CKM_EXT Extended: Cryptographic Key Support (FCS_CKM_EXT.1.4) Cryptographic Key Random Generation (FCS_CKM_EXT.2) Cryptographic Key Encryption Keys (FCS_CKM_EXT.3) Cryptographic Key Destruction (FCS_CKM_EXT.4) TSF Wipe (FCS_CKM_EXT.5) Cryptographic Salt Generation (FCS_CKM_EXT.6) Cryptographic Operation (FCS_COP.1(1)) Hashing Algorithms (FCS_COP.1(2)) Signature Algorithms (FCS_COP.1(3)) Keyed Hash Algorithms (FCS_COP.1(4)) Password-Based Key Derivation Functions (FCS_COP.1(5)) Extended: HTTPS Protocol (FCS_HTTPS_EXT.1) Microsoft 2016 Page 3 of 213
4 Initialization Vector Generation (FCS_IV_EXT.1) Random Bit Generation (FCS_RBG_EXT.1) Extended: Cryptographic Algorithm Services (FCS_SRV_EXT.1.1) Extended: Cryptographic Algorithm Services (FCS_SRV_EXT.1.2) Extended: Cryptographic Key Storage (FCS_STG_EXT.1) Extended: Encrypted Cryptographic Key Storage (FCS_STG_EXT.2) Extended: Integrity of encrypted key storage (FCS_STG_EXT.3) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.1) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.2) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.3) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.4) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.5) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.6) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.7) Extended: EAP TLS Protocol (FCS_TLSC_EXT.1.8) Extended: TLS Protocol (FCS_TLSC_EXT.2.1) Extended: TLS Protocol (FCS_TLSC_EXT.2.2) Extended: TLS Protocol (FCS_TLSC_EXT.2.3) Extended: TLS Protocol (FCS_TLSC_EXT.2.4) Extended: TLS Protocol (FCS_TLSC_EXT.2.5) Extended: TLS Protocol (FCS_TLSC_EXT.2.6) Extended: TLS Protocol (FCS_TLSC_EXT.2.7) Extended: TLS Protocol (FCS_TLSC_EXT.2.8) User Data Protection (FDP) Extended: Security Access Control (FDP_ACF_EXT.1.1) Extended: Security Access Control (FDP_ACF_EXT.1.2) Extended: Security Access Control (FDP_ACF_EXT.1.3) Extended: Limitation of Bluetooth Device Access (FDP_BLT_EXT.1) Extended: Protected Data Encryption (FDP_DAR_EXT.1) Extended: Subset information flow control (FDP_IFC_EXT.1) Extended: User Data Storage (FDP_STG_EXT.1) Microsoft 2016 Page 4 of 213
5 2.3.8 Extended: Inter-TSF user data transfer protection (FDP_UPC_EXT.1) Identification and Authentication (FIA) Authentication failure handling (FIA_AFL_EXT.1) Bluetooth Authorization and Authentication (FIA_BLT_EXT.1) Bluetooth Authorization and Authentication (FIA_BLT_EXT.1.2) Extended: Bluetooth Authentication (FIA_BLT_EXT.2) Extended: Rejection of Duplicate Bluetooth Connections FIA_BLT_EXT Port Access Entity Authentication (FIA_PAE_EXT.1) Extended: Password Management (FIA_PMG_EXT.1) Extended: Authentication Throttling (FIA_TRT_EXT.1) Protected Authentication Feedback (FIA_UAU.7) Extended: Authentication for Cryptographic Operation (FIA_UAU_EXT.1) Extended: Timing of Authentication (FIA_UAU_EXT.2) Extended: Re-Authentication (FIA_UAU_EXT.3) Extended: Validation of certificates (FIA_X509_EXT.1) Extended: X509 certificate authentication (FIA_X509_EXT.2) Extended: X509 certificate authentication (FIA_X509_EXT.2.3) Extended: X509 certificate authentication (FIA_X509_EXT.2.4) Extended: Request Validation of certificates (FIA_X509_EXT.3) Security Management (FMT) Extended: Management of Security Functions Behavior (FMT_MOF_EXT.1.1) Extended: Management of Security Functions Behavior (FMT_MOF_EXT.1.2) Extended: Specification of Management Functions (FMT_SMF_EXT.1) Extended: Specification of Remediation Actions (FMT_SMF_EXT.2) Protection of the TSF (FPT) Extended: Anti-Exploitation Services (ASLR) (FPT_AEX_EXT.1) Extended: Anti-Exploitation Services (ASLR) (FPT_AEX_EXT.1.3) Extended: Anti-Exploitation Services (ASLR) (FPT_AEX_EXT.1.4) Extended: Anti-Exploitation Services (Memory Page Permissions) (FPT_AEX_EXT.2.1) Microsoft 2016 Page 5 of 213
6 2.6.5 Extended: Anti-Exploitation Services (Memory Page Permissions) (FPT_AEX_EXT.2.2) Extended: Anti-Exploitation Services (Overflow Protection) (FPT_AEX_EXT.3) Extended: Anti-Exploitation Services (Overflow Protection) (FPT_AEX_EXT.3.2) Extended: Domain Isolation (FPT_AEX_EXT.4) Application Processor Mediation (FPT_BBD_EXT.1) Extended: Limitation of Bluetooth Profile Support (FPT_BLT_EXT.1) Extended: Key Storage (FPT_KST_EXT.1) Extended: No Key Transmission (FPT_KST_EXT.2) Extended: No Plaintext Key Export (FPT_KST_EXT.3) Extended: Self-Test Notification (FPT_NOT_EXT.1) Extended: Self-Test Notification (FPT_NOT_EXT.1.2) Extended: Self-Test Notification (FPT_NOT_EXT.1.3) Reliable Time Stamps (FPT_STM.1) Extended: TSF Cryptographic Functionality Testing (FPT_TST_EXT.1) Extended: TSF Integrity Testing (FPT_TST_EXT.2.1) Extended: TSF Integrity Testing (FPT_TST_EXT.2.2) Extended: Trusted Update: TSF Version Query (FPT_TUD_EXT.1) Extended: Trusted Update Verification (FPT_TUD_EXT.2) Extended: Trusted Update Verification (FPT_TUD_EXT.2.4) Extended: Trusted Update Verification (FPT_TUD_EXT.2.5) Extended: Trusted Update Verification (FPT_TUD_EXT.2.6) Extended: Trusted Update Verification (FPT_TUD_EXT.2.7) TOE Access (FTA) Extended: TSF- and User-initiated locked state (FTA_SSL_EXT.1) Default TOE Access Banners (FTA_TAB.1) Extended: Wireless Network Access (FTA_WSE_EXT.1) Trusted Path/Channels (FTP) Extended: Trusted channel Communication (FTP_ITC_EXT.1) Microsoft 2016 Page 6 of 213
7 3 Security Assurance Requirements Class ADV: Development ADV_FSP.1 Basic Functional Specification Class AGD: Guidance Documents AGD_OPE.1 Operational User Guidance AGD_PRE.1 Preparative Procedures Class ALC: Life-Cycle Support ALC_CMC.1 Labeling of the TOE Assurance Activity ALC_CMS.1 TOE CM Coverage Assurance Activity Timely Security Updates (ALC_TSU_EXT) Assurance Activity ATE_IND.1 Independent Testing Conformance ATE_IND.1 Assurance Activity Cryptographic Algorithm Validation Programming Testing Class AVA: Vulnerability Assessment AVA_VAN.1 Assurance Activity Microsoft 2016 Page 7 of 213
8 1 INTRODUCTION This document presents assurance activity evaluation results of the Microsoft Windows 10 evaluation. There are three types of assurance activities and the following is provided for each: 1. TOE Summary Specification (TSS) an indication that the required information is in the TSS section of the Security Target 2. Guidance a specific reference to the location in the guidance is provided for the required information 3. Test a summary of the test procedure and result is provided for each required test activity. This Assurance Activities Report contains sections for each functional class and family and sub-sections addressing each of the SFRs specified in the Security Target. 1.1 Evidence [ST] Microsoft Windows 10 Security Target, v1.0, January 26, 2016 [Guide] [TPM 1.2 Design] Microsoft Windows 10 Mobile Device Operational Guidance, V1.0, January 12, 2016 TPM Main Part 1: Design Principles, Specification Version 1.2, Revision 116, 1 March 2011 [TPM 1.2 Commands] TPM Main Part 3: Commands, Specification Version 1.2, Revision 116, 1 March 2011 [TPM 2.0 Arch] Trusted Platform Module Library Part 1: Architecture, Family 2.0, Level 00, Revision 01.16, October 30, 2014 [TPM 2.0 Commands] Trusted Platform Module Library Part 3: Commands, Family 2.0, Level 00, Revision 01.16, October 30, Protection Profile [PP MDF] Protection Profile for Mobility Device Fundamentals, Version 2.01, 17 September SECURITY FUNCTIONAL REQUIREMENT ASSURANCE ACTIVITIES This section describes the assurance activities associated with the SFRs defined in the ST and the results of those activities as performed by the evaluation team. The assurance activities are derived from the [PP MDF]. 2.1 Security Audit (FAU) Audit Data Generation (FAU_GEN.1) TSS Assurance Activities Microsoft 2016 Page 8 of 213
