Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft Windows 10 Anniversary Update Home Edition, Pro Edition and Enterprise Edition (32 and 64 bits), and Microsoft Windows Server 2016 Standard Edition and Datacenter Edition
2016-36-INF-1779
Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2
CCEVS-VR-VID-10184-2008
name Microsoft Windows 10 Anniversary Update Home Edition, Pro Edition and Enterprise Edition (32 and 64 bits), and Microsoft Windows Server 2016 Standard Edition and Datacenter Edition Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2
scheme ES US
not_valid_after 02.02.2022 07.02.2010
not_valid_before 02.02.2017 07.02.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-36-INF-1779.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10184-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Windows%2010%20AU%20and%20Server%202016%20GP%20OS%20Security%20Target%20-%20Public.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10184-st.pdf
security_level {} EAL4+, ALC_FLR.3
dgst 0e830c7ebd954e22 cf3575b11c3e657d
heuristics/cert_id 2016-36-INF-1779 CCEVS-VR-VID-10184-2008
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x86:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*, cpe:2.3:o:microsoft:windows_2003_server:-:r2_sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:itanium:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x86:*
heuristics/related_cves {} CVE-2009-2510, CVE-2013-1269, CVE-2009-1920, CVE-2009-0235, CVE-2008-2250, CVE-2013-3894, CVE-2011-1878, CVE-2015-2364, CVE-2009-0089, CVE-2010-1897, CVE-2008-1441, CVE-2013-3129, CVE-2013-3879, CVE-2015-1680, CVE-2012-1528, CVE-2011-1227, CVE-2010-2731, CVE-2011-0661, CVE-2008-0015, CVE-2013-1278, CVE-2013-1295, CVE-2009-1124, CVE-2008-1454, CVE-2011-0034, CVE-2006-4692, CVE-2013-3866, CVE-2013-3863, CVE-2012-5364, CVE-2015-1643, CVE-2013-0810, CVE-2008-3464, CVE-2010-0018, CVE-2013-1343, CVE-2008-0322, CVE-2013-1285, CVE-2010-1098, CVE-2006-2374, CVE-2013-3174, CVE-2011-1970, CVE-2011-2018, CVE-2011-0087, CVE-2015-0008, CVE-2011-0674, CVE-2007-0040, CVE-2009-1511, CVE-2010-0252, CVE-2008-3012, CVE-2009-0085, CVE-2007-1531, CVE-2011-1880, CVE-2009-0232, CVE-2011-0090, CVE-2015-2374, CVE-2009-2509, CVE-2015-0010, CVE-2011-0667, CVE-2010-0719, CVE-2008-2252, CVE-2015-0088, CVE-2007-1206, CVE-2008-1083, CVE-2011-0672, CVE-2007-1204, CVE-2013-1276, CVE-2011-0040, CVE-2010-1734, CVE-2011-1236, CVE-2011-1875, CVE-2010-3963, CVE-2010-2739, CVE-2008-4114, CVE-2011-3400, CVE-2010-4562, CVE-2014-0315, CVE-2011-0677, CVE-2015-0005, CVE-2009-2507, CVE-2010-0235, CVE-2011-0673, CVE-2013-1291, CVE-2010-0818, CVE-2011-0666, CVE-2010-0022, CVE-2008-3014, CVE-2010-3943, CVE-2015-0009, CVE-2008-4036, CVE-2014-4113, CVE-2010-0484, CVE-2009-1928, CVE-2008-6819, CVE-2015-0093, CVE-2013-1294, CVE-2011-1237, CVE-2010-3940, CVE-2011-0675, CVE-2019-1489, CVE-2011-0670, CVE-2009-1133, CVE-2015-1702, CVE-2011-0030, CVE-2009-0231, CVE-2013-1283, CVE-2009-1922, CVE-2007-1912, CVE-2015-1727, CVE-2014-1767, CVE-2009-2500, CVE-2011-0665, CVE-2012-1870, CVE-2011-0676, CVE-2009-2515, CVE-2013-1342, CVE-2011-1894, CVE-2011-3402, CVE-2011-1238, CVE-2013-3175, CVE-2006-0005, CVE-2014-1819, CVE-2008-2249, CVE-2011-1232, CVE-2014-