McAfee Endpoint Security with epolicy Orchestrator 5.3.1

Size: px
Start display at page:

Download "McAfee Endpoint Security with epolicy Orchestrator 5.3.1"

Transcription

1 Security Target McAfee Endpoint Security with epolicy Orchestrator Document Version 1.6 May 4, 2016 Document Version 1.6 McAfee Page 1 of 71

2 Prepared For: Prepared By: McAfee, Inc Mission College Blvd. Santa Clara, CA North Security, LLC 2020 Pennsylvania Ave NW, Suite 254 Washington, DC Abstract This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the McAfee Endpoint Security with epolicy Orchestrator This Security Target (ST) defines a set of assumptions about the aspects of the environment, a list of threats that the product intends to counter, a set of security objectives, a set of security requirements and the IT security functions provided by the TOE which meet the set of requirements. Document Version 1.6 McAfee Page 2 of 71

3 Table of Contents 1 Introduction ST Reference TOE Reference Document Organization Document Conventions Document Terminology TOE Overview TOE Description McAfee Endpoint Security (ENS) Client McAfee Agent McAfee epolicy Orchestrator (epo) Physical Boundary Hardware and Software Supplied by the IT Environment Logical Boundary TOE Data Rationale for Non-bypassability and Separation of the TOE Conformance Claims Common Criteria Conformance Claim Protection Profile Conformance Claim Security Problem Definition Threats Organizational Security Policies Assumptions Security Objectives Security Objectives for the TOE Security Objectives for the Operational Environment Security Objectives Rationale Extended Components Definition Anti-Malware (FAM) Class of SFRs FAM_ACT_(EXT).1 Anti-Malware Actions FAM_ALR_(EXT).1 Anti-Malware Alerts FAM_SCN_(EXT).1 Anti-Malware Scanning Extended Component Audit Data Generation FAU_GEN_EXT.1 Audit Data Generation (Extended) Security Requirements Security Functional Requirements Security Audit (FAU) Anti-Malware (Explicitly Stated) Cryptographic Support (FCS) Information Flow Control (FDP) Identification and Authentication (FIA) Security Management (FMT) Document Version 1.6 McAfee Page 3 of 71

4 6.1.7 Protection of the TSF (FPT) Security Assurance Requirements CC Component Hierarchies and Dependencies Security Requirements Rationale Security Functional Requirements for the TOE Security Assurance Requirements TOE Summary Specification Rationale TOE Summary Specification Client Threat Prevention Viruses Access Point Violations Potentially Unwanted Code and Programs Buffer Overflow Exploits Client Communications Protection Client Web Protection Identification & Authentication Management User Account Management Permission Set Management Audit Log Management Event Log Management System Tree Management Query Management Dashboard Management Endpoint Security Common Module Management Client Threat Prevention Policy Management Client Communications Protection Policy Management Client Web Protection Policy Management Audit Audit and Server Task Logs Threat Event Log Protected System Data Transfer List of Tables Table 1 ST Organization and Section Descriptions... 7 Table 2 Terms and Acronyms Used in Security Target... 8 Table 3 Evaluated Configuration for the TOE Table 4 epo Management System Component Requirements Table 5 Supported ENS Client and Agent Platforms Table 6 Supported Internet browsers for Web Control Functionality Table 7 Logical Boundary Descriptions Document Version 1.6 McAfee Page 4 of 71

5 Table 8 epo TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) Table 9 Client Threat Prevention TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) Table 10 Client Communications Protection TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) Table 11 Client Web Protection TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) Table 12 Threats Addressed by the TOE and Operational Environment (Management System) Table 13 Threats Addressed by the TOE (Managed Systems) Table 14 Organizational Security Policies Table 15 Assumptions Table 16 TOE Security Objectives Table 17 Operational Environment Security Objectives Table 18 Mapping of Assumptions, Threats, and OSPs to Security Objectives Table 19 Rationale for Mapping of Threats, Policies, and Assumptions to Objectives Table 20 TOE Functional Components Table 21 Audit Events and Details Table 22 Cryptographic Operations Table 23 Management of TSF Behavior and Associated Permissions Table 24 - TSF Data Access Permissions for epo TOE Data Table 25 - TSF Data Access Permissions for Client Threat Prevention Table 26 - TSF Data Access Permissions for Client Communications Protection Table 27 - TSF Data Access Permissions for Client Web Protection Table 28 Security Assurance Requirements at EAL Table 29 TOE SFR Dependency Rationale Table 30 Mapping of TOE SFRs to Security Objectives Table 31 Rationale for Mapping of TOE SFRs to Objectives Table 32 Security Assurance Rationale and Measures Table 33 SFR to TOE Security Functions Mapping Table 34 SFR to TSF Rationale List of Figures Figure 1 TOE Boundary Document Version 1.6 McAfee Page 5 of 71

6 1 Introduction This section identifies the Security Target (ST), Target of Evaluation (TOE), Security Target organization, document conventions, and terminology. It also includes an overview of the evaluated product. 1.1 ST Reference ST Title Security Target: McAfee Endpoint Security with epolicy Orchestrator ST Revision 1.6 ST Publication Date May 4, 2016 Author 38North Security 1.2 TOE Reference TOE Reference McAfee Endpoint Security with epolicy Orchestrator 5.3.1, with these extensions installed: o Endpoint Security Platform Extension, including: Threat Prevention Extension Firewall Extension Web Control Extension McAfee Endpoint Security Client , including: o Threat Prevention Client o Firewall Client o Web Control Client McAfee Agent Version TOE Type Anti-Malware, Client Firewall, Web Control 1.3 Document Organization This Security Target follows the following format: SECTION TITLE DESCRIPTION 1 Introduction Provides an overview of the TOE and defines the hardware and software that make up the TOE as well as the physical and logical boundaries of the TOE 2 Conformance Claims Lists evaluation conformance to Common Criteria versions, Protection Profiles, or Packages where applicable 3 Security Problem Definition Specifies the threats, assumptions and organizational security policies that affect the TOE Document Version 1.6 McAfee Page 6 of 71

7 SECTION TITLE DESCRIPTION 4 Security Objectives Defines the security objectives for the TOE/operational environment and provides a rationale to demonstrate that the security objectives satisfy the threats 5 Extended Components Describes extended components of the evaluation (if any) Definition 6 Security Requirements Contains the functional and assurance requirements for this TOE 7 TOE Summary Specification Identifies the IT security functions provided by the TOE and also identifies the assurance measures targeted to meet the assurance requirements. Table 1 ST Organization and Section Descriptions 1.4 Document Conventions The notation, formatting, and conventions used in this Security Target are consistent with those used in Version 3.1 of the Common Criteria. Selected presentation choices are discussed here to aid the Security Target reader. The Common Criteria allows several operations to be performed on functional requirements: The allowable operations defined in Part 2 of the Common Criteria are refinement, selection, assignment and iteration. The assignment operation is used to assign a specific value to an unspecified parameter, such as the length of a password. An assignment operation is indicated by italicized text. The refinement operation is used to add detail to a requirement, and thus further restricts a requirement. Refinement of security requirements is denoted by bold text. Any text removed is indicated with a strikethrough format (Example: TSF). The selection operation is picking one or more items from a list in order to narrow the scope of a component element. Selections are denoted by underlined text. Iterated functional and assurance requirements are given unique identifiers by appending to the base requirement identifier from the Common Criteria an iteration number inside parenthesis, for example, FIA_UAU.1.1 (1) and FIA_UAU.1.1 (2) refer to separate instances of the FIA_UAU.1 security functional requirement component. Outside the SFRs, italicized text is used for both official document titles and text meant to be emphasized more than plain text. 1.5 Document Terminology The following table describes the terms and acronyms used in this document: ASSC CC TERM DEFINITION Agent-server secure communication (ASSC) Common Criteria Document Version 1.6 McAfee Page 7 of 71