9 Guidance Assurance Activities The evaluator shall check the administrative guide and ensure that it lists all of the auditable events and provides a format for audit records. Each audit record format type must be covered, along with a brief description of each field. The evaluator shall check to make sure that every audit event type mandated by the PP is described and that the description of the fields contains the information required in FAU_GEN.1.2. [Guide] Section 3.1 Audit Events identifies the auditable events. Requirement FAU_GEN.1 Description Start-up and shutdown of the audit functions Additional Record Contents Log: Event Id Windows Logs/Security: 4608, Windows Logs -> Security Subcategory: Security State Change Startup of audit functions Logged: <Date and time of event> Task category: <type of event> Keywords: <Outcome as Success or Failure> FAU_GEN.1 Startup and shutdown of the OS and kernel 1100 Windows Logs -> Security Subcategory: Security State Change The event logging service has shut down Logged: <Date and time of event> Keywords: <Outcome as Success> Windows Logs/Security: 4608, Windows Logs -> Security Subcategory: Security State Change Startup of audit functions Logged: <Date and time of event> Task category: <type of event> Keywords: <Outcome as Success or Failure> FAU_GEN.1 Insertion or removal of removable media 1100 Windows Logs -> Security Subcategory: Security State Change The event logging service has shut down Logged: <Date and time of event> Keywords: <Outcome as Success> Microsoft- Windows-Kernel-PnP/Device Configuration: 410 Windows 10 audits insertion of removable media, winch meets the condition insertion or removal. 410 Applications and Services Logs -> Microsoft -> Windows -> Microsoft 2016 Page 9 of 213
10 Requirement FAU_GEN.1 Description Establishment of a synchronizing connection Additional Record Contents Log: Event Id Kernel-PnP -> Device Configuration Device < DeviceInstanceId> was started Logged: <Date and time of event> Security ID: <user identity> DeviceInstanceId: <Device path and volume GUID of inserted removable media> Windows Logs -> System Source: Schannel : Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Windows Logs -> System Source: Schannel An SSL client handshake completed successfully. The negotiated cryptographic parameters are as follows. Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> FAU_GEN.1 FAU_SEL.1 Audit records reaching an administratorconfigurable percentage of audit capacity All modifications to the audit configuration that occur while the audit collection functions are operating. No additional Information. 11 Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Windows Logs/Security: 1103 The security audit log is now <the configured value > percent full. Logged: <Date and time of event> Keywords: <Outcome as Success> Windows Logs/Security: Windows Logs -> Security Subcategory: Audit Policy Change System audit policy was changed Logged: <Date and time of event> Task category: <category of audit> Task Subcategory: <subcategory of audit> Subcategory GUID: <subcategory GUID name> Security ID: <user identity> Account Name: <account name> Account Domain: <account domain> Microsoft 2016 Page 10 of 213
11 Requirement Description Additional Record Contents Log: Event Id Login ID: <login Id> Changes: <Success/Failure changes> Keywords: <Outcome as Success or Failure> FCS_CKM_EXT.1 generation of a REK No additional Information. Windows Logs/System: Windows Logs -> System Source: TPM Logged: <Date and time of event> FCS_CKM_EXT.5 Success or failure of the wipe. No additional Information. Windows Logs/System: Success: 12 Failure: Windows Logs -> System 12Logged: <Date and time of OS startup>(this event along with no other earlier events indicates a wipe has occurred.) FCS_CKM.1(1) FCS_HTTPS_E XT.1 FCS_RBG_EXT. 1 Failure of key generation activity for authentication keys. Failure of the certificate validity check. Failure of the randomization process. No additional Information. Issuer Name and Subject Name of certificate. [No additional information]. No additional information Microsoft-Windows-ResetEngAttempt to restore the system to original condition has failed. Changes to the system have been undone. Logged: <Date and time of event> Microsoft-Windows-Crypto-NCrypt: 4 Logged: <Date and time of event> Provider Name: <Key storage provider name> Key Name: <Unique name for key> Algorithm Name: <Key algorithm name> Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > (Error 20 indicates an untrusted root in the certificate chain) Windows Logs -> System: Windows Logs -> System Source: Kernel-Boot The last boot s success was <LastBootGood event data>. Logged: <Date and time of event> LastBootGood: <Outcome as true or false indicating if the Microsoft 2016 Page 11 of 213
12 Requirement Description Additional Record Contents Log: Event Id kernel-mode cryptographic self-tests and RNG initialization succeeded or failed> FCS_STG_EXT. 1 Import or destruction of key. [No other events] Identity of key. Role and identity of requestor. Import: Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient/Lifecycle-System: 1006 Destruction: Windows Logs/System: Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient-Lifecycle-User -> Operational Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient-Lifecycle-System -> Operational A new certificate has been installed. Logged: <Date and time of event> Subject: <Certificate subject name, CN, etc.> Thumbprint: <Certificate thumbprint> FCS_STG_EXT. 3 Failure to verify integrity of stored key. Identity of key being verified. 12 Windows Logs -> System 12 Logged: <Date and time of OS startup> This event along with no other earlier events indicates a wipe has occurred. Bitlocker recovery Bitlocker recovery System event Id 20 is recorded by source Kernel-Boot indicating event data LastBootGood as false. This event together with the indication of the TSF executable causing the failed boot on the Recovery screen. FCS_TLSC_EX T.1 Failure to establish an EAP-TLS session. 20 Windows Logs -> System Source: Kernel-Boot The last boot s success was <LastBootGood event data>. Logged: <Date and time of event> LastBootGood: <Outcome as true or false indicating if the kernel-mode cryptographic self-tests and RNG initialization succeeded or failed> Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 11 System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Error 20 indicates an untrusted root in the certificate chain. Microsoft 2016 Page 12 of 213