1818, CVE-2011-1869, CVE-2008-4250, CVE-2013-3167, CVE-2015-0060, CVE-2013-1272, CVE-2011-1243, CVE-2004-0840, CVE-2011-0033, CVE-2007-0069, CVE-2011-5046, CVE-2007-0038, CVE-2012-0159, CVE-2015-0081, CVE-2009-3020, CVE-2009-2503, CVE-2008-1087, CVE-2009-1926, CVE-2015-1723, CVE-2008-1086, CVE-2013-1264, CVE-2009-2514, CVE-2009-2494, CVE-2012-1852, CVE-2007-0066, CVE-2009-2504, CVE-2011-1879, CVE-2015-0004, CVE-2013-3869, CVE-2013-3899, CVE-2010-3941, CVE-2010-2742, CVE-2010-2744, CVE-2010-0238, CVE-2011-3415, CVE-2012-1868, CVE-2013-3200, CVE-2009-0079, CVE-2011-0041, CVE-2009-4210, CVE-2015-0061, CVE-2010-1883, CVE-2010-3957, CVE-2012-0009, CVE-2010-2265, CVE-2015-1716, CVE-2009-0550, CVE-2013-1340, CVE-2015-2363, CVE-2015-0092, CVE-2013-1286, CVE-2013-5056, CVE-2009-3677, CVE-2012-0004, CVE-2013-3661, CVE-2015-1722, CVE-2015-2416, CVE-2007-3463, CVE-2010-1886, CVE-2002-2324, CVE-2007-1765, CVE-2012-0173, CVE-2010-3974, CVE-2013-3918, CVE-2013-5065, CVE-2010-1735, CVE-2014-1807, CVE-2011-0654, CVE-2010-1885, CVE-2007-6753, CVE-2011-2003, CVE-2003-0907, CVE-2013-3173, CVE-2010-0231, CVE-2007-0843, CVE-2014-0317, CVE-2010-0028, CVE-2010-1255, CVE-2006-2373, CVE-2015-1677, CVE-2009-2516, CVE-2010-0485, CVE-2017-8487, CVE-2011-1239, CVE-2011-0671, CVE-2015-1768, CVE-2013-1263, CVE-2009-0083, CVE-2013-3876, CVE-2011-1886, CVE-2003-0904, CVE-2010-0487, CVE-2013-1279, CVE-2015-2365, CVE-2012-0005, CVE-2008-3648, CVE-2009-0243, CVE-2010-0035, CVE-2015-2370, CVE-2011-0039, CVE-2013-1262, CVE-2011-0045, CVE-2013-3172, CVE-2014-6324, CVE-2008-1456, CVE-2015-0096, CVE-2012-0149, CVE-2007-2224, CVE-2014-6317, CVE-2014-1817, CVE-2015-2371, CVE-2009-1123, CVE-2015-0095, CVE-2012-1890, CVE-2015-0094, CVE-2011-1233, CVE-2014-0300, CVE-2015-0011, CVE-2009-4311, CVE-2012-1527, CVE-2009-1808, CVE-2010-2550, CVE-2011-1235, CVE-2013-3864, CVE-2011-3414, CVE-2007-1537, CVE-2008-1457, CVE-2009-3126, CVE-2012-0006, CVE-2013-3128, CVE-2002-0862, CVE-2009-0081, CVE-2007-5145, CVE-2015-1676, CVE-2012-0154, CVE-2013-1259, CVE-2013-1252, CVE-2010-0025, CVE-2011-1264, CVE-2011-1284, CVE-2015-1645, CVE-2009-0082, CVE-2008-4038, CVE-2013-0077, CVE-2013-3181, CVE-2010-0021, CVE-2012-0157, CVE-2012-1866, CVE-2009-2513, CVE-2002-2132, CVE-2014-6355, CVE-2009-1930, CVE-2011-1240, CVE-2015-2417, CVE-2015-0015, CVE-2011-1283, CVE-2011-1870, CVE-2010-2743, CVE-2012-1865, CVE-2013-1257, CVE-2011-1876, CVE-2009-2493, CVE-2015-2360, CVE-2012-1867, CVE-2009-1925, CVE-2010-0237, CVE-2009-0234, CVE-2013-3136, CVE-2012-1893, CVE-2011-1974, CVE-2009-1923, CVE-2010-0812, CVE-2011-1242, CVE-2009-1546, CVE-2011-0662, CVE-2010-0486, CVE-2010-0232, CVE-2012-1848, CVE-2010-2563, CVE-2011-0042, CVE-2004-0119, CVE-2008-4609, CVE-2011-1881, CVE-2012-2553, CVE-2007-5133, CVE-2012-0003, CVE-2011-1226, CVE-2011-2005, CVE-2007-2218, CVE-2010-4701, CVE-2012-0181, CVE-2007-1211, CVE-2013-1273, CVE-2013-1287, CVE-2015-1721, CVE-2015-0091, CVE-2008-2245, CVE-2013-1249, CVE-2013-1277, CVE-2015-2369, CVE-2009-2653, CVE-2015-0003, CVE-2009-0086, CVE-2012-0151, CVE-2009-2508, CVE-2010-2567, CVE-2011-1991, CVE-2013-1341, CVE-2010-0819, CVE-2012-0001, CVE-2008-1436, CVE-2009-4313, CVE-2010-1896, CVE-2010-2568, CVE-2011-1868, CVE-2013-1261, CVE-2007-