8 TERM DEFINITION CM Configuration Management EAL Evaluation Assurance Level epo epolicy Orchestrator Exception Defines a set of attributes that instructs the Agent to not enforce a rule or policy, resulting in an Event not being generated. GUI Graphical User Interface HIP Host Intrusion Prevention I&A Identification and Authentication IPS Intrusion Prevention System IT Information Technology JRE Java Runtime Environment OS Operating System OSP Organizational Security Policy PDC Primary Domain Controller PP Protection Profile SFR Security Functional Requirement Signature Signatures are patterns that indicate a potential security violation. SMTP Simple Mail Transfer Protocol ST Security Target TOE Target of Evaluation TSC TOE Scope of Control TSF TOE Security Function Table 2 Terms and Acronyms Used in Security Target 1.6 TOE Overview McAfee Endpoint Security (ENS) is a comprehensive security management solution that runs on Windows-based computers (clients) to identify and stop threats automatically. These threats include malware, suspicious communications, unsafe websites, and downloaded files. ENS intercepts threats, monitors overall system health, and reports detection and status information. While multiple management options are available, the TOE must be managed by McAfee epolicy Orchestrator (epo). Security functionality is enforced on client computers through three integrated modules working in tandem to protect systems from a wide range of threats from software, communications, and websites: McAfee Endpoint Security Threat Prevention (Threat Prevention) - Checks for viruses, spyware, unwanted programs, and other threats by scanning items automatically when users access them or on demand. Threat Prevention detects threats, then takes the actions that have been configured to protect systems. McAfee Endpoint Security Firewall (Firewall) - Monitors communication between the computer and resources on the network and the Internet. Intercepts suspicious communications. Document Version 1.6 McAfee Page 8 of 71

9 McAfee Endpoint Security Web Control (Web Control) - Displays safety ratings and reports for websites during online browsing and searching. Blocks access to websites based on safety rating or content. Together, these modules are referred to as the McAfee Endpoint Security Client. In addition to the three integrated client modules, the TOE requires the installation of the McAfee Agent on each host to be protected. ENS software is operating system specific; only the Windows version is included in this evaluation. The management capabilities for ENS are provided by epo which manages McAfee Agents and ENS software residing on client (managed) systems. A centralized but distributed architecture allows the ENS software to be centrally managed and yet decrease network traffic required to manage clients. epo provides the management interface and functionality for the administrators of the TOE. It also provides centralized audit collection and review functionality. Communication between the distributed components of the TOE (i.e. Client/Agent and epo server) is protected from disclosure and modification by cryptographic functionality provided by the TOE. 1.7 TOE Description The TOE consists of both client and management software. Client software is installed on each host to be protected and comprises of the three integrated ENS modules (i.e. Threat Prevention, Firewall, and Web Control) and the McAfee Agent. Management software is installed on a dedicated server and is provided by epo McAfee Endpoint Security (ENS) Client The McAfee ENS Client is comprised of the Threat Prevention, Firewall and Web Control integrated modules as discussed in section 1.6. The ENS Client protects systems with regular upgrades, continuous monitoring, and detailed reporting. It does this through: 1. Silently monitoring all file input and output, downloads, program executions, inbound and outbound communications, visits to websites, and other activities on managed systems, then: Deletes or quarantines detected viruses. Removes potentially unwanted programs, such as spyware or adware. Blocks or warns of suspicious activity, depending on product settings. Indicates unsafe websites with a color coded button or icon in the browser window or search results page. These indicators provide access to safety reports that detail sitespecific threats. Blocks or warns of unsafe websites, depending on product settings. Document Version 1.6 McAfee Page 9 of 71

10 2. Regularly connecting to the McAfee epo server or directly to a site on the Internet to check for: Updates to content files, which contain information that ENS uses to detect threats. These files are updated as new threats are discovered to ensure that systems are always protected against the latest threats. Upgrades to software components. If new versions are available, the client software downloads them. 3. Logging security information for each managed system, including protection status and details about detections. Security information is sent to the epo server via the McAfee Agent for analysis, reporting and, if necessary, further administrator action. 4. Regularly communicating with the epo management server via the McAfee Agent to: Send logged security information. Receive new policy assignments McAfee Agent A software agent residing on each managed system which provides secure communication between the ENS Clients and the epo server. The McAfee Agent is a vehicle of information and enforcement between the epo server and each managed (client) system. It performs the following functions: Gathers information and events from managed systems and sends them to the epo server. Installs the ENS Client on the managed systems. Provides the monitoring policies to the ENS client installed on the managed systems. Updates security content such as the policies enforced by the ENS Client McAfee epolicy Orchestrator (epo) An application executing on a dedicated server which manages and securely communicates with all installed ENS Clients via the McAfee Agent. Administrators of the TOE use epo to deploy software on client computers, manage detections, and configure security rules, called policies, that determine how product features work. The epo server provides: The management interface and functionality for the administrators of the TOE. Centralized audit collection and review functionality, including the ability to run queries and reports on event data received from the managed systems. ENS-specific functions for administering policy management for the Threat Prevention, Firewall and Web Control integrated modules. Document Version 1.6 McAfee Page 10 of 71

11 The epo server software utilizes an external database to store all data collected, created and used by epo, including: system properties, policy information, directory structure, threat events (information about detections), and all other relevant data that the server needs to keep managed systems up to date. Agent-server secure communication (ASSC) occurs at regular intervals between the managed systems and the epo server. The epo server sends any available new policy assignments or product updates for ENS Client to the managed systems. This communication occurs shortly after the client software is installed and at regular intervals thereafter Physical Boundary The TOE is software-only and includes: 1. The ENS Client software on each host to be protected; 2. The McAfee Agent executing on each host to be protected; and 3. The epo application executing on a dedicated server. The physical components of the TOE include the software that is installed during installation of ENS Client, McAfee Agent and epo. The TOE software is installed on a centralized epo server and on protected hosts (i.e. Windows-based client workstations and/or servers). The hardware, operating systems and all third party support software (e.g., Internet browsers) on the systems on which the TOE executes are excluded from the TOE boundary. The database used by the epo server is not part of the TOE. In order to comply with the evaluated configuration, the following hardware and software components should be used: TOE COMPONENT VERSION/MODEL NUMBER TOE Software McAfee Endpoint Security with epolicy Orchestrator 5.3.1, with these extensions installed: o Endpoint Security Platform Extension, including: Threat Prevention Extension Firewall Extension Web Control Extension McAfee Endpoint Security Client , including: o Threat Prevention Client o Firewall Client o Web Control Client McAfee Agent Version IT Environment Specified in the following: Table 4 epo Management System Component Requirements Table 5 Supported ENS Client and Agent Platforms Table 6 Supported Internet browsers for Web Control Functionality Document Version 1.6 McAfee Page 11 of 71

12 TOE COMPONENT TOE Guidance Documentation Table 3 Evaluated Configuration for the TOE VERSION/MODEL NUMBER The guidance for the TOE is described in the following documentation: Security Target: McAfee Endpoint Security with epolicy Orchestrator (this document) Product Guide: McAfee Endpoint Security 10.1 Installation Guide: McAfee Endpoint Security Product Guide: McAfee epolicy Orchestrator Software Installation Guide: McAfee epolicy Orchestrator Software Product Guide: McAfee Agent Operational User Guidance and Preparative Procedures Supplement: McAfee Endpoint Security with epolicy Orchestrator The evaluated configuration consists of a single instance of the management system (with epo) and one or more instances of managed systems (with McAfee Agent and the ENS Client). epo supports epo authentication, Windows authentication and certificate-based authentication of user account credentials. The evaluated configuration requires the use of epo authentication only. The following figure presents an example of an operational configuration. The shaded elements in the boxes at the top of the figure represent the TOE components. Figure 1 TOE Boundary The following specific configuration options apply to the evaluated configuration: 1. Self-managed systems (i.e. when a local system user installs the client software, customizes the features, and manages detections) have been excluded from the evaluation. Document Version 1.6 McAfee Page 12 of 71