13 Requirement Description Additional Record Contents Log: Event Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 41 System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyRevocation -> Certificate -> subjectname: <certificate subject name> UserData -> RevocationStatus -> error: <error code > Error code 0x indicates The revocation function was unable to check revocation because the revocation server was offline. Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 30 Verify Chain Policy System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyCertificateChainPolicy -> Certificate - > subjectname: <certificate subject name> UserData -> Result value -> error: <error code> Error 0x800B010F: The certificate s CN name does not match the passed value Windows Logs -> System Source: Schannel A fatal alert was generated and sent to the remote endpoint. This may result in termination of the connection. The TLS protocol defined fatal error code is %1. Description Error Code Value Unexpected message 10 Bad record MAC 20 Record overflow 22 Decompression fail 30 Handshake failure 40 Illegal parameter 47 Unknown CA 48 Access denied 49 Decode error 50 Decrypt error 51 Protocol version 70 Insufficient security 71 Internal error 80 Microsoft 2016 Page 13 of 213
14 Requirement Description Additional Record Contents Unsupported extension Log: Event Id 110 Establishment/termin ation of an EAP-TLS session. Windows Logs -> System : Windows Logs -> System Source: Schannel An SSL client handshake completed successfully. The negotiated cryptographic parameters are as follows. Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> Termination : Applications and Services Logs -> Microsoft -> Windows -> SChannel-Events -> Perf: 1793 <This event indicates that the TLS connection was terminated> FCS_TLSC_EX T.2 Failure to establish a TLS session. Reason for failure. Logged: <Date and time of event> Windows Logs -> System : Windows Logs -> System Source: Schannel A fatal alert was generated and sent to the remote endpoint. This may result in termination of the connection. The TLS protocol defined fatal error code is %1. Description Error Code Value Unexpected message 10 Bad record MAC 20 Record overflow 22 Decompression fail 30 Handshake failure 40 Illegal parameter 47 Unknown CA 48 Access denied 49 Decode error 50 Decrypt error 51 Protocol version 70 Insufficient security 71 Internal error 80 Unsupported 110 extension Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Microsoft 2016 Page 14 of 213
15 Requirement Description Additional Record Contents Log: Event Id System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Error 20 indicates an untrusted root in the certificate chain. Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyRevocation -> Certificate -> subjectname: <certificate subject name> UserData -> RevocationStatus -> error: <error code > Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 30 Verify Chain Policy Failure to verify presented identifier. Establishment/termin ation of a TLS session Presented identifier and reference identifier. Non-TOE endpoint of connection. 30 System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyCertificateChainPolicy -> Certificate - > subjectname: <certificate subject name> UserData -> Result value -> error: <error code> Error 0x800B010F: The certificate s CN name does not match the passed value. Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 11 System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > (Error 20 indicates an untrusted root in the certificate chain) Windows Logs -> System : Windows Logs -> System Source: Schannel An SSL client handshake completed successfully. The negotiated cryptographic parameters are as follows. Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> Microsoft 2016 Page 15 of 213
16 Requirement Description Additional Record Contents Log: Event Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Termination : Applications and Services Logs -> Microsoft -> Windows -> SChannel-Events -> Perf: 1793 <This event indicates that the TLS connection was terminated> Logged: <Date and time of event> FDP_DAR_EXT.1 FDP_STG_EXT. 1 Failure to encrypt/decrypt data. Addition or removal of certificate from Trust Anchor Database. No additional information. Subject name of certificate. Windows Logs -> System : Logged: <Date and time of event> Volume: <encrypted volume letter> Applications and Services Logs -> Microsoft -> Windows: Import: : CAPI2: 90 Removal: CertificateServicesClient-Lifecycle-System / Operational Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational <un-named>logged: <Date and time of event> Security UserID: <SID of user account that imported the certificate/secrets> Subject: <Certificate subject name, CN, etc.> 1004 Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient-Lifecycle-User -> Operational Applications and Services Logs -> Microsoft -> Windows -> CertificateServicesClient-Lifecycle-System -> Operational A certificate has been deleted Logged: <Date and time of event> Security ID: <SID of user account that deleted the certificate/secrets> SubjectNames: <Deleted certificate subject name> Thumbprint: <Deleted certificate thumbprint> EKUs: <Deleted certificate EKUs> NotValidAfter: :<Deleted certificate expiration date> Microsoft 2016 Page 16 of 213
17 Requirement FDP_UPC_EXT. 1 Description Application initiation of trusted channel. Additional Record Contents Name of application. Trusted channel protocol. Log: Event Id TLS: Windows Logs -> System Source: Schannel and Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational 11 Non-TOE endpoint of connection. Bluetooth: Windows Logs -> System: 8 Windows Logs -> System : Windows Logs -> System Source: Schannel An SSL client handshake completed successfully. The negotiated cryptographic parameters are as follows. Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > FIA_AFL_EXT. 1 Excess of authentication failure limit. No additional information. 8 Windows Logs -> System Source: BTHUSB The remote adapter < remote bluetooth radio address> was successfully paired with the local adapter. Logged: <Date and time of event> EventData: <remote bluetooth radio address> Exceeding failure limit: Windows Logs/Security: Logged: <Date and time of event> Security ID: <SID of locked account> Account Name: <name of locked account> Account Domain: <domain of locked account> FIA_BLT_EXT. 1 User authorization of Bluetooth device. User authorization User authorization decision. Windows Logs/System (BTHUSB): 8 Windows Logs/System (UserPnp): Microsoft 2016 Page 17 of 213