3034, CVE-2011-0086, CVE-2012-0002, CVE-2012-2529, CVE-2011-2014, CVE-2011-0088, CVE-2009-1545, CVE-2011-3408, CVE-2010-3144, CVE-2013-1248, CVE-2012-1864, CVE-2009-1127, CVE-2009-0094, CVE-2009-2511, CVE-2014-4118, CVE-2015-0075, CVE-2009-1126, CVE-2010-3942, CVE-2011-0028, CVE-2009-0078, CVE-2008-4834, CVE-2014-4076, CVE-2009-0093, CVE-2008-1453, CVE-2011-2011, CVE-2011-3397, CVE-2008-2251, CVE-2007-1212, CVE-2010-1888, CVE-2011-1874, CVE-2013-1271, CVE-2007-2219, CVE-2014-0266, CVE-2013-1274, CVE-2011-1225, CVE-2010-0234, CVE-2011-1249, CVE-2013-3878, CVE-2015-1720, CVE-2015-1719, CVE-2010-4398, CVE-2008-5044, CVE-2003-1048, CVE-2013-3660, CVE-2010-1689, CVE-2017-0176, CVE-2015-0089, CVE-2015-0073, CVE-2011-3416, CVE-2009-2502, CVE-2009-0119, CVE-2006-6723, CVE-2007-5352, CVE-2010-0476, CVE-2010-0023, CVE-2000-1218, CVE-2012-2530, CVE-2008-3465, CVE-2012-1853, CVE-2011-0658, CVE-2010-0480, CVE-2007-3036, CVE-2013-3865, CVE-2010-1895, CVE-2013-3940, CVE-2010-3959, CVE-2013-1251, CVE-2007-3898, CVE-2015-0087, CVE-2015-1724, CVE-2010-0269, CVE-2013-1275, CVE-2015-0074, CVE-2013-1345, CVE-2011-0089, CVE-2009-1139, CVE-2010-0233, CVE-2010-0016, CVE-2014-1814, CVE-2009-0320, CVE-2011-0660, CVE-2014-6321, CVE-2015-0077, CVE-2008-1445, CVE-2009-2519, CVE-2011-1241, CVE-2010-3939, CVE-2013-1253, CVE-2010-2553, CVE-2009-0230, CVE-2015-0014, CVE-2007-1215, CVE-2010-0236, CVE-2015-0080, CVE-2013-3198, CVE-2010-2746, CVE-2012-2556, CVE-2010-2729, CVE-2010-1891, CVE-2011-1985, CVE-2011-1884, CVE-2009-1125, CVE-2013-1250, CVE-2010-2740, CVE-2010-2741, CVE-2007-2237, CVE-2008-4835, CVE-2008-0088, CVE-2011-3401, CVE-2011-1282, CVE-2013-1334, CVE-2015-0090, CVE-2009-1544, CVE-2014-4064, CVE-2010-1882, CVE-2010-1690, CVE-2010-0811, CVE-2014-4077, CVE-2015-2367, CVE-2012-2527, CVE-2002-0391, CVE-2013-1256, CVE-2010-2738, CVE-2015-0006, CVE-2011-1281, CVE-2011-1268, CVE-2012-0148, CVE-2008-1451, CVE-2015-0057, CVE-2008-1440, CVE-2008-1084, CVE-2009-1929, CVE-2013-1270, CVE-2015-1726, CVE-2013-3196, CVE-2013-1254, CVE-2009-1924, CVE-2010-3222, CVE-2011-1882, CVE-2011-0043, CVE-2010-3956, CVE-2012-5362, CVE-2015-1678, CVE-2011-1984, CVE-2011-1967, CVE-2011-1231, CVE-2010-3227, CVE-2007-2228, CVE-2008-4327, CVE-2007-0214, CVE-2010-4669, CVE-2008-0020, CVE-2010-0020, CVE-2010-2566, CVE-2013-1344, CVE-2009-2528, CVE-2010-3140, CVE-2008-0083, CVE-2011-1873, CVE-2011-1968, CVE-2007-1205, CVE-2013-5058, CVE-2006-5758, CVE-2013-1255, CVE-2003-0813, CVE-2011-0096, CVE-2013-1260, CVE-2010-3970, CVE-2013-1268, CVE-2011-1248, CVE-2009-2517, CVE-2012-1850, CVE-2011-1234, CVE-2014-6332, CVE-2011-1230, CVE-2007-6026, CVE-2015-1644, CVE-2005-1987, CVE-2010-1887, CVE-2009-4312, CVE-2009-3675, CVE-2008-3013, CVE-2011-1885, CVE-2012-0180, CVE-2011-1883, CVE-2009-0233, CVE-2014-0318, CVE-2012-4774, CVE-2012-0013, CVE-2015-1679, CVE-2013-1265, CVE-2015-1701, CVE-2013-1267, CVE-2013-1258, CVE-2009-0087, CVE-2014-4115, CVE-2011-3406, CVE-2015-1725, CVE-2012-1851, CVE-2006-7210, CVE-2012-0217, CVE-2013-1300, CVE-2009-2501, CVE-2013-3197, CVE-2009-2524, CVE-2014-4148, CVE-2011-0657, CVE-2012-2526, CVE-2009-0568, CVE-2010-0820, CVE-2006-5586, CVE-2010-0024, CVE-2017-8461, CVE-2013-1266, CVE-2010-0027, CVE-2012-4786, CVE-2010-1894, CVE-2012-0175, CVE-2015-2387, CVE-2009-0229, CVE-2015-1637, CVE-2013-3195, CVE-2011-1229, CVE-2011-3417, CVE-2011-1247, CVE-2010-0250, CVE-2013-1313, CVE-2013-3887, CVE-2014-0323, CVE-2013-1280, CVE-2008-0087, CVE-2014-0301, CVE-2011-2600, CVE-2014-4971, CVE-2011-1228, CVE-2007-5348