13 2. Management of the TOE via the McAfee epo Cloud and the McAfee SecurityCenter have been excluded from the evaluation. 3. The IT Environment provides an external database for event storage, and other system data, used by the epo server. 4. The ENS Client interface must be locked with self-protection enabled. 5. Certificate, Windows and LDAP user authentication methods to the epo server have been excluded from the evaluated configuration. 6. The utilization of syslog servers, Windows event logs, XML API, or Twitter accounts to send events and/or system messages has been excluded from the evaluated configuration. 7. Updates to the TOE software are not permitted in the evaluated configuration. 8. Running the McAfee epo server in cluster mode is not permitted in the evaluated configuration. 9. The protection of TSF data transmitted between the administrator s web browser and the epo server has been excluded from the evaluation. 10. The protection of TSF data transmitted between the epo server and the external database has been excluded from the evaluation Hardware and Software Supplied by the IT Environment The TOE consists of a set of software applications. The hardware, operating systems and all third party support software (e.g., Internet browsers) on the systems on which the TOE executes are excluded from the TOE boundary. The platform on which the epo software is installed must be dedicated to functioning as the management system. epo operates as a distribution system and management system for a client-server architecture offering components for the server part of the architecture (not the clients). The TOE requires the following hardware and software configuration on this platform: Processor Memory Component Free Disk Space Operating System (64-bit) Minimum Requirements 64-bit Intel Pentium D or higher; 2.66GHz or higher 4 GB available RAM recommended minimum 5 GB Recommended minimum Windows Server 2008 R2 Enterprise with Service Pack 1 Windows Server 2008 R2 Standard with Service Pack 1 Windows Server 2008 R2 Datacenter with Service Pack 1 DBMS Microsoft SQL Server 2008 R2 Enterprise with Service Pack 1 Microsoft SQL Server 2008 R2 Express with Service Pack 1 Microsoft SQL Server 2008 R2 Standard with Service Pack 1 Microsoft SQL Server 2008 R2 Workgroup with Service Pack 1 Document Version 1.6 McAfee Page 13 of 71

14 Component Required Software Internet Browser (required for management) Minimum Requirements Microsoft.NET Framework 2.0 or later Microsoft Visual C SP1 Redistributable Microsoft Visual C Redistributable Package (x86) Microsoft XML Core Services (MSXML) 6.0 Google Chrome 17.0 or later Table 4 epo Management System Component Requirements The McAfee Agent and ENS Client execute on one or more managed systems. The supported platforms for these components are both client and server Windows-based operating systems: OS TYPE SUPPORTED AGENT OS PLATFORM Windows 8.1 with Update 1 (all editions) X64 platform Client Windows 8 (all editions) X64 platform Windows 7 with SP1 (all editions) X64 platform Server Windows Server 2012 (all editions) X64 platform Windows Server 2008 R2 (all editions) X64 platform Table 5 Supported ENS Client and Agent Platforms In addition, the Web Control module of ENS is supported on one of these browsers (in conjunction with a reliable Internet connection): Microsoft Internet Explorer 11 Mozilla Firefox 45 Google Chrome 49 SUPPORTED INTERNET BROWSERS FOR WEB CONTROL Table 6 Supported Internet browsers for Web Control Functionality A full list of unevaluated supported operating systems can be found at the McAfee Knowledge Center, Technical Article ID: KB82761, located on the McAfee Service portal URL: Logical Boundary This section outlines the boundaries of the security functionality of the TOE; the logical boundary of the TOE includes the security functionality described in the following sections. TSF Client Threat Prevention DESCRIPTION The TOE checks for malware (including viruses, trojan horses, adware, spyware, keyloggers, unwanted programs, etc), and other threats by scanning items (such as files, the registry and processes (programs) resident in memory) automatically when users access them or on demand. The TOE detects and reports (alerts) on threats, then takes the actions that have been configured to protect systems. Actions for detected malware include Document Version 1.6 McAfee Page 14 of 71

15 TSF DESCRIPTION automatic quarantine, cleaning, and deletion from the affected system. Scans are configured as either on-access or on-demand. On-access scans will scan files as they first enter the system and deliver notifications to the user and management server when detections occur. On-demand scans are executed by the user manually or pre-defined by the administrator at a scheduled time, or at system startup. During either scan, files must meet predefined criteria to indicate a potential threat. Suspected threats are then compared against signatures for a possible match. Unwanted changes to managed systems are prevented by restricting access to specified items including ports, files, shares, the registry and keys. Rules can be created to report or block access to these items. The TOE compares a requested action against the list of rules and takes the action specified by the rule. The execution of potentially unwanted programs can also be blocked by the TOE. The execution of arbitrary code (such as buffer overflows) on managed systems is prevented by monitoring user-mode API calls to recognize when they occur. When a detection occurs, information is recorded in the activity log, alerted on the client system, and sent to the management server. Client Communications Protection The TOE implements a firewall that scans all incoming and outgoing traffic on managed systems (i.e. clients). As it reviews arriving or departing traffic, the Firewall checks its list of rules, which is a set of criteria with associated actions. If the traffic matches all criteria in a rule, the Firewall acts according to the rule, blocking or allowing traffic through the Firewall. Firewall options and rules define how the Firewall works. Firewall Option settings enable the administrator to also block incoming and outgoing traffic from a network connection that McAfee Global Threat Intelligence (GTI) 1 rates as high risk. Rule groups organize firewall rules to simplify management. Information about threat detections is saved for reports that notify the user and administrator of any security issues for the managed system. Client Web Protection The TOE implements a Web Control feature that displays safety ratings and reports for websites during online browsing and searching. Websites are 1 McAfee GTI is a global Internet reputation intelligence system that determines what is good and bad behavior on the Internet. McAfee GTI uses real-time analysis of worldwide behavioral and sending patterns for , web activity, malware, and system-to-system behavior. Using data obtained from the analysis, McAfee GTI dynamically calculates reputation scores that represent the level of risk to your network when you visit a webpage. The result is a database of reputation scores for IP addresses, domains, specific messages, URLs, and images. Document Version 1.6 McAfee Page 15 of 71

16 TSF DESCRIPTION assigned a color-coded safety rating based on analysis and test results from McAfee. The software uses the test results to notify the user about webbased threats they might encounter while visiting the site. The safety rating is also present on search engine results pages. Identification and Authentication Management Audit Protected Data Transfer Table 7 Logical Boundary Descriptions TOE Data The administrator creates policies for Web Control on managed systems to control access to sites, pages, and downloads based on their safety rating or type of content. Sites may be blocked or allowed based on URLs and domains. The administrator can monitor and regulate browser activity on network computers, and create detailed reports about websites. The administrator can also control user access to Web Control features and configuration settings. The TOE requires administrative users to identify and authenticate themselves before accessing the TOE software or before viewing any TSF data or configuring any portion of the TOE. No action can be initiated before proper identification and authentication. Each TOE user has security attributes associated with their user account that defines the functionality the user is allowed to perform. The TOE s Management Security Function provides administrator functionality that enables a human user to configure and manage TOE components. Configuration functionality includes enabling a user to modify TSF Data. Management functionality includes invocation of TOE functions that effect security functions and security function behavior. The TOE generates audit records upon detection of a potential security violation or system configuration events. The audit records can be viewed by an authorized user. The TOE consists of distributed components. epo server to McAfee Agent communication relies upon cryptographic functionality provided by the TOE to protect the information exchanged from disclosure or modification. TOE data consists of both TSF data and user data (information). TSF data consists of authentication data, security attributes, and other generic configuration information. Security attributes enable the TOE to enforce the security policy. Authentication data enables the TOE to identify and authenticate users epo TOE Data TSF Data Description AD UA GE Audit Log History list of all user actions on the epo server. Dashboards Collections of chart-based queries that are refreshed at a user-configured interval. Document Version 1.6 McAfee Page 16 of 71

