CERTIFICATION REPORT No. CRP271
|
|
|
- Allen Parrish
- 10 years ago
- Views:
Transcription
1 122 CERTIFICATION REPORT No. CRP271 Citrix XenDesktop Version 5.6 Platinum Edition Running on Server Components: Microsoft Windows Server 2008 R2 SP1, Enterprise Edition, 64-bit and User Devices and VMs: Microsoft Windows 7 Ultimate SP1, 32-bit or 64-bit Issue 1.0 November 2012 Crown Copyright 2012 All Rights Reserved Reproduction is authorised, provided that this report is copied in its entirety. CESG Certification Body AAS Delivery Office, CESG Hubble Road, Cheltenham Gloucestershire, GL51 0EX United Kingdom November 2012 Issue 1.0 Page 1 of 22
2 CERTIFICATION STATEMENT The product detailed below has been evaluated under the terms of the UK IT Security Evaluation and Certification Scheme and has met the specified Common Criteria requirements. The scope of the evaluation and the assumed usage environment are specified in the body of this report. Sponsor: Citrix Systems Inc. Developer: Citrix Systems Inc. Product and Version: Citrix XenDesktop Version 5.6 Platinum Edition Platform: Server Components: Microsoft Windows Server 2008 R2 SP1, Enterprise Edition, 64-bit. User Devices and VMs: Microsoft Windows 7 Ultimate SP1, 32-bit or 64-bit. Description: Citrix XenDesktop 5.6 Platinum Edition is a desktop virtualisation product that centralises and delivers Microsoft Windows 7 virtual desktops as a service to users anywhere. CC Version: Version 3.1 Revision 3 CC Part 2: Extended CC Part 3: Conformant EAL: EAL2 Augmented by ALC_FLR.2 PP Conformance: None CLEF: SiVenture CC Certificate: P271 Date Certified: 30 November 2012 The evaluation was performed in accordance with the requirements of the UK IT Security Evaluation and Certification Scheme as described in UK Scheme Publication 01 [UKSP01] and 02 [UKSP02P1], [UKSP02P2]. The Scheme has established the CESG Certification Body, which is managed by CESG on behalf of Her Majesty s Government. The purpose of the evaluation was to provide assurance about the effectiveness of the TOE in meeting its Security Target [ST], which prospective consumers are advised to read. To ensure that the Security Target gave an appropriate baseline for a CC evaluation, it was first itself evaluated. The TOE was then evaluated against this baseline. Both parts of the evaluation were performed in accordance with CC Parts 1 [CC1] and 3 [CC3], the Common Evaluation Methodology [CEM] and relevant Interpretations. The issue of a Certification Report is a confirmation that the evaluation process has been performed properly and that no exploitable vulnerabilities have been found in the evaluated configuration of the TOE. It is not an endorsement of the product. ARRANGEMENT ON THE RECOGNITION OF COMMON CRITERIA CERTIFICATES IN THE FIELD OF INFORMATION TECHNOLOGY SECURITY The CESG Certification Body of the UK IT Security Evaluation and Certification Scheme is a member of the above Arrangement [CCRA] and, as such, this confirms that the Common Criteria certificate has been issued by or under the authority of a Party to this Arrangement and is the Party s claim that the certificate has been issued in accordance with the terms of this Arrangement. The judgements 1 contained in the certificate and in this report are those of the Qualified Certification Body which issued them and of the Evaluation Facility which performed the evaluation. There is no implication of acceptance by other Members of the Arrangement Group of liability in respect of those judgements or for loss sustained as a result of reliance placed by a third party upon those judgements. MUTUAL RECOGNITION AGREEMENT OF INFORMATION TECHNOLOGY SECURITY EVALUATION CERTIFICATES The SOGIS MRA logo which appears below confirms that the conformant certificate has been authorised by a Participant to this Agreement [MRA] and it is the Participant s statement that the certificate has been issued in accordance with the terms of this Agreement. The judgments 1 contained in the certificate and this Certification Report are those of the compliant Certification Body which issued them and of the Evaluation Facility which carried out the evaluation. Use of the logo does not imply acceptance by other Participants of liability in respect of those judgments or for loss sustained as a result of reliance placed upon those judgments by a third party. CCRA logo CC logo SOGIS MRA logo 1 All judgements contained in this Certification Report, are covered by the CCRA [CCRA] and the MRA [MRA]. Page 2 of 22 Issue 1.0 November 2012
3 TABLE OF CONTENTS CERTIFICATION STATEMENT... 2 TABLE OF CONTENTS... 3 I. EXECUTIVE SUMMARY... 4 Introduction... 4 Evaluated Product and TOE Scope... 4 Security Target... 5 Evaluation Conduct... 5 Evaluated Configuration... 6 Conclusions... 6 Recommendations... 6 Disclaimers... 6 II. TOE SECURITY GUIDANCE... 8 Introduction... 8 Delivery and Installation... 8 Guidance Documentation... 9 III. EVALUATED CONFIGURATION TOE Identification TOE Documentation TOE Scope TOE Configuration Environmental Requirements Test Configurations IV. PRODUCT ARCHITECTURE Introduction Product Description and Architecture TOE Design Subsystems TOE Dependencies TOE Interfaces V. TOE TESTING Developer Testing Evaluator Testing Vulnerability Analysis Platform Issues VI. REFERENCES VII. ABBREVIATIONS November 2012 Issue 1.0 Page 3 of 22