heuristics/extracted_sars AGD_PRE.1, ASE_CCL.1, ALC_CMS.1, ASE_INT.1, ASE_TSS.1, ADV_FSP.1, ALC_TSU_EXT.1, ATE_FUN.1, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ATE_COV.1, ASE_REQ.1, ASE_OBJ.1, ASE_ECD.1, ASE_SPD.1, ALC_CMC.1 ADV_LLD.1, ALC_TAT.1, ATE_FUN.1, ALC_DVS.1, ADV_IMP.1, ADV_SPM.1, AVA_SOF.1, AGD_ADM.1, ADV_HLD.2, ADV_FSP.2, AGD_USR.1, AVA_MSU.2, AVA_VLA.2, ATE_COV.2, ALC_FLR.3, ADV_RCR.1, ATE_DPT.1, ALC_LCD.1, ATE_IND.2
heuristics/extracted_versions 32, 10, 64, 2016 2003
heuristics/scheme_data
  • category: Operating System
  • certification_date: 07.02.2008
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID10184
  • product: Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2 (for specific TOE software updates, patches, and hotfixes see Section 1 of Security Target)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10184
  • vendor: Microsoft Corporation
heuristics/st_references/directly_referenced_by CCEVS-VR-VID-10716-2016 {}
heuristics/st_references/indirectly_referenced_by CCEVS-VR-VID-10716-2016 {}
protection_profiles
pdf_data/report_filename 2016-36-INF-1779.pdf st_vid10184-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10184-2008
    • cert_item: Microsoft Windows Server 2003, Microsoft Windows XP Professional, and Microsoft Windows XP embedded
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • ES:
    • 2016-36-INF-1779 v1: 1
  • US:
    • CCEVS-VR-VID10184-2008: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ALC:
    • ALC_FLR.3: 3
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM_EXT.3: 1
    • FCS_COP.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_RBG_EXT.1: 1
    • FCS_STO_EXT.1: 1
    • FCS_TLSC_EXT.1: 1
    • FCS_TLSC_EXT.2: 1
    • FCS_TLSC_EXT.3: 1
    • FCS_TLSC_EXT.4: 1
  • FDP:
    • FDP_ACF_EXT.1: 1
    • FDP_IFC_EXT.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_UAU.5: 1
  • FMT:
    • FMT_MOF_EXT.1: 1
  • FPT:
    • FPT_ACF_EXT.1: 1
    • FPT_ASLR_EXT.1: 1
    • FPT_SBOP_EXT.1: 1
    • FPT_SRP_EXT.1: 1
    • FPT_TST_EXT.1: 1
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.2: 1
  • FTA:
    • FTA_TAB.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 2
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACC: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 41
  • Microsoft:
    • Microsoft: 68
    • Microsoft Corporation: 2
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 1
  • TLS:
    • DTLS:
      • DTLS: 3
    • TLS:
      • TLS: 6
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 2
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 2
  • X509:
    • X.509: 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: .
  • /CreationDate: D:20170206173544+01'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20170206173544+01'00'
  • /Producer: Microsoft® Word 2013
  • /Title: REF:
  • pdf_file_size_bytes: 381868
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: Santosh Chokhani