18 Requirement FIA_BLT_EXT. 2 FIA_UAU_EXT. 2 Description for local Bluetooth service. Initiation of Bluetooth connection. Failure of Bluetooth connection. Action performed before authentication. Additional Record Contents Bluetooth address and name of device. Bluetooth profile. Identity of local service. Bluetooth address and name of device. Reason for failure. No additional information. Log: Event Id 8 Windows Logs -> System Source: BTHUSB The remote adapter < remote bluetooth radio address> was successfully paired with the local adapter. Logged: <Date and time of event> EventData: <remote bluetooth radio address> Windows Logs -> System Source: UserPnP Driver Manager concluded the process to install driver <driver name> for Device Instance ID <ID value include device address> Logged: <Date and time of event> Security UserID: <SID of user> DeviceInstanceID: <instance ID (including remote device address)> SetupClass: <Bluetooth service/profile GUID> Windows Logs/System (BTHUSB): 8 8 Windows Logs -> System Source: BTHUSB The remote adapter < remote bluetooth radio address> was successfully paired with the local adapter. Logged: <Date and time of event> EventData: <remote bluetooth radio address> Windows Logs/System (BTHUSB): Windows Logs -> System Source: BTHUSB The mutual authentication between the local Bluetooth adapter and a device with Bluetooth adapter address <device address> failed.logged: <Date and time of event> Data: <remote device address> N/A due to no selection in Security Target FIA_UAU_EXT. 3 FIA_X509_EXT. 1 User changes Password Authentication Factor. Failure to validate X.509v3 certificate. No additional information. Reason for failure of validation. Windows Logs/Security: Windows Logs -> Security Subcategory: User Account Management A user account was changed Logged: <Date and time of event> Security ID: <user identity> Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Microsoft 2016 Page 18 of 213
19 Requirement FIA_X509_EXT. 2 FMT_SMF_EXT.1 Description Failure to establish connection to determine revocation status. Change of settings. Success or failure of function. Initiation of software update. Initiation of application installation or update. Additional Record Contents No additional information. Role of user that changed setting. Value of new setting. Role of user that performed function. Function performed. Reason for failure Version of update. Name and version of application. Log: Event Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Build Chain System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational Verify Revocation System -> TimeCreated -> SystemTime: <Date and time of event> UserData -> CertVerifyRevocation -> Certificate -> subjectname: <certificate subject name> UserData -> RevocationStatus -> error: <error code > Error code 0x indicates The revocation function was unable to check revociation because the revocation server was offline. See AAR Table below : Administrative Actions audits See AAR Table below : Administrative Actions audits Windows Logs/System: Windows Logs -> System Installation Successful: Windows successfully installed the following update: <app/update name> Logged: <Date and time of event> Security ID: <SID of user account that installed the app> updatetitle: <app/update name> updateguid: <app/update Guid> serviceguid: <app/service GUID> updaterevisionnumber: <app version> Microsoft-Windows-AppXDeploymentServer/Operational: 400 Microsoft 2016 Page 19 of 213
20 Requirement FMT_SMF_EXT.2 Description Unenrollment. Additional Record Contents Identity of administrator. Remediation action performed. Log: Event Id 400 Applications and Services Logs -> Microsoft -> Windows -> AppXDeployment-Server -> Microsoft-Windows- AppXDeployment-Server/Operational Deployment Add operation on Package <package Id> from: (<.appx pathname> ) finished successfully Logged: <Date and time of event> Security ID: <SID of user account that installed the app> PackageFullName: <package Id> Path: <.appx pathname> Un-enroll: Microsoft-Windows- SystemSettingsThreshold/Operational: 511 Wipe protected data: Windows Logs/System: 12 Un-enroll: Microsoft-Windows- SystemSettingsThreshold/Operational: 511 Attempted to turn off workplace device management. Result is <result code> Logged: <Date and time of event> Security: <user identity> Remediation action removed Enterprise apps. FPT_NOT_EXT. 1 [Measurement of TSF software]. [Integrity verification value]. Wipe protected data: Windows Logs/System: 12 (Logged: <Date and time of OS startup> (This event along with no other earlier events indicates a wipe has occurred.) HealthAttestation log fileresponse <See section Managing Health Attestation for more information> FPT_TST_EXT. 1 FPT_TST_EXT. 2 Initiation of self-test. Failure of self-test. See topic Take appropriate policy action based on evaluation results in online guidance for list of measurements and verification. None Windows Logs/System: 20 Start-up of TOE. Boot Mode. Windows Logs/System: Windows Logs -> System Source: Kernel-Boot The last boot s success was <LastBootGood event data>. Logged: <Date and time of event> LastBootGood: <Outcome as true or false indicating if the kernel-mode cryptographic self-tests and RNG initialization succeeded or failed> 21 Windows Logs -> System Source: Kernel-Boot The OS loader advanced options menu was displayed and the user selected option <boot mode> Logged: <Date and time of event> OptionSelected: <auxililiary boot mode> Note: this event is recorded if the operating system was started in an auxiliary boot mode whereas its absence indicates the operating system started in normal boot mode. Microsoft 2016 Page 20 of 213
21 Requirement FPT_TUD_EXT. 2 Description [Detected integrity violations]. Success or failure of signature verification for software updates. Additional Record Contents [The TSF code that caused the integrity violation]. Recovery Screen Log: Event Id System event Id 20 is recorded by source Kernel-Boot indicating event data LastBootGood as false. This event together with the indication of the TSF executable causing the failed boot on the Recovery screen. Since the OS is often not functional in this scenario, the reason cannot be recorded. Windows Logs/Setup: 1, 2, 3 1 Windows Logs -> Setup Initiating changes for package Logged: <Date and time of event> PackageIdentifier: <KB package Id> InitialPackageState: Resolved IntendedPackageState: Installed ErrorCode: <success outcome indicated by 0x0> 2 Windows Logs -> Setup Package was successfully changed to the Installed state Logged: <Date and time of event> PackageIdentifier: <KB package Id> IntendedPackageState: Installed ErrorCode: <success outcome indicated by 0x0> Success or failure of signature verification for applications. 3 Windows Logs -> Setup Windows update could not be installed because The data is invalid Logged: <Date and time of event> Commandline: <KB package Id> ErrorCode: <install failure indicated by 0x800700D ( )> Microsoft-Windows-AppXDeploymentServer/Operational Id 400/404 for success/failure 400 Applications and Services Logs -> Microsoft -> Windows -> AppXDeployment-Server -> Microsoft-Windows- AppXDeployment-Server/OperationalDeployment Add operation on Package <package Id> from: (<.appx pathname> ) finished successfullylogged: <Date and time of event> Security ID: <SID of user account that installed the app> PackageFullName: <package Id> Path: <.appx pathname> 404 AppX Deployment operation failed for package <app package identity> with error <error code>. The specific error text for this failure is: <failure text>. Logged: <Date and time of event> User ID: <SID of user account that installed the app> Microsoft 2016 Page 21 of 213