17 TSF Data Description AD UA GE epo User epo user name, role, authentication type, logon status, and Accounts permission set for each user authorized to access TOE functionality on the management system. Groups Node on the hierarchical System Tree that may contain subordinate groups or systems. Permission A privilege to perform a specific function. Permission Set A group of permissions that can be granted to any users by assigning it to those users accounts. Queries and Configurable objects that retrieve and display data from the Reports database. Server Settings Control how the epolicy Orchestrator server behaves. System Information specific to a single managed system (e.g. Information internet address) in the System Tree. System Tree A hierarchical collection of all of the systems managed by epolicy Orchestrator. Threat Event Lists all threat events generated by the managed systems. Log User Interface Policies Policies that control the access users have to the Endpoint Security client interface on the managed systems. Table 8 epo TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) Client Threat Prevention TOE Data TSF Data Description AD UA GE Access Policies used to restrict access to specified ports, files, Protection Policies shares, registry keys, and registry values on the client systems. AMCore A content file which contain the latest signatures by Threat Prevention on the client systems. Application A list of applications that are protected by Exploit Prevention. Protection Lists Extra.DAT files Exclusions Exploit Prevention Content Exploit Prevention Policies A temporary content file which contains information that Threat Prevention uses to handle new malware to be included in the next AMCore file update. An item to be excluded from an on-demand scan, or a process to be excluded from exploit prevention/access protection policies. A content file containing memory protection signatures (for Generic Buffer Overflow Protection) and the Application Protection List. Policies used to prevent buffer overflows on the client systems. Document Version 1.6 McAfee Page 17 of 71

18 TSF Data Description AD UA GE On-Access Scan Policies Policies that enable and define when on-access scans are performed and the actions taken upon detection on the client systems. Also configures the settings and actions for standard, low and high risk processes. On-Demand Scan Policies On-Demand Scan Tasks Options Policies Quarantine Policies Quarantined Files Unwanted Programs Policies that enable and configure the operation of ondemand scanning on the client systems, including full scans, quick scans, and right-click scanning. Tasks that define the configuration of on-demand scans that may be invoked on the client systems. Policies that specify the quarantine settings, exclusions, and unwanted program detections on the client systems. Policies that specify where quarantined files are stored on the client systems and how long they are kept. Collection of files on a client system that have been quarantined by Threat Prevention. A list of undesirable programs to be detected on the client systems. Table 9 Client Threat Prevention TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) Client Communications Protection TOE Data TSF Data Description AD UA GE Options Policies Used to turn firewall protection on and off, enable Adaptive mode, and configure other Firewall options. Also used to create a list of domain names to block connections to the IP addresses resolving to those domain names. Rules Firewall rules determine how to handle network traffic. Each rule provides a set of conditions that traffic must meet and an action to allow or block traffic. Rule Groups A collection of firewall rules used to simplify management. Table 10 Client Communications Protection TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) Client Web Protection TOE Data TSF Data Description AD UA GE Browser Activity Collection of user browser events (including websites visited) on the managed systems. Options Policies Used to configures general Web Control settings, which includes enabling, specifying action enforcement, Secure Search, event logging, web gateway settings, and annotations. Safety Ratings Web Control Policies A color-coded safety rating button or icon indicating the level of trust of a specific website. Used to control user access to sites, pages, and downloads based on their safety rating or type of content. Sites may be blocked or allowed based on URLs and domains. Document Version 1.6 McAfee Page 18 of 71

19 Table 11 Client Web Protection TOE Data (Legend: AD=Authentication data; UA=User attribute; GE=Generic Information) 1.8 Rationale for Non-bypassability and Separation of the TOE The responsibility for non-bypassability and non-interference is split between the TOE and the IT Environment. TOE components are software only products and therefore the non-bypassability and non-interference claims are dependent upon hardware and OS mechanisms. The TOE runs on top of the IT Environment supplied operating systems. The TOE ensures that the security policy is applied and succeeds before further processing is permitted whenever a security relevant interface is invoked: the interfaces are well defined and insure that the access restrictions are enforced. Non-security relevant interfaces do not interact with the security functionality of the TOE. The TOE depends upon OS mechanisms to direct the system calls and network packets to the TOE for examination. The TOE is implemented with well-defined interfaces that can be categorized as security relevant or non-security relevant. The TOE is implemented such that non-security relevant interfaces have no means of impacting the security functionality of the TOE. Unauthenticated users may not perform any actions within the TOE. The TOE tracks multiple users by sessions and ensures the access privileges of each are enforced. The server hardware provides virtual memory and process separation, which the server OS utilizes to ensure that other (non-toe) processes may not interfere with the TOE; all interactions are limited to the defined TOE interfaces. The OS and DBMS restrict access to TOE data in the database to prevent interference with the TOE via that mechanism. The TOE consists of distributed components. Communication between the components relies upon cryptographic functionality provided by the TOE to protect the information exchanged from disclosure or modification. Document Version 1.6 McAfee Page 19 of 71

20 2 Conformance Claims 2.1 Common Criteria Conformance Claim The TOE is Common Criteria Version 3.1 Revision 4 (September 2012) Part 2 extended and Part 3 conformant at Evaluation Assurance Level 2 and augmented by ALC_FLR.2 Flaw Reporting Procedures. 2.2 Protection Profile Conformance Claim The TOE does not claim conformance to a Protection Profile. Document Version 1.6 McAfee Page 20 of 71

21 3 Security Problem Definition In order to clarify the nature of the security problem that the TOE is intended to solve, this section describes the following: Any known or assumed threats to the assets against which specific protection within the TOE or its environment is required. Any organizational security policy statements or rules with which the TOE must comply. Any assumptions about the security aspects of the environment and/or of the manner in which the TOE is intended to be used. This chapter identifies assumptions as A.assumption, threats as T.threat and policies as P.policy. 3.1 Threats The following are threats identified for the TOE and the IT System the TOE monitors. The TOE itself has threats and the TOE is also responsible for addressing threats to the environment in which it resides. The assumed level of expertise of the attacker for all the threats is unsophisticated. The following table identifies threats to the management system (epo): THREAT T.COMDIS T.COMINT T.FACCNT T.IMPCON T.LOSSOF T.PRIVIL DESCRIPTION An unauthorized user may attempt to disclose the data collected and produced by the TOE by bypassing a security mechanism. An unauthorized user may attempt to compromise the integrity of the data collected and produced by the TOE by bypassing a security mechanism. Unauthorized attempts to access TOE data or security functions may go undetected. An unauthorized user may inappropriately change the configuration of the TOE causing potential intrusions to go undetected. An unauthorized user may attempt to remove or destroy data collected and produced by the TOE. An unauthorized user may gain access to the TOE and exploit system privileges to gain access to TOE security functions and data Table 12 Threats Addressed by the TOE and Operational Environment (Management System) The following table identifies threats to the managed systems (user workstations) that may be indicative of vulnerabilities in or misuse of IT resources: THREAT T.ASPOOF DESCRIPTION An unauthorized person on an external network may attempt to by-pass the information flow control policy by disguising identification data (e.g., spoofing the source address) and masquerading as a legitimate user or entity on an internal network. Document Version 1.6 McAfee Page 21 of 71