  • /Company: Orion
  • /CreationDate: D:20080222120444-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20080222120502-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080222170424
  • /Title: Validation Report
  • pdf_file_size_bytes: 222190
  • pdf_hyperlinks: http://www.cve.mitre.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename Windows 10 AU and Server 2016 GP OS Security Target - Public.pdf st_vid10184-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 4: 14
    • EAL 4 augmented: 5
    • EAL3: 2
    • EAL4: 21
    • EAL4 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ACM:
    • ACM_AUT.1: 14
    • ACM_CAP.4: 24
    • ACM_SCP.2: 11
  • ADO:
    • ADO_DEL.2: 11
    • ADO_IGS.1: 10
  • ADV:
    • ADV_FSP.2: 14
    • ADV_HLD.2: 16
    • ADV_IMP.1: 11
    • ADV_LLD.1: 18
    • ADV_RCR.1: 8
    • ADV_SPM.1: 13
  • AGD:
    • AGD_ADM.1: 15
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 11
    • ALC_FLR.3: 25
    • ALC_LCD.1: 12
    • ALC_TAT.1: 13
  • ATE:
    • ATE_COV.2: 11
    • ATE_DPT.1: 9
    • ATE_FUN.1: 14
    • ATE_IND.2: 12
  • AVA:
    • AVA_MSU.2: 18
    • AVA_SOF.1: 11
    • AVA_VLA.2: 16
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 8
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 3
    • FCS_CKM.4: 1
    • FCS_CKM_EXT: 1
    • FCS_CKM_EXT.3: 7
    • FCS_CKM_EXT.3.1: 1
    • FCS_COP.1: 43
    • FCS_COP.1.1: 5
    • FCS_DTLS_EXT: 1
    • FCS_DTLS_EXT.1: 7
    • FCS_DTLS_EXT.1.1: 2
    • FCS_DTLS_EXT.1.2: 2
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 10
    • FCS_TLSC_EXT.1.1: 2
    • FCS_TLSC_EXT.1.2: 2
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.2: 6
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.3: 7
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 6
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLS_EXT: 1
    • FCS_TLS_EXT.1: 1
    • FCS_TLS_EXT.2: 1
    • FCS_TLS_EXT.3: 1
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 6
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT: 1
    • FDP_IFC_EXT.1: 6
    • FDP_IFC_EXT.1.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 1
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 6
    • FMT_MOF_EXT.1.1: 1
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 6
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 6
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 6
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT: 1
    • FPT_SRP_EXT.1: 6
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 6
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 7
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 6
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 6
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 16
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP: 1
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 14
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 13
    • FAU_SAR.3.1: 2
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 14
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXP.1: 1
    • FCS_CKM_EXP.2.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 31
    • FCS_COP.1.1: 16
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.2: 37
    • FDP_ACC.2.1: 4
    • FDP_ACC.2.2: 4