4 I. EXECUTIVE SUMMARY Introduction 1. This Certification Report states the outcome of the Common Criteria (CC) security evaluation of Citrix XenDesktop Version 5.6 Platinum Edition to the Sponsor, Citrix Systems Inc., as summarised on page 2 Certification Statement of this report, and is intended to assist prospective consumers when judging the suitability of the IT security of the product for their particular requirements. 2. Prospective consumers of Citrix XenDesktop Version 5.6 Platinum Edition should understand the specific scope of the certification by reading this report in conjunction with the Security Target [ST], which specifies the functional, environmental and assurance requirements. Evaluated Product and TOE Scope 3. The following product completed evaluation to CC EAL2, augmented by ALC_FLR.2, on 20 th November 2012: Citrix XenDesktop Version 5.6 Platinum Edition 4. It is abbreviated to XenDesktop in this report. 5. The Developer was Citrix Systems Inc. 6. The TOE is a desktop virtualisation product that centralises and delivers Microsoft Windows 7 virtual desktops as a service to users anywhere. Virtual desktops are dynamically assembled on demand, providing users with pristine 2, yet personalised, desktops each time they log on. This ensures that performance never degrades. Although the desktops are virtual, running on remote servers, the user experience is equivalent to that of a local Windows desktop. From the user s perspective, logging on to a virtual desktop is the same as logging on to a local desktop. Users enter their credentials once and are connected to their desktops. 7. The evaluated configuration of this product is described in this report as the Target of Evaluation (TOE). Details of the TOE Scope, its assumed environment and the evaluated configuration are given in Chapter III Evaluated Configuration of this report. 8. The TOE excludes some Citrix components which are normally included in the XenDesktop product; those exclusions are listed in Section of [ST]. In addition, the following features of XenDesktop are not included in the scope of the evaluation: a) Server-side and client-side application virtualisation is not included in the evaluation; only applications 'baked-in' to the virtual desktop image are included in the evaluation. 2 Pristine here means in original condition, clean, unspoilt. For example, following disconnection, the memory is erased, preventing any residual data from a desktop user remaining in the memory of the virtual desktop after that user has logged out, to ensure that the data cannot be recovered by a different user. Page 4 of 22 Issue 1.0 November 2012
5 b) Smart card support for desktop user authentication is included in the evaluation, but tokens are not included in the evaluation. c) Administrators can enable/disable local peripheral support either as a global control policy or for individual users and groups of users; only the facility for applying a global control policy is included in the evaluation. d) Desktop appliances and client devices other than Windows PCs are not included as User Devices in the evaluation. e) The capability for Desktop users to belong to multiple desktop groups is not included in the evaluation, nor is the capability for desktop users to be assigned multiple desktops in a desktop group: i.e. in the evaluated configuration, a Desktop user can only use one virtual desktop from one desktop group. f) The ability for administrators to automatically create virtual desktops using Machine Creation Services is not included in the evaluation, i.e. only virtual desktops of type 'existing', created explicitly by an administrator, are included in the evaluation. g) The ability for administrators to deploy Personal vdisks for users is not included in the evaluation. 9. An overview of the TOE and its product architecture can be found in Chapter IV Product Architecture of this report. Configuration requirements are specified in Section of [ST]. Security Target 10. The Security Target [ST] fully specifies the TOE s Security Objectives, the Threats / Organisational Security Policies (OSPs) which these Objectives meet and the Security Functional Requirements (SFRs) that elaborate the Objectives. Most of the SFRs are taken from CC Part 2 [CC2]; use of this standard facilitates comparison with other evaluated products. For explicitly stated SFRs, see Section 5 of [ST]. 11. The TOE security policies are detailed in [ST]. The OSPs that must be met are specified in Section 3.4 of [ST]. 12. The environmental assumptions related to the operating environment are detailed in Chapter III (in Environmental Requirements ) of this report. Evaluation Conduct 13. The TOE s SFRs and the security environment, together with much of the supporting evaluation deliverables, remained mostly unchanged from that of Citrix XenDesktop Version 4, which had previously been certified [CRP256] by the UK IT Security Evaluation and Certification Scheme to EAL2 augmented by ALC_FLR The CESG Certification Body monitored the evaluation, which was performed by the SiVenture Commercial Evaluation Facility (CLEF). The evaluation addressed the requirements November 2012 Issue 1.0 Page 5 of 22
6 specified in the Security Target [ST]. The results of this work, completed in November 2012, were reported in the Evaluation Technical Report [ETR]. Evaluated Configuration 15. The TOE should be used in accordance with the environmental assumptions specified in the Security Target [ST]. Prospective consumers are advised to check that the SFRs and the evaluated configuration match their identified requirements, and to give due consideration to the recommendations and caveats of this report. 16. The TOE should be used in accordance with the supporting guidance documentation included in the evaluated configuration. Chapter II TOE Security Guidance of this report includes a number of recommendations regarding the secure download, installation, configuration and operation of the TOE. Conclusions 17. The conclusions of the CESG Certification Body are summarised on page 2 Certification Statement of this report. Recommendations 18. Chapter II TOE Security Guidance of this report includes a number of recommendations regarding the secure download, installation, configuration and operation of the TOE. 19. In addition, the Evaluators comments and recommendations are as follows: All guidance necessary to determine that the TOE has been securely downloaded and to securely install and operate the TOE is provided in, or referenced from [CCECG], which is available for download from the Common Criteria link from the Citrix Security webpage The TOE relies on Microsoft SQL Server 2008 R2 to provide a database for configuration data, and Citrix XenServer Platinum Edition to provide the VM Host. System integrators and risk owners using the TOE should therefore make suitable arrangements to satisfy themselves that these components are also in their evaluated configuration as recommended in Pre Installation Tasks of [CCECG]. 