22 THREAT T.BADURL T.MALWARE T.MEDIAT T.SCNVUL DESCRIPTION The TOE may fail to identify an unsafe website or domain requested by the workstation user. A malicious agent may attempt to introduce malware onto a workstation via network traffic or removable media to compromise data on that workstation, or use that workstation to attack additional systems. An unauthorized person may send impermissible information through the TOE, which results in the exploitation of resources on the internal network. Vulnerabilities may exist in the IT System the TOE manages. Table 13 Threats Addressed by the TOE (Managed Systems) 3.2 Organizational Security Policies An organizational security policy is a set of rules, practices, and procedures imposed by an organization to address its security needs. The following Organizational Security Policies apply to the TOE: POLICY P.ACCACT P.ACCESS P.INTGTY P.MANAGE P.MANSCAN P.PROTCT Table 14 Organizational Security Policies DESCRIPTION The authorized users of the TOE shall be held accountable for their actions within the TOE. All data collected and produced by the TOE shall only be used for authorized purposes. Data collected and produced by the TOE shall be protected from modification. The TOE shall only be managed by authorized users. The authorized users of the workstations shall initiate manual anti-virus scans of removable media (e.g., floppy disks, CDs) introduced into the workstation before accessing any data on the removable media. The TOE shall be protected from unauthorized accesses and disruptions of TOE data and functions. 3.3 Assumptions This section describes the security aspects of the environment in which the TOE is intended to be used. The TOE is assured to provide effective security measures in a co-operative non-hostile environment only if it is installed, managed, and used correctly. The following specific conditions are assumed to exist in an environment where the TOE is employed. ASSUMPTION A.ACCESS A.ASCOPE A.DYNMIC DESCRIPTION The TOE has access to all the IT System data it needs to perform its functions. The TOE is appropriately scalable to the number of IT Systems the TOE manages. The TOE will be managed in a manner that allows it to appropriately address changes in the IT System the TOE manages. Document Version 1.6 McAfee Page 22 of 71

23 ASSUMPTION A.GTI A.LOCATE A.MANAGE A.NOEVIL A.PROTCT A.SECDBASE A.SECMGMT A.SECUPDTE Table 15 Assumptions DESCRIPTION Managed systems will securely download reputation values for URLs and domains and safety ratings for websites in real-time through the McAfee GTI service. The processing resources of the TOE will be located within controlled access facilities, which will prevent unauthorized physical access. There will be one or more competent individuals assigned to manage the TOE and the security of the information it contains. The authorized administrators are not careless, willfully negligent, or hostile, and will follow and abide by the instructions provided by the TOE documentation. The TOE hardware and software critical to security policy enforcement will be protected from unauthorized physical modification. The external database will utilize SSL communication with the epo server to protect system data. Management sessions will utilize HTTPS communication between the authorized administrator s web browser and the Epo web server to protect management session data. Administrators will implement secure mechanisms for receiving and validating updated signature files from McAfee, and for distributing the updates to the central management systems. Document Version 1.6 McAfee Page 23 of 71

24 4 Security Objectives 4.1 Security Objectives for the TOE The IT security objectives for the TOE are addressed below: OBJECTIVE O.ACCESS O.AUDITS O.EADMIN O.IDAUTH O.MEDIAT O.EXPORT O.PROTCT O.MALWARE Table 16 TOE Security Objectives DESCRIPTION The TOE must allow authorized users to access only appropriate TOE functions and data. The TOE must record audit records for data accesses and use of the System functions. The TOE must include a set of functions that allow effective management of its functions and data. The TOE must be able to identify and authenticate users prior to allowing access to TOE functions and data. The TOE must mediate the flow of all information between client workstations and other users and/or IT entities located on internal and external networks governed by the TOE. When any TOE component makes its data available to another TOE component, the TOE will ensure the confidentiality of the TOE data. The TOE must protect itself from unauthorized modifications and access to its functions and data. The TOE will detect and take action against known malware introduced to the workstation via network traffic or removable media. 4.2 Security Objectives for the Operational Environment The security objectives for the operational environment are addressed below: OBJECTIVE OE.AUDIT_PROTECTION OE.CREDEN OE.GTI OE.INSTAL OE.INTROP OE.PERSON OE.PHYCAL DESCRIPTION The IT Environment will provide the capability to protect audit information. Those responsible for the TOE must ensure that all access credentials are protected by the users in a manner which is consistent with IT security. Administrators shall ensure that managed systems receive reputation values for URLs and domains and safety ratings for websites from the McAfee GTI service in real-time via secure mechanisms. Those responsible for the TOE must ensure that the TOE is delivered, installed, managed, and operated in a manner which is consistent with IT security. The TOE is interoperable with the IT System it monitors. Personnel working as authorized administrators shall be carefully selected and trained for proper operation of the System. Those responsible for the TOE must ensure that those parts of the TOE critical to security policy are protected from any physical attack. Document Version 1.6 McAfee Page 24 of 71

25 O.ACCESS O.AUDITS O.EADMIN O.IDAUTH O.MEDIAT O.EXPORT O.PROTCT O.MALWARE OE.AUDIT_PROTECTION OE.CREDEN OE.GTI OE.INSTAL OE.INTROP OE.PERSON OE.PHYCAL OE.PROTECT OE.SD_PROTECTION OE.SECURE_UPDATES OE.SECURE_STORAGE OE.TIME Security Target: McAfee Endpoint Security with epolicy Orchestrator OBJECTIVE OE.PROTECT OE.SD_PROTECTION OE.SECURE_UPDATES OE.SECURE_STORAGE OE.TIME Table 17 Operational Environment Security Objectives DESCRIPTION The IT environment will protect itself and the TOE from external interference or tampering. The IT Environment will provide the capability to protect system data via mechanisms outside the TSC. Enterprises using the TOE shall ensure that signature file updates are received from McAfee via secure mechanisms, the updates are validated before being used, and the updates are distributed to central management systems with the Enterprise via secure mechanisms. The IT Environment will securely store TOE data in the external database and securely retrieve it when directed by the TOE. The IT Environment will provide reliable timestamps to the TOE 4.3 Security Objectives Rationale This section provides the summary that all security objectives are traced back to aspects of the addressed assumptions, threats, and Organizational Security Policies (if applicable). The following table provides a high level mapping of coverage for each threat, assumption, and policy: OBJECTIVE THREAT / ASSUMPTION A.ACCESS A.ASCOPE A.DYNMIC A.GTI A.LOCATE A.MANAGE A.NOEVIL A.PROTCT A.SECDBASE A.SECMGMT A.SECUPDTE P.ACCACT P.ACCESS P.INTGTY P.MANAGE P.MANSCAN Document Version 1.6 McAfee Page 25 of 71

26 O.ACCESS O.AUDITS O.EADMIN O.IDAUTH O.MEDIAT O.EXPORT O.PROTCT O.MALWARE OE.AUDIT_PROTECTION OE.CREDEN OE.GTI OE.INSTAL OE.INTROP OE.PERSON OE.PHYCAL OE.PROTECT OE.SD_PROTECTION OE.SECURE_UPDATES OE.SECURE_STORAGE OE.TIME Security Target: McAfee Endpoint Security with epolicy Orchestrator OBJECTIVE THREAT / ASSUMPTION P.PROTCT T.ASPOOF T.BADURL T.COMDIS T.COMINT T.FACCNT T.IMPCON T.LOSSOF T.MALWARE T.MEDIAT T.PRIVIL T.SCNVUL Table 18 Mapping of Assumptions, Threats, and OSPs to Security Objectives The following table provides detailed evidence of coverage for each threat, policy, and assumption: THREATS, POLICIES, AND ASSUMPTIONS A.ACCESS A.ASCOPE A.DYNMIC A.GTI RATIONALE The TOE has access to all the IT System data it needs to perform its functions. The OE.INTROP objective ensures the TOE has the needed access. The TOE is appropriately scalable to the number of IT Systems the TOE manages. The OE.INTROP objective ensures the TOE has the necessary interactions with the IT System it monitors. The TOE will be managed in a manner that allows it to appropriately address changes in the IT Systems the TOE manages. The OE.INTROP objective ensures the TOE has the proper access to the IT System. The OE.PERSON objective ensures that the TOE will be managed appropriately. Managed systems will securely download reputation values for URLs and domains and safety ratings for websites in real-time through the McAfee GTI service. The OE.GTI objective ensures that managed systems receive reputation values for URLs and domains and safety ratings for websites from the McAfee GTI service in real-time via secure mechanisms. Document Version 1.6 McAfee Page 26 of 71