    • FDP_ACF.1: 45
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 4
    • FDP_ACF.2: 2
    • FDP_IFC.1: 41
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 29
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 3
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITT.1: 9
    • FDP_ITT.1.1: 1
    • FDP_RIP.2: 11
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 18
    • FIA_USB.1: 4
  • FMT:
    • FMT_MOF.1: 46
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 73
    • FMT_MSA.1.1: 8
    • FMT_MSA.2: 9
    • FMT_MSA.3: 64
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 141
    • FMT_MTD.1.1: 17
    • FMT_MTD.1.2: 1
    • FMT_MTD.2: 11
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV: 1
    • FMT_REV.1: 19
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 11
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.3: 8
    • FMT_SMR.3.1: 1
  • FPT:
    • FPT_AMT.1: 7
    • FPT_ITT.1: 6
    • FPT_ITT.3: 3
    • FPT_RPL: 1
    • FPT_RPL.1: 3
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
    • FPT_SUS: 3
    • FPT_TRC.1: 4
  • FRU:
    • FRU_RSA.1: 9
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_LSA.1: 1
    • FTA_MCS.1: 2
    • FTA_MSC.1: 1
    • FTA_SSL.1: 8
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 12
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
    • FTA_TRP.1: 1
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
  • A:
    • A.CONNECT: 3
    • A.COOP: 5
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 3
    • A.PEER: 3
    • A.PROTECT: 2
  • O:
    • O.ASSURANCE: 4
    • O.AUDITING: 8
    • O.AUDIT_: 1
    • O.AUDIT_PROTECTION: 4
    • O.AUTHORIZATION: 8
    • O.CREDEN: 4
    • O.DISCRETIONARY_ACCESS: 3
    • O.ENCRYPTED_DATA: 11
    • O.ENFORCEMENT: 9
    • O.FRAMEWORK: 5
    • O.INSTALL: 4
    • O.IPSEC: 13
    • O.LEGAL_WARNING: 4
    • O.LIMIT_AUTHORIZATION: 9
    • O.MANAGE: 7
    • O.MEDIATE: 9
    • O.OUTDATED_SW: 2
    • O.PARTIAL_RECOVERY: 8
    • O.PHYSICAL: 5
    • O.PROTECT: 9
    • O.RESIDUAL_INFORMATION: 8
    • O.SOFTWARE_PROTECT: 4
    • O.TRUSTED_PATH: 8
    • O.UPDATED_SW: 1
  • T:
    • T.ADDRESS_MASQUERADE: 4
    • T.ADMIN_ERROR: 4
    • T.AUDIT_COMPROMISE: 5
    • T.AUDIT_CORRUPT: 4
    • T.CONFIG_CORRUPT: 3
    • T.EAVESDROP: 4
    • T.LOST_DATA: 3
    • T.MALICIOUS_CODE_EXEC: 4
    • T.MASQUERADE: 3
    • T.OBJECTS_NOT_CLEAN: 4
    • T.OLD_SW: 3
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATION: 4
    • T.REPLAY: 4
    • T.SPOOF: 4
    • T.SYSACC: 4
    • T.TCPIP_ATTACK: 3
    • T.UNATTENDED_SESSION: 5
    • T.UNAUTH_ACCESS: 7
    • T.UNAUTH_MODIFICATION: 4
    • T.UNDETECTED_ACTIONS: 4
    • T.UNIDENTIFIED_ACTIONS: 8
    • T.USER_CORRUPT: 7
    • T.USER_CURRUPT: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 153
    • Microsoft Corporation: 5
  • Broadcom:
    • Broadcom: 1
  • Infineon:
    • Infineon: 1
  • Microsoft:
    • Microsoft: 51
    • Microsoft Corporation: 186
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
      • AES-128: 1
      • AES-256: 4
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • HMAC: 13
  • AES_competition:
    • AES:
      • AES: 5
    • RC:
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 12
    • DES:
      • DES: 18