21. When installing the operating system on machines in the evaluated configuration, the consumer should ensure that all applicable patches, security updates, and hotfixes are applied, as recommended in [CCECG]. Disclaimers 22. This Certification Report and associated Certificate applies only to the specific version of the produced in its evaluated configuration. This is specified in Chapter III Evaluated Configuration of this report. The ETR on which this Certification Report is based relates only to the specific items tested. Page 6 of 22 Issue 1.0 November 2012
7 23. Certification is not a guarantee of freedom from security vulnerabilities. There remains a small probability (smaller with higher Evaluation Assurance Levels) that exploitable vulnerabilities may be discovered after an evaluation has been completed. This report reflects the CESG Certification Body s view at the time of certification. 24. Existing and prospective consumers should check regularly for themselves whether any security vulnerabilities have been discovered since the date of the penetration tests (as detailed in Chapter V) and, if appropriate, should check with the Vendor to see if any patches exist for the product and whether those patches have further assurance. 25. The installation of patches for security vulnerabilities, whether or not those patches have further assurance, should improve the security of the TOE but should only be applied in accordance with a consumer s risk management policy. However, note that unevaluated patching will invalidate the certification of the TOE, unless the TOE has undergone a formal recertification or is covered under an approved Assurance Continuity process by a CCRA certificate-authorising Scheme. 26. All product or company names used in this report are for identification purposes only and may be trademarks of their respective owners. 27. Note that the opinions and interpretations stated in this report under Recommendations and TOE Security Guidance are based on the experience of the CESG Certification Body in performing similar work under the Scheme. November 2012 Issue 1.0 Page 7 of 22
8 II. TOE SECURITY GUIDANCE Introduction CRP271 Citrix XenDesktop 5.6 Platinum Edition 28. The following sections provide guidance of particular relevance to purchasers of the TOE. Delivery and Installation 29. Before installation of the TOE, the consumer is recommended to check that the evaluated version has been downloaded, and to check that the security of the TOE has not been compromised. Specific advice on download and installation is provided in the following documents of the TOE: a) Before You Begin section of [CCECG]; b) To Update the Virtual Desktop Agent section of [CCECG]; c) Secure Delivery of Common Criteria Documentation section of [CCECG]. 30. The TOE is available for download from the Downloads section of My Citrix ( An MD5 checksum accompanies each download package and is available from the download page, which is secured using Secure Sockets Layer (SSL). The customer is instructed to verify the checksum in [CCECG], Chapter 4, Before You Begin. The following file name and checksum comprise the TOE: File Name: XenDesktop56.iso Checksum (MD5): 64a9146af44a6085a727f9427f57d01d 31. The above iso file includes the following components: Desktop Delivery Controller (DDC) v5.6 Desktop Studio (DS) v5.6 Web Interface (WI) (including Web Interface Management Console (WIMC)) v5.4 Virtual Desktop Agent (VDA) v Citrix Receiver (CR) v3.1 Online Plug-in v The TOE also includes the following patch files for the VDA (downloaded separately): XdsAgent_x64.msi and XdsAgent_x86.msi, as described in [CCECG], Chapter 4, To Update the Virtual Desktop Agent. Page 8 of 22 Issue 1.0 November 2012
9 33. It should be noted that the VDA, when installed in its unpatched state, is visible to users as v , but in the installed evaluated configuration (with patch applied) it is visible to users as v Thus the versions are consistent with those in Section of [ST]. 34. The customer is directed to [CCECG] Chapter 1, Secure Delivery of Common Criteria Documentation, to download the TOE related documentation from the Citrix website over HTTPS. Guidance Documentation 35. The [CCECG] includes guidance on installing and configuring the TOE as required for the evaluated configuration. 36. Specific configuration advice is provided in the Secure Configuration documentation: a) [CCECG] Common Criteria Evaluated Configuration Guide for Citrix XenDesktop 5.6 Platinum Edition; b) [LS] Citrix Licensing 11.10; c) [OP] Online Plug-in for Windows d) [REC] Receiver for Windows 3.1; e) [WI] Web Interface 5.4; f) [XD_5.6] XenDesktop 5.6; g) [XD_ADMIN] Manage (Managing XenDesktop 5). 37. The User Guide and Administration Guide documentation is as follows: a) [CCECG] Appendix A Operational Guidance for XenDesktop Administrators ; b) [CCECG] Appendix B Operational Guidance for XenDesktop Users. 3 In the TOE, the Online Plug-in is v13.1, but the document reference title states v12.1 since there were no changes that were necessary for v13.1. November 2012 Issue 1.0 Page 9 of 22