22 Requirement Description Additional Record Contents Log: Event Id PackageFullName: <package Id> FTA_TAB.1 FTA_WSE_EXT.1 Change in banner setting. All attempts to connect to access points. No additional information. Identity of access point. Windows Logs/Security: Windows Logs -> Security Subcategory: Registry A handle to an object was requested. Logged: <Date and time of event> Security ID: <SID of locked account> Object Name: <Name of the object changed> Accesses: <Access granted> Access Mask: <Access requested> Microsoft-Windows-WLAN-AutoConfig/Operational log event Id 8000, Microsoft-Windows-WLAN-AutoConfig/Operational WLAN AutoConfig service started a connection to a wireless networklogged: <Date and time of event> Network Adapter: <adapter device name> FTP_ITC_EXT.1 Initiation and termination of trusted channel. Trusted channel protocol. Non-TOE endpoint of connection Microsoft-Windows-WLAN-AutoConfig/Operational WLAN AutoConfig service has successfully disconnectd from a wireless network Logged: <Date and time of event> Network Adapter: <adapter device name> IPSec: Windows Logs/Security: Initiation: 4651, 5451, Termination: 4655, 5452 HTTP/TLS: Windows Logs -> System: EAP-TLS/802.1x/ : Microsoft-Windows-WLAN- AutoConfig/Operational: 8001, Windows Logs -> Security Subcategory: IPsec Main ModeIpsec main mode security association was established. A certificate was used for authentication. Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address> Remote Endpoint: <Subject identity as IP address of non-toe endpoint of connection > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Local Certificate: <The entry in the SPD that applied to the decision as certificate SHA Thumbprint> Remote Certificate: <The entry in the SPD that applied to the decision as certificate SHA Thumbprint> Cryptographic Information: <The entry in the SPD that applied to the decision as MM SA Id and cryptographic parameters established in the SA> Microsoft 2016 Page 22 of 213
23 Requirement Description Additional Record Contents Log: Event Id Keywords: <Outcome as Success> 5451 Windows Logs -> Security Subcategory: IPsec Quick ModeIPsec quick mode security association was established Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port> Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Cryptographic Information: <The entry in the SPD that applied to the decision as MM SA Id, QM SA Id, Inbound SPI, Outbound SPI and cryptographic parameters established in the SA > Keywords: <Outcome as Success> 4655 Windows Logs -> Security Subcategory: IPsec Main Mode IPsec main mode security association ended Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port > Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection/channel > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Keywords: <Outcome as Success> 5452 Windows Logs -> Security Subcategory: IPsec Quick ModeIPsec quick mode security association ended Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port> Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection > Cryptographic Information: <The entry in the SPD that applied to the decision as the QM SA Id, Tunnel Id, Traffic Selector Id> Keywords: <Outcome as Success> HTTP/TLS: Applications and Services Windows Logs -> System Source: Schannel : Logged: <Date and time of event> Protocol: <TLS protocol> CipherSuite: <cypher suite> Microsoft 2016 Page 23 of 213
24 Requirement Description Additional Record Contents Log: Event Id Applications and Services Logs -> Microsoft -> Windows -> CAPI2 -> Operational: 11 (Note: The event identifies the Non-TOE endpoints) 11 System/TimeCreated/SystemTime: <Date and time of event> UserData/CertGetCertificateChain/Certificate/subjectName: <subject name in client certificate> UserData/CertGetCertificateChain/CertificateChain/ChainEle ment/certificate <issuer of leaf certificate as subject name in chained certificate> TrustStatus -> ErrorStatus: <Error code > Applications and Services Logs -> Microsoft -> Windows -> SChannel-Events -> Perf: <This event indicates that the TLS connection was terminated> Logged: <Date and time of event> EAP-TLS/802.1x/ : 8001 Logged: <Date and time of event> SSID: <Wireless network name> (non-toe endpoint of connection) Authentication: WPA2-Enterprise (protocol) 802.1x Enabled: Yes (protocol) 8003 Logged: <Date and time of event> SSID: < Wireless network name> (non-toe endpoint of connection) The evaluator shall also make a determination of the administrative actions that are relevant in the context of this PP including those listed in the Management section. The evaluator shall examine the administrative guide and make a determination of which administrative commands are related to the configuration (including enabling or disabling) of the mechanisms implemented in the TOE that are necessary to enforce the requirements specified in the PP. The evaluator shall document the methodology or approach taken while determining which actions in the administrative guide are security relevant with respect to this PP. The evaluator may perform this activity as part of the activities associated with ensuring the AGD_OPE guidance satisfies the requirements. [Guide] Section 3.1 Audit Events identifies the administrative operations with their associated audits. The evaluator examined the management functions identified in the security target FMT_SMF_EXT.1 to determine which actions are security relevant. Microsoft 2016 Page 24 of 213
25 Administrative Actions audits Administrative Action 1. configure password policy: a. minimum password length b. minimum password complexity c. maximum password lifetime 2. configure session locking policy: a. screen-lock enabled/disabled b. screen lock timeout c. number of authentication failures 3. enable/disable the VPN protection: a. across device [b. on a per-app basis c. no other method] Windows Logs/Security: Windows Logs -> Security Audit Log Id Subcategory: Authentication Policy Change Domain Policy was changed. Logged: <Date and time of event> Security ID: <SID of user account making audit policy change> Account Name: <name of user account making audit policy change > Account Domain: <domain of user account making audit policy change if applicable, otherwise computer> Category: <Audit category that was changed.> Subcategory: <Audit subcategory that was changed.> Changes: <Change to audit policy.> Windows Logs/Security: Windows Logs -> Security Subcategory: Authentication Policy Change Domain Policy was changed. Logged: <Date and time of event> Security ID: <SID of user account making audit policy change> Account Name: <name of user account making audit policy change > Account Domain: <domain of user account making audit policy change if applicable, otherwise computer> Category: <Audit category that was changed.> Subcategory: <Audit subcategory that was changed.> Changes: <Change to audit policy.> Windows Logs/Security: Enable: 4651, 5451 Disable: 4655, Windows Logs -> Security Subcategory: IPsec Main ModeIpsec main mode security association was established. A certificate was used for authentication. Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address> Remote Endpoint: <Subject identity as IP address of non-toe endpoint of connection > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Local Certificate: <The entry in the SPD that applied to the decision as certificate SHA Thumbprint> Remote Certificate: <The entry in the SPD that applied to the decision as certificate SHA Thumbprint> Cryptographic Information: <The entry in the SPD that applied to the decision as MM SA Id and cryptographic parameters established in the SA> Keywords: <Outcome as Success> Microsoft 2016 Page 25 of 213