27 THREATS, POLICIES, AND ASSUMPTIONS A.LOCATE A.MANAGE A.NOEVIL A.PROTCT A.SECDBASE A.SECMGMT A.SECUPDTE RATIONALE The processing resources of the TOE will be located within controlled access facilities, which will prevent unauthorized physical access. The OE.PHYCAL provides for the physical protection of the TOE. There will be one or more competent individuals assigned to manage the TOE and the security of the information it contains. The OE.PERSON objective ensures all authorized administrators are qualified and trained to manage the TOE. The authorized administrators are not careless, willfully negligent, or hostile, and will follow and abide by the instructions provided by the TOE documentation. The OE.INSTAL objective ensures that the TOE is properly installed and operated and the OE.PHYCAL objective provides for physical protection of the TOE by authorized administrators. The OE.CREDEN objective supports this assumption by requiring protection of all authentication data. The TOE hardware and software critical to security policy enforcement will be protected from unauthorized physical modification. The OE.PHYCAL objective provides for the physical protection of the TOE hardware and software. The external database will utilize SSL communication with the epo server to protect system data. The OE.SECURE_STORAGE objective requires the IT Environment to provide secure storage and retrieval mechanisms for System data for use by the TOE. The OE.SD_PROTECTION objective provides for the capability to protect system data via mechanisms outside the TSC. The use of SSL communication between the external database and the epo server is a mechanism outside the TSC. Management sessions will utilize HTTPS communication between the authorized administrator s web browser and the epo web server to protect management session data. The OE.SD_PROTECTION objective provides for the capability to protect system data via mechanisms outside the TSC. The HTTPS implementation provided by the epo web server and the administrator s web browser is a mechanism outside the TSC. Administrators will implement secure mechanisms for receiving and validating updated signature files from McAfee, and for distributing the updates to the central management systems. The OE.SECURE_UPDATES objective ensures Administrators use secure mechanisms to receive and validate the updates from McAfee, then use secure mechanisms to distribute the updates to the central management systems. Document Version 1.6 McAfee Page 27 of 71

McAfee Endpoint Security with epolicy Orchestrator 5.3.2

McAfee Endpoint Security with epolicy Orchestrator 5.3.2 Security Target McAfee Endpoint Security 10.5.0 with epolicy Orchestrator 5.3.2 Document Version 1.8 April 17, 2017 Document Version 1.8 McAfee Page 1 of 72 Prepared For: Prepared By: McAfee, Inc. 2821

More information

Security Target. McAfee Host Data Loss Prevention 9.2 and epolicy Orchestrator 4.6. Document Version 1.0. February 21, 2012

Security Target. McAfee Host Data Loss Prevention 9.2 and epolicy Orchestrator 4.6. Document Version 1.0. February 21, 2012 Security Target McAfee Host Data Loss Prevention 9.2 and epolicy Orchestrator 4.6 Document Version 1.0 February 21, 2012 Document Version 1.0 McAfee Page 1 of 50 Prepared For: Prepared By: McAfee, Inc.

More information

McAfee MOVE 2.5 and epolicy Orchestrator 4.6

McAfee MOVE 2.5 and epolicy Orchestrator 4.6 Security Target McAfee MOVE 2.5 and epolicy Orchestrator 4.6 Document Version 1.4 August 14, 2012 Document Version 1.4 McAfee Page 1 of 52 Prepared For: Prepared By: McAfee, Inc. 2821 Mission College Blvd.

More information

Security Target. EMC ScaleIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: February 2016.

Security Target. EMC ScaleIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: February 2016. EMC ScaleIO v1.32.3 Security Target Evaluation Assurance Level (EAL): EAL2+ Doc No: 1903-000-D102 8 February 2016 Prepared For: EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of McAfee Deep Defender 1.0.1 and epolicy Orchestrator 4.6.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

Host Intrusion Prevention and. epolicy Orchestrator (Patch 1)

Host Intrusion Prevention and. epolicy Orchestrator (Patch 1) Security Target Host Intrusion Prevention 6.0.2 and epolicy Orchestrator 3.6.1 (Patch 1) McAfee System Protection Industry-leading intrusion prevention solutions TABLE OF CONTENTS 1. SECURITY TARGET INTRODUCTION...

More information

Security Target. McAfee Data Loss Prevention 11.0 with epolicy Orchestrator 5.9.0

Security Target. McAfee Data Loss Prevention 11.0 with epolicy Orchestrator 5.9.0 Security Target McAfee Data Loss Prevention 11.0 with epolicy Orchestrator 5.9.0 Version 1.0 December 11, 2017 Prepared For: Prepared By: McAfee, LLC. 2821 Mission College Blvd. Santa Clara, CA 95054 Primasec

More information

Q1 Labs. QRadar V5.1.2 Security Target V 2.0.4

Q1 Labs. QRadar V5.1.2 Security Target V 2.0.4 Q1 Labs QRadar V5.1.2 Security Target V 2.0.4 Prepared By: Suite 5200 West 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0960 SECTION TABLE OF CONTENTS Security Target Version

More information

Security Target. EMC XtremIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: March 2016.

Security Target. EMC XtremIO v Evaluation Assurance Level (EAL): EAL2+ Doc No: D102 Version: March 2016. EMC XtremIO v4.0.2 Security Target Evaluation Assurance Level (EAL): EAL2+ Doc No: 1906-000-D102 21 March 2016 Prepared For: EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada

More information

Trustwave DbProtect Version Security Target

Trustwave DbProtect Version Security Target Trustwave DbProtect Version 6.4.9 Security Target Version 1.9 February 17, 2017 Trustwave 70 West Madison Street Suite 1050 Chicago, IL 60602 Prepared By: Common Criteria Consulting LLC 15804 Laughlin

More information

IBM Proventia Network Enterprise Scanner and SiteProtector Security Target

IBM Proventia Network Enterprise Scanner and SiteProtector Security Target IBM Proventia Network Enterprise Scanner 1.3 with PU 1.28 and SiteProtector 2.0 SP6.1 with Reporting Module and with Catalog 2.61 (Version 2.684/1/24/008) Security Target Version 1.6 November 25, 2008

More information

IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target. Security Target. Version 1.19.

IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target. Security Target. Version 1.19. IBM Proventia G 1.3 and SiteProtector 2.0 Service Pack 6.1 with Reporting Module Security Target Version 1.19 May 10, 2010 Internet Security Systems, Inc. 6303 Barfield Road Atlanta, GA 30328 Table of

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT McAfee VirusScan Enterprise 8.8 and epolicy Orchestrator 5.1.3 v1.0 9 May 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority

More information

Security Target. Juniper Networks vgw Series Version 5.5. Document Version 0.5. March 22, 2013

Security Target. Juniper Networks vgw Series Version 5.5. Document Version 0.5. March 22, 2013 Security Target Juniper Networks vgw Series Version 5.5 Document Version 0.5 March 22, 2013 Document Version 0.5 Juniper Networks Page 1 of 42 Prepared For: Prepared By: Juniper Networks, Inc. 1194 North

More information

Symantec Data Loss Prevention 14.5

Symantec Data Loss Prevention 14.5 Symantec Data Loss Prevention 14.5 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1943-000-D102 Version: 1.2 15 November 2016 Symantec Corporation 303 2 nd Street 1000N San Francisco, CA 94107 United

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT McAfee Data Loss Prevention 11.0 with epolicy Orchestrator 5.9.0 4 January 2018 383-4-429 Version 1.0 Government of Canada. This document is the property of the Government

More information

Deep Security 9.5 Security Target (EAL2+) Revision: 21.0

Deep Security 9.5 Security Target (EAL2+) Revision: 21.0 Deep Security 9.5 Security Target (EAL2+) Revision: 21.0 Issued: 13 Mar 2015. Trend Micro, Inc. 40 Hines Road Suite 200 Ottawa, Ontario, Canada K2K 2M5 +1-866-684-7332 Revision History Rev. # Description

More information

Security Target. Symantec Brightmail Gateway Document Version 1.4. December 23, Security Target: Symantec Brightmail Gateway 9.0.