10 III. EVALUATED CONFIGURATION TOE Identification 38. The TOE is Citrix XenDesktop Version 5.6, which consists of: a) Desktop Delivery Controller (DDC) v5.6; b) Desktop Studio (DS) v5.6; CRP271 Citrix XenDesktop 5.6 Platinum Edition c) Web Interface (WI) (including Web Interface Management Console (WIMC)) v5.4; d) Virtual Desktop Agent (VDA) v ; e) Citrix Receiver (CR) v3.1 with Online Plug-in v13.1. TOE Documentation 39. The relevant guidance documentation for the evaluated configuration is identified in Chapter II (in Guidance Documentation ) of this report. TOE Scope 40. The TOE Scope is defined in the Security Target [ST] Sections and Functionality that is outside the TOE Scope is defined in [ST] Section It should be noted that the capability for Desktop users to belong to multiple desktop groups is not included in the evaluation, nor is the capability for desktop users to be assigned multiple desktops in a desktop group: i.e. in the evaluated configuration, a Desktop user can only use one virtual desktop from one desktop group. TOE Configuration 41. The evaluated configuration of the TOE is defined in [ST] Section 1.4 and specific configuration advice is provided in [CCECG]. 42. The physical boundary of the TOE encompasses the TOE Server components and the TOE Client component (as illustrated in Figure 1): a) the TOE Server components comprise the Desktop Delivery Controller (including Desktop Studio), the Web Interface, the Database, the Virtual Machine (VM) Host and the Virtual Desktop Agents; b) the TOE Client component is the Citrix Receiver running on a User Device. Page 10 of 22 Issue 1.0 November 2012
11 Figure 1 TOE Physical Boundary 43. These are all (apart from the Citrix Receiver in the case of a non-domain-joined User Device) required to belong to the same Active Directory domain, as are all desktop users and administrators. 44. The Citrix Receiver runs on the User Device, while the other components run on servers (in a variety of possible configurations). The logical boundaries of the TOE are illustrated below in Figure 2, where shaded elements are components of the TOE. November 2012 Issue 1.0 Page 11 of 22
12 Figure 2 Logical Boundaries Environmental Requirements 45. The environmental assumptions for the TOE are stated in [ST] Section The TOE was evaluated running Microsoft Windows Server 2008 R2 SP1 (64-bit) on the server components and Microsoft Windows 7 Ultimate SP1 (32-bit or 64-bit) on the User Devices and Virtual Machines. 47. The environmental IT configuration, detailed in [ST] section and [CCECG], is as follows: a) For the Web Interface including the Web Interface Management Console, a server is required with the following software: Microsoft Windows Server 2008 R2 SP1, Enterprise Edition, 64-bit; Microsoft.NET Framework 3.5, SP1; Microsoft Internet Information Server (IIS) 7.5; Page 12 of 22 Issue 1.0 November 2012
13 Microsoft ASP.NET 2.0; Microsoft Visual J# 2.0 Second Edition Redistributable Package. b) For the License Server, a server is required with the following software: Microsoft Windows Server 2008 R2 SP1, Enterprise Edition, 64-bit. c) For the Desktop Delivery Controller (DDC) including Desktop Studio (DS), a server is required with the following software: Microsoft Windows Server 2008 R2 SP1, Enterprise Edition, 64-bit; Microsoft.NET Framework 3.5, SP1; Microsoft Internet Information Server (IIS) 7.5; Microsoft ASP.NET 2.0. d) The DDC requires a Database with the following software: Microsoft Windows Server 2008 R2 SP1, Enterprise Edition, 64-bit; Microsoft SQL Server 2008 R2. e) A User Device will be a PC with the following software: Microsoft Windows 7 Ultimate SP1, 32-bit; or Microsoft Windows 7 Ultimate SP1, 64-bit. f) Each Virtual Desktop will require the following software: Microsoft Windows 7 Ultimate SP1 32-bit; or Microsoft Windows 7 Ultimate SP1 64-bit. g) The virtual desktops will be provided on the hosting infrastructure, which requires at least one server running Citrix XenServer Platinum Edition. h) Access to the domain controller is required, which will be a Microsoft server in the environment running Microsoft Active Directory Server in native mode. Test Configurations 48. The Developers used the following configuration for their testing: November 2012 Issue 1.0 Page 13 of 22
14 a) The XenDesktop hardware and software used for testing was consistent with that specified in [CCECG] and in [ST] Sections 1.4 and The Evaluators used the following configuration for their testing: a) They used the same configuration for their testing as that used by the Developers. b) The only exception to that was identified during the on-site repeat of developer testing, where an Internet Explorer setting to Check for Publisher s Certification Revocation (Internet Explorer > Internet Options > Advanced > Security) was prohibiting the developer testing from being repeated within a timely manner, as it resulted in Desktop Studio taking a long time to launch (approximately 10 minutes). That was because this setting was trying to look for a revocation list using the internet, and the test environment was not connected to the internet. The Check for Publisher s Certification Revocation setting was therefore disabled for the purposes of evaluator on-site testing. The evaluators determined that this change had no impact, for the purposes of the evaluation, on the TOE or on the server functionality that was being tested. c) The following server components were provided for evaluator testing: DDC running Desktop Studio; Web Interface (and Web Interface Management Console); License Server; VM Hosting Infrastructure, comprising 2 XenServer hosts; Smartcard enrolment station; XenServer Management Console Server; Database running Microsoft SQL Server 2008 R2; Domain Controller, running Microsoft Active Directory Server; and Storage Server used to house the virtual machines. d) The following 4 virtual desktops were made available: Microsoft Windows 7 Ultimate SP1 (2 x 32-bit and 2 x 64-bit). e) The following 4 User Device PCs were made available: 2 domain-joined and 2 non-domain-joined PCs running Microsoft Windows 7 Ultimate SP1 (2 x 64-bit and 2 x 32-bit respectively). Page 14 of 22 Issue 1.0 November 2012