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 4
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • DH: 2
      • DHE: 1
      • Diffie-Hellman: 4
    • DSA:
      • DSA: 9
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 17
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-2: 1
      • SHA-256: 12
      • SHA-384: 4
      • SHA-512: 4
      • SHA256: 4
      • SHA384: 3
      • SHA512: 3
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 21
      • SHA1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • KEX:
    • Key Exchange: 6
  • MAC:
    • MAC: 19
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 7
    • IKEv1: 1
    • IKEv2: 1
  • IPsec:
    • IPsec: 21
  • PGP:
    • PGP: 1
  • TLS:
    • DTLS:
      • DTLS: 22
      • DTLS 1.0: 2
      • DTLS 1.2: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 90
      • TLS 1.0: 2
      • TLS 1.1: 2
      • TLS 1.2: 4
  • VPN:
    • VPN: 21
  • IKE:
    • IKE: 11
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 5
  • VPN:
    • VPN: 3
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 8
    • PRNG: 2
  • RNG:
    • RBG: 7
    • RNG: 7
  • RNG:
    • RNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CCM:
    • CCM: 1
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 5
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 2
    • P-256: 14
    • P-384: 14
    • P-521: 14
    • secp256r1: 2
    • secp384r1: 2
    • secp512r1: 1
    • secp521r1: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_NULL_WITH_NULL_NULL: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 3
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 1
    • FIPS 186-4: 13
    • FIPS 197: 2
    • FIPS 198-1: 1
    • FIPS 198-2: 1
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 2900-2: 1
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-38F: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-56B: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90: 1
    • NIST SP 800-90A: 1
    • NIST SP 800-90B: 1
    • SP 800-56A: 1
    • SP 800-90: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2246: 2
    • RFC 2396: 1
    • RFC 2560: 1
    • RFC 2818: 1
    • RFC 3268: 1
    • RFC 3546: 2
    • RFC 4347: 1
    • RFC 4366: 1
    • RFC 4492: 5
    • RFC 4681: 1
    • RFC 5246: 8
    • RFC 5280: 4
    • RFC 5289: 8
    • RFC 5759: 1
    • RFC 6066: 1
    • RFC 6125: 1
    • RFC 6347: 2
  • X509:
    • X.509: 15
  • FIPS:
    • FIPS 140: 5
    • FIPS 140-1: 6
    • FIPS 140-2: 5
    • FIPS 140-214: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 2
    • FIPS 197: 2
    • FIPS 46-3: 3
  • PKCS:
    • PKCS#1: 2
    • PKCS#5: 7
  • RFC:
    • RFC 2617: 1
    • RFC 3739: 1
  • X509:
    • X.509: 3
    • x.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: SAIC
  • /Company: SAIC
  • /CreationDate: D:20080222121234-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20080222121818-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080222171054
  • /Title: Windows 2003/XP Security Target
  • pdf_file_size_bytes: 1878359
  • pdf_hyperlinks: http://creativecommons.org/licenses/by-nd-nc/1.0/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 183
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different