Security Target. Symantec Brightmail Gateway Document Version 1.4. December 23, Security Target: Symantec Brightmail Gateway 9.0. Security Target Symantec Brightmail Gateway 9.0.1 Document Version 1.4 December 23, 2010 Document Version 1.4 Symantec Page 1 of 36 Prepared For: Prepared By: Symantec Corporation 350 Ellis Street Mountain

More information

Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series

Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series Security Target Juniper Networks JUNOS-FIPS 10.4R4 for SRX Series Document Version 1.5 Rev A December 22, 2011 Document Version 1.5 2011 Juniper Networks Page 1 of 81 Prepared For: Prepared By: Juniper

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT McAfee Policy Auditor 6.4 with epolicy Orchestrator 5.10 5 November 2018 383-4-455 V1.0 Government of Canada. This document is the property of the Government of Canada.

More information

Security Target. Document Version November 2015

Security Target. Document Version November 2015 Security Target McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.5 Document Version 1.2

More information

Certification Report

Certification Report Certification Report McAfee Management for Optimized Virtual Environments Antivirus 3.0.0 with epolicy Orchestrator 5.1.1 Issued by: Communications Security Establishment Certification Body Canadian Common

More information

Dell EMC NetWorker 9.1

Dell EMC NetWorker 9.1 Dell EMC NetWorker 9.1 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1986-000-D102 Version: 1.2 10 July 2017 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

Network Chemistry, Inc. Security Target

Network Chemistry, Inc. Security Target Network Chemistry RFprotect TM Distributed v6.1.2, RFprotect TM Sensor v6.1.22, and RFprotect TM Mobile v6.1.2 Security Target Evaluation Assurance Level: EAL 2 Document Version: 1.0 Prepared for: Prepared

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. For. Imperva SecureSphere 9.

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme. Validation Report. For. Imperva SecureSphere 9. National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme TM Validation Report For Report Number: CCEVS-VR-10466-2012 Dated: 28 December 2012 Version: 0.2 National Institute

More information

Certification Report

Certification Report Certification Report Security Intelligence Platform 4.0.5 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Prism Microsystems EventTracker Version 6.3 Build 93 Security Target

Prism Microsystems EventTracker Version 6.3 Build 93 Security Target Prism Microsystems EventTracker Version 6.3 Build 93 Security Target Version 1.6 June 22, 2010 Prism Microsystems, Inc. 8815 Centre Park Drive Columbia, MD 21045 DOCUMENT INTRODUCTION This document provides

More information

Certification Report

Certification Report Certification Report Symantec Security Information Manager 4.8.1 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

Certification Report

Certification Report Certification Report McAfee File and Removable Media Protection 4.3.1 and epolicy Orchestrator 5.1.2 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Host Intrusion Prevention 8 and epolicy Orchestrator 4.5 Report Number: CCEVS-VR-VID10377-2011

More information

Security Target. NetIQ Sentinel TM Version Document Version 1.4. November 6, Security Target: NetIQ Sentinel TM Version 7.0.

Security Target. NetIQ Sentinel TM Version Document Version 1.4. November 6, Security Target: NetIQ Sentinel TM Version 7.0. Security Target NetIQ Sentinel TM Version 7.0.1 Document Version 1.4 November 6, 2012 Document Version 1.4 NetIQ Corporation Page 1 of 41 Prepared For: Prepared By: NetIQ, Inc. 1233 West Loop South Suite

More information

NetIQ Sentinel Security Target. Abstract

NetIQ Sentinel Security Target. Abstract NetIQ Sentinel 7.2.1 Security Target Date: November 14 th, 2014 Version: 0.3 Prepared By: NetIQ Corporation Prepared For: NetIQ Corporation 515 Post Oak Blvd Suite 1200 Houston, Texas 77027 Abstract This

More information

McAfee Embedded Control

McAfee Embedded Control McAfee Embedded Control System integrity, change control, and policy compliance in one solution McAfee Embedded Control maintains the integrity of your system by only allowing authorized code to run and

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell EMC Elastic Cloud Storage v3.2 15 May 2018 383-4-439 V1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,

More information

EMC VNXe1600 OE v3.1.3

EMC VNXe1600 OE v3.1.3 EMC VNXe1600 OE v3.1.3 Evaluation Assurance Level (EAL): EAL2+ Doc No: 1950-000-D102 Version: 0.7 18 March 2016 EMC Corporation 176 South Street Hopkinton, MA, USA 01748 Prepared by: EWA-Canada 1223 Michael

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

NetIQ Sentinel 8.1 Security Target

NetIQ Sentinel 8.1 Security Target NetIQ Sentinel 8.1 Security Target Date: August 8, 2018 Version: 2.0 Prepared By: NetIQ Corporation Prepared For: NetIQ Corporation Suite 1200 515 Post Oak Blvd Houston, Texas 77027 Abstract This document

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT EMC VPLEX v5.5 Version 1.0 11 May 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of JUNOS-FIPS for SRX Series version 10.4R4 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Certification Report

Certification Report Certification Report EMC Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

Certification Report

Certification Report Certification Report Nutanix Virtual Computing Platform v3.5.1 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT EMC RecoverPoint v4.4 SP1 19 May 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security

More information

Cisco Network Admission Control Security Target. Table of Contents

Cisco Network Admission Control Security Target. Table of Contents This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), the Cisco Network Admission Control solutions. This Security Target (ST) defines a set of assumptions about

More information

McAfee Change Control and Application Control 7.0.0

McAfee Change Control and Application Control 7.0.0 McAfee Change Control and Application Control 7.0.0 with epolicy Orchestrator 5.3.2 Document Version: 0.7 July 2, 2016 Intel Corporation. 2821 Mission College Blvd. Santa Clara, CA 95054 Abstract This

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of McAfee Enterprise Mobility Management 9.7 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Security Target. McAfee Management for Optimized Virtual Environments (MOVE) Antivirus 3.0 with epolicy Orchestrator 5.1.1

Security Target. McAfee Management for Optimized Virtual Environments (MOVE) Antivirus 3.0 with epolicy Orchestrator 5.1.1 Security Target McAfee Management for Optimized Virtual Environments (MOVE) Antivirus 3.0 with epolicy Orchestrator 5.1.1 Document Version: 1.3 Date: November 7, 2014 Prepared For: McAfee, Inc. 2821 Mission

More information

Certification Report

Certification Report Certification Report Standard Edition v2.8.2 RELEASE Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security

More information

etrust Admin V8.0 Security Target V2.3 Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131

etrust Admin V8.0 Security Target V2.3 Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131 etrust Admin V8.0 Security Target V2.3 February 2, 2006 Prepared for: Computer Associates 6150 Oak Tree Blvd, Suite 100 Park Center Plaza II Independence, OH 44131 Suite 5200 7925 Jones Branch Drive McLean,

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Fortinet FortiMail V3.0 MR5 Secure Messaging Platform Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Xceedium Gatekeeper Version 3.6 Report Number: CCEVS-VR-06-0048 Dated: 31 October 2006 Version:

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of Juniper Networks M-Series Multiservice Edge Routers, MX-Series 3D Universal Edge Routers, T-Series Core Routers and EX-Series Ethernet Switches running JUNOS 11.4R2

More information

McAfee Virtual Network Security Platform 8.4 Revision A

McAfee Virtual Network Security Platform 8.4 Revision A 8.4.7.101-8.3.7.18 Manager-Virtual IPS Release Notes McAfee Virtual Network Security Platform 8.4 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions

More information

BMC Software, PATROL Perform/Predict, Version Security Target

BMC Software, PATROL Perform/Predict, Version Security Target , PATROL Perform/Predict, Version 6.5.30 Security Target Version 1.0 March 15, 2002 Prepared for:, Inc. 2101 City West Boulevard Houston, TX 77042 Prepared by: Computer Sciences Corporation 132 National

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of Firewall Enterprise v8.2.0 and Firewall Enterprise Control Center v5.2.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

Cisco Systems, Inc. ACE XML Gateway and Manager Version Security Target

Cisco Systems, Inc. ACE XML Gateway and Manager Version Security Target Cisco Systems, Inc. ACE ML Gateway and Manager Version 5.0.3 Security Target Version 1.0 07/25/08 Prepared for: Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134 Prepared By: Cisco Systems,

More information

Certification Report

Certification Report Certification Report McAfee Enterprise Security Manager with Event Receiver, Enterprise Log Manager, Advanced Correlation Engine, Application Data Monitor and Database Event Monitor 9.1 Issued by: Communications

More information

Security Target. Ivanti Shavlik U.S. Federal Protect Standard v9.2 Update 3. Evaluation Assurance Level (EAL): EAL 2+ Document Version: 1.