15 IV. PRODUCT ARCHITECTURE Introduction 50. This Chapter gives an overview of the TOE s main architectural features. Other details of the scope of evaluation are given in Chapter III Evaluated Configuration of this report. Product Description and Architecture 51. The architecture of the TOE is described in [ST] Sections 1.3 and XenDesktop provides a complete virtual desktop delivery system by integrating several distributed components with advanced configuration tools that simplify the creation and real-time management of the virtual desktop infrastructure. The core components of XenDesktop are illustrated in Figure 3 below. TOE Design Subsystems Figure 3 XenDesktop Components 52. The high-level TOE subsystems, and their security features/functionality, are as follows: a) Desktop Delivery Controller (DDC). Installed on servers in the data centre, the DDC requires that desktop users are authenticated, manages the assembly of desktop users virtual desktop environments and access permissions for administrators, and brokers connections between desktop users and their virtual desktops. It controls the state of the desktops, starting and stopping them based on demand and administrative configuration. November 2012 Issue 1.0 Page 15 of 22
16 b) Virtual Desktop Agent (VDA). Installed on virtual desktops, the VDA enables direct Independent Computing Architecture (ICA) connections between the virtual desktop and the desktop user s User Device. c) Citrix Receiver (CR) (and online plug-in). Installed on user devices, the CR enables direct ICA connections from user devices to virtual desktops. d) Web Interface (WI). Installed on a server in the data centre, WI is used to give authorised desktop users access through the Web or intranet to the virtual desktops that they are authorised to use. Desktop users log on to WI using an Internet browser and are given the ICA file that the CR needs to connect to the VDA for access to an authorised virtual desktop. e) Desktop Studio (DS). This provides an administration interface to the DDC, making use of Windows authentication for administrators. The DS provides administrators with a number of functions, to manage the configuration of virtual desktops and manage desktop users access permissions for virtual desktops, and provides administrators with a function to manage the Endpoint data access control policy. The DS is installed on the DDC. f) Web Interface Management Console (WIMC). This provides an administration interface to WI, making use of Windows authentication for administrators. The WIMC provides administrators with functions to manage the configuration of WI, including setting the desktop user authentication method. The WIMC is installed on the WI server. g) Database. This stores the configuration data managed by the administrators with the Desktop Studio, including the Endpoint data access control policy, configuration of virtual desktops, desktop users access permissions for virtual desktops and access permissions for administrators, as well as data used by the Desktop Delivery Controller to manage virtual desktops, users and sessions. TOE Dependencies 53. The TOE dependencies on the IT environment are identified in Chapter III Environmental Requirements of this report: TOE Interfaces 54. The external TOE Security Functions Interface (TSFI) is shown in Figure 4 below. Page 16 of 22 Issue 1.0 November 2012
17 Figure 4 Interfaces to XenDesktop and between components 55. In Figure 4 above, elements shown shaded are components of the TOE. Red lines represent interfaces into the TOE (i.e. user interfaces and interfaces with external components including the operating system). Blue lines between TOE components represent interfaces that are internal to the TOE (note however, that these are delivered through the underlying network mediated by the operating system). To avoid over-complicating this diagram, other interfaces that are entirely outside the TOE (for example, between a Desktop user and the operating system on their User Device, or between the operating system on each server and the domain controller) are not shown. 56. The interactions between the components, to provide a virtual desktop to a desktop user, are detailed in [ST] Section 1.3. November 2012 Issue 1.0 Page 17 of 22
18 V. TOE TESTING Developer Testing 57. The Developer s security tests covered: all SFRs; all TOE high-level subsystems, as identified in Chapter IV (in TOE Design Subsystems ) of this report; all Security Functions (SFs); the TSFI, as identified in Chapter IV (in TOE Interfaces ) of this report. 58. The Developer s security tests also included those TOE interfaces which are internal to the product and thus had to be exercised indirectly. The Evaluators witnessed a sample of 8 of the Developer s security tests. The Evaluators confirmed the results were consistent with those reported by the Developer. 59. The Developer carried out testing on the hardware described in Chapter III (in Test Configuration ) of this report. Evaluator Testing 60. The Evaluators devised and ran a total of 12 independent security functional tests, different from those performed by the Developer. No anomalies were found. 61. The Evaluators also devised and ran a total of 9 security penetration tests to address potential vulnerabilities considered during the evaluation. No exploitable vulnerabilities or errors were detected. 62. The Evaluators carried out testing on the hardware described in Chapter III (in Test Configuration ) of this report. 63. The Evaluators completed their penetration tests on 12th October Vulnerability Analysis 64. The Evaluators vulnerability analysis, which preceded penetration testing and was reported in [ETR], was based on public domain sources and the visibility of the TOE provided by the evaluation deliverables. 65. A new security bulletin (CTX134681) was released during the evaluation (but prior to onsite evaluator testing) which affected the version of Citrix Receiver (with Online Plug-in for Windows) used in the evaluation. This vulnerability could allow arbitrary code execution on the client device in the context of the currently logged on user. This vulnerability is present in all versions of the Citrix Receiver from Windows up to and including version 3.2 and all versions of Page 18 of 22 Issue 1.0 November 2012