26 Administrative Action Audit Log Id 5451 Windows Logs -> Security Subcategory: IPsec Quick ModeIPsec quick mode security association was established Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port> Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Cryptographic Information: <The entry in the SPD that applied to the decision as MM SA Id, QM SA Id, Inbound SPI, Outbound SPI and cryptographic parameters established in the SA > Keywords: <Outcome as Success> 4655 Windows Logs -> Security Subcategory: IPsec Main Mode IPsec main mode security association ended Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port > Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection/channel > Keying Module Name: <Transport layer protocol as IKEv1 or IKEv2> Keywords: <Outcome as Success> 4. enable/disable [GPS, Wi-Fi, Bluetooth, mobile broadband] 5452 Windows Logs -> Security Subcategory: IPsec Quick ModeIPsec quick mode security association ended Logged: <Date and time of event> Task category: <type of event> Local Endpoint: <Subject identity as IP address/port> Remote Endpoint: <Subject identity as IP address/port of non- TOE endpoint of connection > Cryptographic Information: <The entry in the SPD that applied to the decision as the QM SA Id, Tunnel Id, Traffic Selector Id> Keywords: <Outcome as Success> GPS: Windows Logs/Security: Windows Logs -> Security Subcategory: Registry Registry entry change Logged: <Date and time of event> Task category: <type of event> Security ID: <user identity> Object name: <key path> Changes: <old and new registry values> Keywords: <Outcome as Success or Failure> Microsoft 2016 Page 26 of 213
27 Administrative Action Audit Log Id WiFi: Microsoft-Windows-WLAN-AutoConfig/Operational Id (enable) (disable) Microsoft-Windows-WLAN-AutoConfig/Operational Wireless network association succeededlogged: <Date and time of event> Network Adapter: <adapter device name> Local MAC address: <Wi-Fi address> Microsoft-Windows-WLAN-AutoConfig/Operational Wireless security stopped Logged: <Date and time of event> Network Adapter: <adapter device name> Local MAC address: <Wi-Fi address> Bluetooth: Windows Logs/Security: Windows Logs -> Security Subcategory: Registry Registry entry change Logged: <Date and time of event> Task category: <type of event> Security ID: <user identity> Object name: <key path> Changes: <old and new registry values> Keywords: <Outcome as Success or Failure> Mobile Broadband: WWAN-SVC-EVENTS/WWAN Operational Channel: Received ContextState Logged: <Date and time of event> State: <WwanActivatinoStateActivated> State: <WwanActivatinoStateDeActivated> 5. enable/disable [camera, microphone]: a. across device [ b. on a per-app basis c. no other method] 6. specify wireless networks (SSIDs) to which the TSF may connect Windows Logs/Security: Windows Logs -> Security Subcategory: Registry Registry entry change Logged: <Date and time of event> Task category: <type of event> Security ID: <user identity> Object name: <key path> Changes: <old and new registry values> Keywords: <Outcome as Success or Failure> Windows Logs/Security: Windows Logs -> Security Subcategory: Registry A handle to an object was requested. Logged: <Date and time of event> Security ID: <SID of locked account> Microsoft 2016 Page 27 of 213
28 Administrative Action 7. configure security policy for each wireless network: a. [selection: specify the CA(s) from which the TSF will accept WLAN authentication server certificate(s), specify the FQDN(s) of acceptable WLAN authentication server certificate(s)] b. security type c. authentication protocol d. client credentials to be used for authentication 8. transition to the locked state 9. TSF wipe of protected data Audit Log Id Object Name: <Name of the object changed> Accesses: <Access granted> Access Mask: <Access requested> Windows Logs/Security: Windows Logs -> Security Subcategory: Registry A handle to an object was requested. Logged: <Date and time of event> Security ID: <SID of locked account> Object Name: <Name of the object changed> Accesses: <Access granted> Access Mask: <Access requested> Windows Logs/Security: Windows Logs -> Security Subcategory: Logoff The workstation was locked. Logged: <Date and time of event> Security UserID: <SID of logon user> Account Name: <name of logon account> Account Domain: <domain of logon account> Success: System: 12 Failure: Wipe Failure Screen System: Windows Logs -> System The operating system started at system time <time>. Logged: <Date and time of OS startup> This event along with no other earlier events indicates a wipe has occurred. 10. configure application installation policy by [selection: a. restricting the sources of applications, b. specifying a set of allowed applications based on [assignment: application characteristics] (an application whitelist), 4502 Microsoft-Windows-ResetEng Attempt to restore the system to original condition has failed. Changes to the system have been undone. Logged: <Date and time of event> Windows Logs/Security: Windows Logs -> Security Subcategory: Registry A handle to an object was requested. Logged: <Date and time of event> Security ID: <SID of locked account> Object Name: <Name of the object changed> Accesses: <Access granted> Access Mask: <Access requested> Microsoft 2016 Page 28 of 213
Protection Profile for Mobile Device Management
31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes and clarifications to front-matter 2.0 31 December 2014
More informationSamsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target
Samsung SDS Co., LTD Samsung SDS CellWe EMM (MDMPP11) Security Target Version 0.6 2015/05/08 Prepared for: Samsung SDS 123, Olympic-ro 35-gil, Songpa-gu, Seoul, Korea 138-240 Prepared By: www.gossamersec.com
More informationProtection Profile for Mobile Device Management
Protection Profile for Mobile Device Management 7 March 2014 Version 1.1 1 Revision History Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 March 2014 Typographical changes and clarifications
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Protection Profile for Software Full Disk Encryption, Version 1.1 Report Number: CCEVS-VR-PP-0003