Security Target. Ivanti Shavlik U.S. Federal Protect Standard v9.2 Update 3. Evaluation Assurance Level (EAL): EAL 2+ Document Version: 1. Ivanti Shavlik U.S. Federal Protect Standard v9.2 Update 3 Security Target Evaluation Assurance Level (EAL): EAL 2+ Document Version: 1.0 Prepared for: Prepared by: Ivanti Corsec Security, Inc. 119 14th

More information

Certification Report

Certification Report Certification Report EAL 3+ Evaluation of Xerox WorkCentre 5632/5638/5645/5655/5665/5675/5687 Multifunction Systems Issued by: Communications Security Establishment Canada Certification Body Canadian Common

More information

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target

McAfee Web Gateway Version EAL 2 + ALC_FLR.2 Security Target McAfee Web Gateway Version 7.4.2.5 EAL 2 + ALC_FLR.2 Release Date: 19 November 2014 Version: 1.4 Prepared By: Primasec Ltd. Prepared For: McAfee Inc. 3965 Freedom Circle Santa Clara, CA 95054 Document

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.96-8.1.3.130 Manager-M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

CA Inc. Integrated Threat Management r Security Target V1.8

CA Inc. Integrated Threat Management r Security Target V1.8 CA Inc. Integrated Threat Management r8.0.445 Security Target V1.8 May 1, 2007 Prepared By: Suite 5200 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0960 SECTION TABLE OF CONTENTS

More information

Computer Associates. Security Target V2.0

Computer Associates. Security Target V2.0 Computer Associates etrust Single Sign-On V7.0 Security Target V2.0 October 20, 2005 Suite 5200 West 7925 Jones Branch Drive McLean, VA 22102-3321 703 848-0883 Fax 703 848-0985 SECTION TABLE OF CONTENTS

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.86-8.3.7.56 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Certification Report

Certification Report Certification Report Curtiss-Wright Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Verdasys Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

NWAS Java 7.02 Security Target

NWAS Java 7.02 Security Target NWAS Java 7.02 Security Target Version 1.16 2010-12-20 Table of Content: 2010-12-20... 1 1 ST Introduction... 4 1.1 ST and TOE Identification... 4 1.2 TOE Overview... 5 1.3 TOE Description... 5 1.3.1 Product

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.100-8.1.3.130 Manager-M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.68-8.3.7.55-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.49-9.1.3.6 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation

More information

LANDesk Management Suite 8, V Security Target

LANDesk Management Suite 8, V Security Target LANDesk Management Suite 8, V8.6.1 Security Target Version 1.0 October 24, 2006 Prepared for LANDesk Software, Ltd Prepared by: CygnaCom Suite 5200 7925 Jones Branch Drive McLean, VA 22102-3305 703 848-0883

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT Dell EMC Unity OE 4.2 383-4-421 22 September 2017 Version 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,

More information

Deep Discovery Inspector 3.2 Security Target (EAL2+)

Deep Discovery Inspector 3.2 Security Target (EAL2+) Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Deep Discovery Inspector 3.2 Security Target (EAL2+) Revision History Rev. # Description

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report TippingPoint Intrusion Protection System (IPS) E-Series (5000E, 2400E, 1200E, 600E, 210E),

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

COMMON CRITERIA CERTIFICATION REPORT

COMMON CRITERIA CERTIFICATION REPORT COMMON CRITERIA CERTIFICATION REPORT VMware Horizon 6 version 6.2.2 and Horizon Client 3.5.2 12 August 2016 v1.0 File Number 383-4-356 Government of Canada. This document is the property of the Government

More information

Intrusion Detection System Sensor Protection Profile

Intrusion Detection System Sensor Protection Profile Intrusion Detection System Sensor Protection Profile Prepared for National Security Agency 9800 Savage Road Fort Meade MD, 20755 Prepared by Science Applications International Corporation 7125 Gateway

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision A McAfee Network Security Platform 9.1 (9.1.7.73-9.1.3.11 Manager-M-series, Mxx30-series, and XC Cluster Release Notes) Contents About the release New features Enhancements Resolved Issues Installation

More information

McAfee Endpoint Security Threat Prevention Product Guide - Windows

McAfee Endpoint Security Threat Prevention Product Guide - Windows McAfee Endpoint Security 10.6.0 - Threat Prevention Product Guide - Windows COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Certification Report

Certification Report Certification Report EAL 2+ Evaluation of Netsight/Network Access Control v3.2.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 Revision B McAfee Network Security Platform 9.2 (9.2.7.9-9.2.7.10 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.3.124-2.11.9 Manager-XC-Cluster Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V December 2005

webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V December 2005 webmethods Fabric 6.5 EAL2 Common Criteria Evaluation Security Target V1.0 12 December 2005 Prepared for: webmethods, Inc. 3877 Fairfax Ridge Road, Fairfax, VA 22030 http://www.webmethods.com/ Unclassified

More information

CRUNCHY DATA SOLUTIONS, INC. CRUNCHY CERTIFIED POSTGRESQL 9.5 SECURITY TARGET VERSION 1.6

CRUNCHY DATA SOLUTIONS, INC. CRUNCHY CERTIFIED POSTGRESQL 9.5 SECURITY TARGET VERSION 1.6 CRUNCHY DATA SOLUTIONS, INC. CRUNCHY CERTIFIED POSTGRESQL 9.5 SECURITY TARGET VERSION 1.6 May 9, 2016 Prepared By: Table of Contents 1. SECURITY TARGET INTRODUCTION... 5 1.1. SECURITY TARGET REFERENCE...

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation

More information

RedCastle v3.0 for Asianux Server 3 Certification Report

RedCastle v3.0 for Asianux Server 3 Certification Report KECS-CR-08-21 RedCastle v3.0 for Asianux Server 3 Certification Report Certification No.: KECS-CISS-0104-2008 April 2008 IT Security Certification Center National Intelligence Service This document is

More information

Certification Report

Certification Report Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 OBJECTIVES OF THIS GUIDE... 1 1.2 ORGANIZATION OF THIS GUIDE... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 5 2 BASIC KNOWLEDGE

More information

EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite

EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite EMC Corporation EMC Smarts Service Assurance Management (SAM) Suite and Internet Protocol (IP) Management Suite 6.5.1 Security Target Evaluation Assurance Level: EAL2 Document Version: 0.6 Prepared for:

More information

ArcSight 3.0. Security Target

ArcSight 3.0. Security Target ArcSight 3.0 Security Target Version 1.0 29 September 2006 Prepared for: ArcSight 1309 South Mary Avenue Sunnyvale, CA 94087 Prepared By: Science Applications International Corporation Common Criteria

More information

Shavlik U.S. Federal Shavlik Protect Standard v9.1. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.6

Shavlik U.S. Federal Shavlik Protect Standard v9.1. Security Target. Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.6 Shavlik U.S. Federal Shavlik Protect Standard v9.1 Security Target Evaluation Assurance Level (EAL): EAL2+ Document Version: 0.6 Prepared for: Prepared by: Shavlik 119 14th Street NW, Suite 200 New Brighton,

More information

Certification Report

Certification Report Certification Report EMC NetWorker v8.0.1.4 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada,

More information