19 the Online Plug-in for Windows up to and including version A patch is available for this vulnerability in later versions. However, it was determined that this vulnerability is not exploitable in the evaluated configuration as it only applies to a Citrix Receiver running within a VDA which is not implemented in the evaluated configuration. The vulnerability is further mitigated by the installation of Microsoft Hotfix KB as part of the evaluated configuration; see the Operating System Updates section in [CCECG]. Platform Issues 66. The platform on which the TOE is installed should meet the requirements as specified in [ST] Section and Chapter III (in Environmental Requirements ) of this report. 67. There is only one OS that can be used for the User Devices and the VMs: Microsoft Windows 7 Ultimate SP1 (32-bit or 64-bit). There are no variations in the server components. Therefore, no multi-platform rationale is deemed required. November 2012 Issue 1.0 Page 19 of 22
20 VI. REFERENCES [CC] [CC1] [CC2] [CC3] Common Criteria for Information Technology Security Evaluation (comprising Parts 1, 2, 3: [CC1], [CC2], [CC3]). Common Criteria for Information Technology Security Evaluation, Part 1, Introduction and General Model, Common Criteria Maintenance Board, CCMB , Version 3.1 R3, July Common Criteria for Information Technology Security Evaluation, Part 2, Security Functional Components, Common Criteria Maintenance Board, CCMB , Version 3.1 R3, July Common Criteria for Information Technology Security Evaluation, Part 3, Security Assurance Components, Common Criteria Maintenance Board, CCMB , Version 3.1 R3, July [CCECG] Common Criteria Evaluated Configuration Guide for Citrix XenDesktop 5.6 Platinum Edition, Citrix Systems Inc., Document Code: November :00:41, 7 th November [CCRA] [CEM] [CRP256] [ETR] Arrangement on the Recognition of Common Criteria Certificates in the Field of Information Technology Security, Participants in the Arrangement Group, May Common Methodology for Information Technology Security Evaluation, Evaluation Methodology, Common Criteria Maintenance Board, CCMB , Version 3.1 R3, July Certification Report No. 256, Citrix XenDesktop 4 Platinum Edition running on Microsoft Windows Server 2003 SP2, Issue 1.0, August Evaluation Technical Report, SiVenture CLEF, LFV/T017/ETR, CIN9-TR-0001, Issue 1-1, 20 th November [LS] Citrix Licensing 11.10, Citrix Systems Inc., Version 11.10, licensing-11.10_ pdf, Page 20 of 22 Issue 1.0 November 2012
21 [MRA] Mutual Recognition Agreement of Information Technology Security Evaluation Certificates, Management Committee, Senior Officials Group Information Systems Security (SOGIS), Version 3.0, 8 January 2010 (effective April 2010). [OP] Online Plug-in for Windows 12.1, Citrix Systems Inc., Version 1.0, online-plugin-12.1-windows_ pdf, [REC] Receiver for Windows 3.1, Citrix Systems Inc., receiver_v3.1_ pdf, [ST] [UKSP00] [UKSP01] [UKSP02P1] [UKSP02P2] Common Criteria Security Target for Citrix XenDesktop 5.6 Platinum Edition, Citrix Systems Inc., Issue 1-1, 16 th November Abbreviations and References, UK IT Security Evaluation and Certification Scheme, UKSP 00, Issue 1.6, December Description of the Scheme, UK IT Security Evaluation and Certification Scheme, UKSP 01, Issue 6.3, December CLEF Requirements - Startup and Operations, UK IT Security Evaluation and Certification Scheme, UKSP 02: Part I, Issue 4.3, October CLEF Requirements - Conduct of an Evaluation, UK IT Security Evaluation and Certification Scheme, UKSP 02: Part II, Issue 2.4, December [WI] Web Interface 5.4, Citrix Systems Inc., Version 1.0, web_interface_v5.4_ pdf, [XD_5.6] XenDesktop 5.6, Citrix Systems Inc., xendesktop-56_ pdf, [XD_ADMIN] Manage (Managing XenDesktop 5), Citrix Systems Inc., xendesktop_managing_ pdf, Note that the references [LS], [OP], [REC], [WI], [XD_5.6] & [XD_ADMIN] are snapshots of online documents that were frozen at a point in time for the purposes of the evaluation. The date in the filename is the date they were frozen. The copyright notice within the document itself has a date of 2011, which is why the document date is 2011, but the filename contains November 2012 Issue 1.0 Page 21 of 22
22 VII. ABBREVIATIONS This list of abbreviations is specific to the TOE. It therefore excludes: general IT abbreviations (e.g. GUI, HTML, LAN, PC); standard Common Criteria abbreviations (e.g. TOE, TSF) covered in CC Part 1 [CC1]; and UK Scheme abbreviations and acronyms (e.g. CLEF, CR) covered in [UKSP00]. CR DDC DS HTTPS ICA LDAP Citrix Receiver Desktop Delivery Controller Desktop Studio Hypertext Transfer Protocol Secure Independent Computing Architecture Lightweight Directory Access Protocol MD5 Message Digest 5 SSL VDA VM WCF WI WIMC Secure Sockets Layer Virtual Desktop Agent Virtual Machine Windows Communication Foundation Web Interface Web Interface Management Console Page 22 of 22 Issue 1.0 November 2012
Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64
122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction
Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances
122 CERTIFICATION REPORT No. CRP294 Citrix NetScaler Platinum Edition Load Balancer Version 10.5 running on MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS appliances Issue 1.0 November 2015