More informationExtended Package for Mobile Device Management Agents
Extended Package for Mobile Device Management Agents 31 December 2014 Version 2.0 REVISION HISTORY Version Date Description 1.0 21 October 2013 Initial Release 1.1 7 February 2014 Typographical changes
More informationMobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
More informationProtection Profile for Server Virtualization
Protection Profile for Server Virtualization 29 October 2014 Version 1.0 i 0 Preface 0.1 Objectives of Document This document presents the Common Criteria (CC) Protection Profile (PP) to express the fundamental
More informationProtection Profile for Wireless Local Area Network (WLAN) Access Systems
Protection Profile for Wireless Local Area Network (WLAN) Access Systems Information Assurance Directorate 01 December 2011 Version 1.0 Table of Contents 1 Introduction to the PP... 1 1.1 PP Overview of
More informationMicrosoft Windows Common Criteria Evaluation
Microsoft Windows Common Criteria Evaluation Microsoft Windows 10 November 2015 Update Document Information Version Number 1.0 Updated On June 10, 2016 Microsoft 2016 Page 1 of 164 This is a preliminary
More informationClient Error Messages
Junos Pulse Client Error Messages Release 5.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net December 2013 Juniper Networks, Junos,
More informationHow To Test A Toe For Security
Supporting Document Mandatory Technical Document Evaluation Activities for Network Device cpp September-2014 Version 0.1 CCDB- Foreword This is a supporting
More informationAdvanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
More information3e Technologies International 3e-636 Series Network Security Device. Security Target
3e Technologies International 3e-636 Series Network Security Device Security Target 45040-007-01 Revision J March 12, 2015 Version 1.0 Page 1 2015 3e Technologies International, Inc. All rights reserved.
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationMicrosoft Windows Common Criteria Evaluation
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8.1 Microsoft Windows Phone 8.1 Document Information Version Number 1.01 Updated On March 22, 2016 Microsoft 2016 Page 1 of 153 Version History
More informationcollaborative Protection Profile for Network Devices
collaborative Protection Profile for Network Devices Version 0.1 05-Sep-2014 Acknowledgements This collaborative Protection Profile (cpp) was developed by the Network international Technical Community
More informationDell Networking Switches Security Target. Version 1.0 January 22, 2015
Version 1.0 January 22, 2015 Revision History Date Version Author Description 06/16/2014 0.1 Cygnacom Solutions First Draft 08/01/2014 0.2 Cygnacom Solutions Vendor review & OS v9.6 updates 08/31/2014
More informationCommon Criteria NDPP SIP Server EP Assurance Activity Report
Common Criteria NDPP SIP Server EP Assurance Activity Report Pascal Patin ISSUED BY Acumen Security, LLC. 1 Revision History: Version Date Changes Initial Release 7/20/2015 Initial Release Version 1.0
More information[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
More informationSecurity Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationMcAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.2.0.1 EAL 2 + ALC_FLR.2 Release Date: 5 October 2012 Version: 1.0 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document Introduction
More informationHP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target
HP StoreOnce Backup System Generation 3 Version 3.6.6 Security Target Version 1.0 February 12, 2014 Prepared for: Hewlett-Packard Long Down Avenue Stoke Gifford Bristol BS34 8QZ UK Prepared By: Leidos
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationNational Information Assurance Partnership
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Security Requirements for Voice Over IP Application Protection Profile for Mobility Voice
More informationChapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
More informationCreating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client
A P P L I C A T I O N N O T E Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client This application note describes how to set up a VPN connection between a Mac client and a Sidewinder
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationMapping Between Collaborative Protection Profile for Network Devices, Version 1.0, 27-Feb-2015 and NIST SP 800-53 Revision 4
Mapping Between Collaborative Protection Profile for Network Devices, Version 1.0, 27-Feb-2015 and NIST SP 800-53 Revision 4 Introduction Several of the NIST SP 800-53/CNSS 1253 controls are either fully
More informationAssurance Activities Report for a Target of Evaluation. Security Target (Version 0.9)
Assurance Activities Report for a Target of Evaluation Cisco Integrated Services Router (ISR) 800 Series Security Target (Version 0.9) Assurance Activities Report (AAR) Version 1.0 10/31/2014 Evaluated
More informationAAR Test Summary. FireEye CM, FX, EX, and NX Series Appliances
AAR Test Summary FireEye CM, FX, EX, and NX Series Appliances FireEye CM, FX, EX, and NX Series Appliances Series Security Target, version 1.0 Protection Profile for Network Devices (NDPP), version 1.1,
More informationPolicy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
More informationQuestion Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
More informationMicrosoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team
Microsoft Forefront UAG 2010 Common Criteria Evaluation Security Target Microsoft Forefront Unified Access Gateway Team Author: Microsoft Corp. Version: 1.0 Last Saved: 2011-03-10 File Name: MS_UAG_ST_1.0.docx
More informationSecurity Requirements for Network Devices
Security Requirements for Network Devices Information Assurance Directorate 10 December 2010 Version 1.0 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM
More informationChapter 8 Virtual Private Networking
Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted
More informationOFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT
SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment
More informationEnterasys Networks, Inc. Netsight/Network Access Control v3.2.2. Security Target
Enterasys Networks, Inc. Netsight/Network Access Control v3.2.2 Security Target Evaluation Assurance Level: EAL2+ Document Version: 0.7 Prepared for: Prepared by: Enterasys Networks, Inc. Corsec Security,
More informationCisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 October 15, 2012 The following user messages appear on the AnyConnect client GUI. A description follows each message, along with recommended
More informationEPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
More informationProtection Profile for Network Devices
Protection Profile for Network Devices Information Assurance Directorate 08 June 2012 Version 1.1 Table of Contents 1 INTRODUCTION... 1 1.1 Compliant Targets of Evaluation... 1 2 SECURITY PROBLEM DESCRIPTION...
More informationCommunication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
More informationCleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
More informationMicrosoft Windows Common Criteria Evaluation
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows RT Microsoft Windows Server 2012 IPsec VPN Client Security Target Document Information Version Number 1.0 Updated On January
More informationios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
More informationMicrosoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 Microsoft Windows 8.1, Microsoft Windows Server 2012 R2 Common Criteria Supplemental Admin Guidance Microsoft
More informationNIST SP 800-53 Revision 4 Mapping: Protection Profile for Application Software Version 1.0 2014-10-15
Introduction NIST SP 800-53 Revision 4 Mapping: Protection Profile for Application Software Version 1.0 2014-10-15 Several of the NIST SP 800-53/CNSS 1253 s are either fully or partially addressed by compliant
More informationCertificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationGuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.
GuardianEdge Data Protection Framework 9.0.1 with GuardianEdge Hard Disk Encryption 9.0.1 and GuardianEdge Removable Storage Encryption 3.0.1 Security Target Version 2.01 Common Criteria EAL4 augmented
More informationCertification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
More informationFINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
More informationCourse Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
More informationWindows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
More informationNational Information Assurance Partnership
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report 3eTI 3e-636 Series Network Security Devices Report Number: CCEVS-VR-VID10580 Dated: March 25,
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationNational Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Validation Report TM HP Network Node Management Advanced Edition Software V7.51 with patch PHSS_35278 Report
More informationSecurity Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
More informationDell OpenManage Mobile Version 1.4 User s Guide (Android)
Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
More informationEXTOL epassport Suite v2.5 Security Target v2.0. ECSB/MyCC/JL/002 Common Criteria EAL1 Certification
Doc Ref RD/JL/069 Replaces: N/A EXTOL epassport Suite v2.5 ECSB/MyCC/JL/002 Common Criteria EAL1 Certification Extol Corporation (M) Sdn Bhd (121135-U) (643683-U) Extol Group www.extolcorp.com Unit G1,
More informationNetwork Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationSmart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
More informationTechnical Certificates Overview
Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good
More informationCS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationMCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
More informationA Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
More informationCommunication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
More informationSecurity Target. NetIQ Access Manager 4.0. Document Version 1.13. August 7, 2014. Security Target: NetIQ Access Manager 4.0
Security Target NetIQ Access Manager 4.0 Document Version 1.13 August 7, 2014 Document Version 1.13 NetIQ Page 1 of 36 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite 810 Houston, TX
More informationWhitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
More informationLesson Plans Administering Security in a Server 2003 Network
Lesson Plans Administering Security in a Server 2003 Network (Exam 70-299) Version 2.0 Table of Contents Table of Contents... 1 Course Overview... 2 Section 1.1: Course Introduction... 4 Section 1.2: Active
More informationcollaborative Protection Profile for Full Drive Encryption Authorization Acquisition January 26, 2015
PP Reference: collaborative Protection Profile for Full Drive Encryption Authorization Acquisition collaborative Protection Profile for Full Drive Encryption Authorization Acquisition January 26, 2015
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationJMCS Northern Light Video Conferencing System Security Target
JMCS Northern Light Video Conferencing System Security Target Common Criteria: EAL2 Version 1.2 22 FEB 12 Document management Document identification Document ID Document title Product version NLVC_ST_EAL2
More informationMicrosoft Windows Common Criteria Evaluation
Microsoft Windows Common Criteria Evaluation Microsoft Windows 8 Microsoft Windows Server 2012 Full Disk Encryption Security Target Document Information Version Number 1.0 Updated On April 3, 2014 Microsoft
More informationConfigure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1
Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel between a WatchGuard Firebox Vclass appliance (Vcontroller version
More informationipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
More informationMcAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target
McAfee Web Gateway Version 7.0.1.1 EAL 2 + ALC_FLR.2 Security Target Release Date: September 2010 Document ID: Version: Draft J Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle
More informationSecurity Guide. BES12 Cloud. for BlackBerry
Security Guide BES12 Cloud for BlackBerry Published: 2015-03-31 SWD-20150317085646346 Contents Introduction... 7 About this guide...8 What is BES12 Cloud?... 9 Key features of BES12 Cloud...10 Security
More informationData Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
More informationSonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
More informationCase Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
More informationIPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
More informationApple Inc. Apple ios 9.2 MDFPPv2. Common Criteria Guide
Apple Inc. Apple ios 9.2 MDFPPv2 Common Criteria Guide Version: 1.6 Last Update: 2016-01-19 Prepared for: Apple Inc. 1 Infinite Loop Cupertino, CA 95014 www.apple.com Prepared by: atsec information security
More informationiphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationThe SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
More informationGlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
More informationSecurity Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for BlackBerry Version 12.0 Published: 2014-11-12 SWD-20141106140037727 Contents Introduction... 7 About this guide...8 What is BES12?...9 Key features of
More informationSetting Up SSL on IIS6 for MEGA Advisor
Setting Up SSL on IIS6 for MEGA Advisor Revised: July 5, 2012 Created: February 1, 2008 Author: Melinda BODROGI CONTENTS Contents... 2 Principle... 3 Requirements... 4 Install the certification authority
More informationGuidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
More informationDecryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
More informationSAMSUNG SDS FIDO Server Solution V1.1 Certification Report
KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised
More information3eTI Technologies International 3e-525/523 Series Wireless Network Access Points. Security Target
3eTI Technologies International 3e-525/523 Series Wireless Network Access Points Security Target Version 1.0 Revision I October 8 th, 2015 Page 1 2015 3e Technologies International, Inc. All rights reserved.
More informationCrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
More informationMicrosoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
More informationXceedium GateKeeper Version 5.2.1 Security Target
ceedium GateKeeper Version 521 Security Target February 3, 2011 Prepared for: ceedium, Inc 30 Montgomery Street Jersey City, NJ 07302 Prepared By: Science Applications International Corporation Common
More informationApplication Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More information