1E POWER AND PATCH MANAGEMENT PACK INCLUDING WAKEUP AND NIGHTWATCHMAN Version 5.6 running on multiple platforms
122-B CERTIFICATION REPORT No. CRP252 1E POWER AND PATCH MANAGEMENT PACK INCLUDING WAKEUP AND NIGHTWATCHMAN Version 5.6 running on multiple platforms Issue 1.0 December 2009 Crown Copyright 2009 All Rights
CERTIFICATION REPORT No. CRP253
122-B CERTIFICATION REPORT No. CRP253 Citrix NetScaler Platinum Edition Load Balancer Version 9.1 (Build 100.3.cl) running on NetScaler 9010 FIPS, MPX 7000 platform, MPX 9000 platform, MPX 10000 platform
Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5
122-B CERTIFICATION REPORT No. CRP245 Oracle Identity and Access Management 10g Release 10.1.4.0.1 running on Red Hat Enterprise Linux AS Release 4 Update 5 Issue 1.0 June 2008 Crown Copyright 2008 Reproduction
Citrix NetScaler Platinum Edition Load Balancer
122-B CERTIFICATION REPORT No. CRP262 Citrix NetScaler Platinum Edition Load Balancer Version 9.2 running on platforms MPX 5500, MPX 9700-FIPS, MPX 10500-FIPS, MPX 12500-FIPS, MPX 15500-FIPS, MPX 7500,
Citrix XenServer 6.0.2 Platinum Edition
CERTIFICATION REPORT No. CRP270 Citrix XenServer 6.0.2 Platinum Edition Issue 1.0 September 2012 Crown Copyright 2012 All Rights Reserved Reproduction is authorised, provided that this report is copied
Citrix Password Manager, Enterprise Edition Version 4.5
122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright
Common Criteria Security Target
Common Criteria Security Target for Citrix XenDesktop 5.6 Platinum edition Version 1-1 16 November 2012 2012 Citrix Systems, Inc. All rights reserved Summary of Amendments Version Date Notes 1-1 16 November
McAfee Firewall Enterprise
122-B CERTIFICATION REPORT No. CRP261 McAfee Firewall Enterprise Version 7.0.1.02HW02 running on S1104, FW-410F, FW-510F, FW-1100F, FW-2100F, FW-2150F, FW-4150F, FW-2150F-VX04, and RM700F; also VMware
Citrix Presentation Server TM 4.5, Platinum Edition For Windows
122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP241 Citrix Presentation Server TM 4.5, Platinum Edition For Windows Issue 1.0 July 2007 Crown Copyright 2007 Reproduction is authorised provided the report
CERTIFICATION REPORT No. CRP276. Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.
0122 CERTIFICATION REPORT No. CRP276 Cisco Catalyst 4500 Series switches (4503-E, 4506-E, 4507R+E, 4510R+E, 4500X and 4500X-F) running IOS-XE 3.5.2E Issue 1.0 April 2014 Crown Copyright 2014 All Rights
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide This document covers steps to configure Citrix VDI on Juniper Network s SA Series SSL VPN platforms. It also covers brief overview of
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide
SA Citrix Virtual Desktop Infrastructure (VDI) Configuration Guide Published July 2015 This document covers steps to configure Citrix VDI on Pulse Secure s SA Series SSL VPN platforms. It also covers brief
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
Certification Report
Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
C015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
C033 Certification Report
C033 Certification Report Mobile Billing System File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
Certification Report
Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT
Template: CSEC_mall_doc.dot, 7.0 Ärendetyp: 6 Diarienummer: 14FMV10188-21:1 Dokument ID CB-015 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-12 Country of origin: Sweden Försvarets
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Certification Report
Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V
October 2015 Issue No: 1.1 Security Procedures Windows Server 2012 Hyper-V Security Procedures Windows Server 2012 Hyper-V Issue No: 1.1 October 2015 This document describes the manner in which this product
C038 Certification Report
C038 Certification Report TAXSAYA Online File name: Version: v1a Date of document: 15 August 2013 Document classification: For general inquiry about us or our services, please email: [email protected]
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Certification Report
Certification Report EAL 4+ Evaluation of Solaris 10 Release 11/06 Trusted Extensions Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Certification Report
Certification Report EAL 4 Evaluation of Desktop: Enterprise Whole Disk Encryption Only Edition, Version 9.10.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria
UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME
UK IT SECURITY EVALUATION AND CERTIFICATION SCHEME 122-B CERTIFICATION REPORT No. P166 CHECK POINT VPN-1/FireWall-1 Next Generation (NG) Issue 2.0 July 2003 Crown Copyright 2003 Reproduction is authorised
C013 Certification Report
C013 Certification Report VirtualEye v5.0 File name: Version: v1a Date of document: 8 March 2011 Document classification: For general inquiry about us or our services, please email: [email protected]
How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6.
How to Configure NetScaler Gateway 10.5 to use with StoreFront 2.6 and XenDesktop 7.6. Introduction The purpose of this document is to record the steps required to configure a NetScaler Gateway for use
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Citrix XenDesktop Administrator s Guide. Citrix XenDesktop 3.0 Citrix XenDesktop
Citrix XenDesktop Administrator s Guide Citrix XenDesktop 3.0 Citrix XenDesktop Copyright and Trademark Notice Information in this document is subject to change without notice. Companies, names, and data
OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT
SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment
Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report
KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation
How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.
Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.5 (v11.5) Document Date: March 2015 www.goliathtechnologies.com
TIBCO ActiveMatrix BusinessWorks TM. Release 5.8
National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report TIBCO ActiveMatrix BusinessWorks TM Release 5.8 Report Number: CCEVS-VR-VID10230-2010 Dated:
Certification Report
Certification Report McAfee Network Security Platform M-Series and NS- Series Sensors Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
PC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
Common Criteria Security Target For NetScaler Platinum Edition Load Balancer Version 10.0
Common Criteria Security Target For NetScaler Platinum Edition Load Balancer Version 10.0 Version 1-1 5 July 2013 2013 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-1 5 July
Citrix XenDesktop Backups with Xen & Now by SEP
Citrix XenDesktop Backups with Xen & Now by SEP WWW.SEPUSA.COM Table of Contents INTRODUCTIONANDOVERVIEW...3 CITRIXXENDESKTOPENVIRONMENT...4 CITRIXDESKTOPDELIVERYCONTROLLERBACKUP...5 CITRIXLICENSESERVERBACKUP...5
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS
CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Number: 1Y0-A14 Passing Score: 800 Time Limit: 90 min File Version: 42.2 http://www.gratisexam.com/ CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS Exam Name: Implementing
Australasian Information Security Evaluation Program
Australasian Information Security Evaluation Program Certification Report Certificate Number: 2008/50 16 Dec 2008 Version 1.0 Commonwealth of Australia 2008. Reproduction is authorised provided that the
Installation Guide for Microsoft SQL Server 2008 R2 Express. October 2011 (GUIDE 1)
Installation Guide for Microsoft SQL Server 2008 R2 Express October 2011 (GUIDE 1) Copyright 2011 Lucid Innovations Limited. All Rights Reserved This guide only covers the installation and configuration
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Certification Report StoneGate FW/VPN 5.2.5
Ärendetyp: 6 Diarienummer: 11FMV3127-87:1 Dokument ID HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2012-01-23 Country of origin: Sweden Försvarets materielverk Swedish Certification Body
Citrix EdgeSight for Load Testing Installation Guide. Citrix EdgeSight for Load Testing 3.8
Citrix EdgeSight for Load Testing Installation Guide Citrix EdgeSight for Load Testing 3.8 Copyright Use of the product documented in this guide is subject to your prior acceptance of the End User License
Exam : Citrix 1Y0-A17. Title : Implementing Citrix XenDesktop
Exam : Citrix 1Y0-A17 Title : Implementing Citrix XenDesktop Version : Demo 1. What is the role of the pool management service? A. Clones virtual machines B. Turns virtual machines on and off C. Streams
XenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
Citrix XenDesktop Modular Reference Architecture Version 2.0. Prepared by: Worldwide Consulting Solutions
Citrix XenDesktop Modular Reference Architecture Version 2.0 Prepared by: Worldwide Consulting Solutions TABLE OF CONTENTS Overview... 2 Conceptual Architecture... 3 Design Planning... 9 Design Examples...
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
App Orchestration Setup Checklist
App Orchestration Setup Checklist This checklist is a convenient tool to help you plan and document your App Orchestration deployment. Use this checklist along with the Getting Started with Citrix App
Microsoft Dynamics CRM Server 2011 software requirements
Microsoft Dynamics CRM Server 2011 software requirements This section lists the software and application requirements for Microsoft Dynamics CRM Server 2011. Windows Server operating system: Microsoft
Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD
TÜV Rheinland Nederland B.V. Version 20101101 Certification Report NXP Secure Smart Card Controller P40C012/040/072 VD Sponsor and developer: NXP Semiconductors Germany GmbH, Business Unit Identification
Single Product Review - Bitdefender Security for Virtualized Environments - November 2012
Single Product Review Bitdefender Security for Virtualized Environments Language: English November 2012 Last Revision: 1 st December 2012 Review commissioned by Bitdefender - 1 - Bitdefender Security for
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Deployment Guide for Citrix XenDesktop
Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...
Citrix - CXD-300 - Deploying Citrix XenDesktop 7 Solutions
Citrix - CXD-300 - Deploying Citrix XenDesktop 7 Solutions Duration: 5 Days Course Price: $4,995 Course Description Course Overview This training course provides students with the skills required to successfully
SSL-TLS VPN 3.0 Certification Report. For: Array Networks, Inc.
SSL-TLS VPN 3.0 Certification Report For: Array Networks, Inc. Prepared by: ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 USA http://www.icsalabs.com SSL-TLS VPN 3.0 Certification
Foundation for Windows as a Service. With FlexCast Management Architecture (FMA)
Foundation for Windows as a Service With FlexCast Management Architecture (FMA) FlexCast Delivery Technology Simplified approaches to deployment flexibility Central Management Application & Desktop Delivery
Netwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios
Citrix XenApp 6.5 and XenDesktop 5.6 Security Standards and Deployment Scenarios Supplementary scenarios Overview Citrix products offer the security specialist a wide range of features for securing Citrix
SmartCenter for Pointsec - MI Overview
Chapter SmartCenter for Pointsec - MI Overview 1 SmartCenter for Pointsec - MI is a management and administration framework solution for the Check Point Endpoint Security product line that integrates with
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
Voltage Security, Inc. Palo Alto, CA
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Report Number: CCEVS-VR-07-0029 Dated: 29 May 2007 Version: 1.3 Validation Report TM Voltage Security, Inc. Palo
Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering
Microsoft and Citrix: Joint Virtual Desktop Infrastructure (VDI) Offering Architectural Guidance July 2009 The information contained in this document represents the current view of Microsoft Corporation
CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT
26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment
