Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Motorola RFS7000 RF Switch
SERTIT-010
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
BSI-DSZ-CC-0284-2005
name Motorola RFS7000 RF Switch Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
category Access Control Devices and Systems Operating Systems
scheme NO DE
not_valid_before 09.07.2009 09.11.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20090709_SERTIT-010_CR_v1_0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MOTOROLA_ST-v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf
manufacturer Motorola, Inc. Microsoft Corporation
manufacturer_web https://www.motorola.com/ https://www.microsoft.com
security_level EAL4+, ALC_FLR.2 EAL4+, ALC_FLR.3
dgst 360053f8c7550b7e bbe326d5bfbd5036
heuristics/cert_id SERTIT-010 BSI-DSZ-CC-0284-2005
heuristics/cert_lab [] BSI
heuristics/extracted_sars AVA_MSU.2, ATE_FUN.1, ADV_RCR.1, ADV_LLD.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ADV_IMP.1, ALC_LCD.1, ALC_FLR.2, ADV_HLD.2, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ADV_SPM.1 AVA_MSU.2, ALC_FLR.3, ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ADV_LLD.1, ASE_ENV.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, ADV_IMP.1, ALC_LCD.1, ADV_HLD.2, ATE_COV.2, ASE_PPC.1, ASE_DES.1, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, ADV_IGS.1, AGD_ADM.1, ADV_FUN.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_SPM.1
heuristics/extracted_versions - 6.5.7226.0
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 09.07.2009
  • developer: Motorola, Inc.
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-010
    • certification_date: 09.07.2009
    • description: SERTIT-010 C
    • developer: Motorola, Inc.
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135534-1610011059/SERTIT/Sertifikater/2009/10/MOTOROLA_ST-v1.5.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134620-1607949745/SERTIT/Sertifikater/2009/10/20090709_SERTIT-010_CR_v1_0.pdf'})]})
    • evaluation_facility: Aspect Labs
    • level: EAL 4, ALC_FLR.2
    • mutual_recognition: CCRA, SOG-IS
    • product: HW: RFS7000; SW: RFS7000-1.0.0.0-022GR
    • protection_profile: US Government Wireless Local Area Network (WLAN) Access System Protection Profile for Basic Robustness Environments, Version 1.0, April 2006
    • sponsor: Motorola, Inc.
  • product: Motorola RFS7000 RF Switch
  • url: https://sertit.no/certified-products/product-archive/motorola-rfs7000-rf-switch
heuristics/protection_profiles a91e9c889e6f3e47 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_as_br_v1.0.pdf {}
pdf_data/report_filename 20090709_SERTIT-010_CR_v1_0.pdf 0284a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0284-2005
    • cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-010: 21
  • DE:
    • BSI-DSZ-CC-0284-2005: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 27
    • EAL 4 augmented: 23
    • EAL1: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 24
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 2
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SEL.1: 1
  • FCS:
    • FCS_BCM_EXP.1: 1
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_CKM_EXP.2: 1
    • FCS_COP_EXP.1: 1
    • FCS_COP_EXP.2: 1
  • FDP:
    • FDP_PUD_EXP.1: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU_EXP.5: 1
    • FIA_UID.2: 1
    • FIA_USB.1: 2
  • FMT:
    • FMT_MOF.1: 3
    • FMT_MSA.2: 1
    • FMT_MTD.1: 2
    • FMT_SMF.1: 3
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM_EXP.1: 1
    • FPT_TST_EXP.1: 1
    • FPT_TST_EXP.2: 1
  • FTA:
    • FTA_SSL.3: 1
    • FTA_TAB.1: 1
  • FTP:
    • FTP_ITC_EXP.1: 1
    • FTP_TRP.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS_CONTROL: 2
    • A.COM_PROT: 2
    • A.CORRECT_HW: 2
    • A.INSTALL: 2
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 2
    • A.PHYS_PROTECT: 2
  • T:
    • T.AUTH_DAC: 1
    • T.DL_MISUSE: 1
    • T.OVERFLOW: 1
    • T.SPAM: 1
    • T.UNAUTHUSE: 1
    • T.UNAUTH_DAC: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 6
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS 140-2: 6
  • BSI:
    • AIS 32: 1
    • AIS 33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
    • out of scope: 4
pdf_data/report_metadata
  • /Author: ragea
  • /CR issue: 1.0
  • /CRNumber: 010
  • /Company: SERTIT
  • /CreationDate: D:20090709131957+02'00'
  • /Creator: Acrobat PDFMaker 8.1 for Word
  • /Day Month Year: 9 July 2009
  • /Developers name: Motorola, Inc.
  • /EAL: EAL 4 augmented with ALC_FLR.2
  • /ETR date final: 28 May 2009
  • /Keywords: ugradert
  • /ModDate: D:20090709132004+02'00'
  • /Name of EVIT: Aspect Labs, a division of BKP Security, Inc.
  • /PP name: US Government Wireless Local Network Access System Protection Profile for Basic Robustness Environments
  • /Prod name and version platform: Motorola RFS7000 RF Switch
  • /Producer: Adobe PDF Library 8.0
  • /Product name: Motorola RFS7000 RF Switch
  • /Product version: HW: RFS7000 SW: RFS7000-1.0.0.0-022GR
  • /Sponsor name: Motorola, Inc.
  • /Title: tittel
  • pdf_file_size_bytes: 475259
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: Federal Office for Information Security (BSI)
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20051220074356+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /ModDate: D:20051220075600+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051220064348
  • /Subject: BSI-DSZ-CC-0284-2005
  • /Title: Certification Report
  • pdf_file_size_bytes: 399534
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
pdf_data/st_filename MOTOROLA_ST-v1.5.pdf 0284b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 2
  • EAL:
    • EAL4: 10
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.1: 1
    • ACM_CAP.2: 1
    • ACM_CAP.4: 2
    • ACM_SCP.1: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_DEL.2: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_HLD.1: 1
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 6
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 6
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 2
    • ALC_FLR.2: 8
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 4
  • AVA:
    • AVA_MSU.1: 2
    • AVA_MSU.2: 2
    • AVA_SOF.1: 5
    • AVA_VLA.1: 3
    • AVA_VLA.2: 2
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 9
    • ADV_FSP.2: 2
    • ADV_FUN.1: 1
    • ADV_HLD.1: 2
    • ADV_HLD.2: 3
    • ADV_IGS.1: 1
    • ADV_IMP.1: 3
    • ADV_LLD.1: 4
    • ADV_RCR.1: 5
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
    • ALC_FLR.3: 9
    • ALC_LCD.1: 2
    • ALC_TAT.1: 3
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 23
    • FAU_GEN.1.1: 4
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 10
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_BCM_EXP.1: 11
    • FCS_BCM_EXP.1.1: 1
    • FCS_BCM_EXP.1.2: 1
    • FCS_BCM_EXP.1.3: 1
    • FCS_CKM: 1
    • FCS_CKM.1: 16
    • FCS_CKM.2: 5
    • FCS_CKM.4: 15
    • FCS_CKM_EXP.2: 16
    • FCS_CKM_EXP.2.1: 1
    • FCS_COP: 2
    • FCS_COP.1: 3
    • FCS_COP_EXP.1: 16
    • FCS_COP_EXP.1.1: 1
    • FCS_COP_EXP.2: 23
    • FCS_COP_EXP.2.1: 2
  • FDP:
    • FDP_ACC.1: 1
    • FDP_AFC: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 1
    • FDP_PUD: 1
    • FDP_PUD_EXP: 2
    • FDP_PUD_EXP.1: 8
    • FDP_PUD_EXP.1.1: 1
    • FDP_PUP_EXP.1: 1
    • FDP_RIP.1: 15
    • FDP_RIP.1.1: 2
  • FIA:
    • FIA_AFL.1: 15
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 2
    • FIA_UAU: 4
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU_EXP.5: 14
    • FIA_UAU_EXP.5.1: 2
    • FIA_UAU_EXP.5.2: 2
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 14
    • FIA_USB.1.1: 2
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 2
  • FMT:
    • FMT_MOF.1: 29
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 15
    • FMT_MSA.2.1: 1
    • FMT_MTD.1: 33
    • FMT_MTD.1.1: 5
    • FMT_SMF.1: 34
    • FMT_SMF.1.1: 5
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 2
    • FPT_SEP.1: 12
    • FPT_SEP.1.1: 2
    • FPT_SEP.1.2: 2
    • FPT_STM: 1
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_STM_EXP.1: 8
    • FPT_STM_EXP.1.1: 1
    • FPT_TST.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST_EXP.1: 9
    • FPT_TST_EXP.1.1: 1
    • FPT_TST_EXP.1.2: 1
    • FPT_TST_EXP.1.3: 1
    • FPT_TST_EXP.2: 8
    • FPT_TST_EXP.2.1: 1
    • FPT_TST_EXP.2.2: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 3
    • FTP_ITC_EXP.1: 17
    • FTP_ITC_EXP.1.1: 3
    • FTP_ITC_EXP.1.2: 2
    • FTP_ITC_EXP.1.3: 2
    • FTP_TRP.1: 8
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC.1: 42
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 40
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 25
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 20
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_ACC.1: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FRU:
    • FRU_RSA.1: 18
    • FRU_RSA.1.1: 2
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATION: 1
    • A.NO_EVIL: 1
    • A.NO_GENERAL_P: 1
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TOE_NO_BYPASS: 1
  • O:
    • O.ACCESS: 1
    • O.ADMIN_GUIDANCE: 6
    • O.AUDIT_GENERATION: 4
    • O.CONFIGURATION_: 4
    • O.CONFIGURATION_IDENTIF: 2
    • O.CORRECT_: 3
    • O.CORRECT_TSF_OPERATION: 1
    • O.CRYPTOGRAPHY: 8
    • O.CRYPTOGRAPHY_VAL: 1
    • O.CRYPTOGRAPHY_VALID: 2
    • O.CRYPTOGRAPHY_VALIDA: 2
    • O.CRYPTOGRAPHY_VALIDATED: 1
    • O.DISPLAY_BANNER: 4
    • O.DOCUMENTED_: 2
    • O.DOCUMENTED_DESIG: 1
    • O.DOCUMENTED_DESIGN: 3
    • O.MANAGE: 10
    • O.MEDIATE: 6
    • O.PARTIAL_: 1
    • O.PARTIAL_FUNCTIONA: 1
    • O.PARTIAL_FUNCTIONAL_: 2
    • O.PARTIAL_FUNCTIONAL_T: 2
    • O.RESIDUAL_: 5
    • O.RESIDUAL_INFORMATIO: 1
    • O.RESIDUAL_INFORMATION: 4
    • O.SELF_PROTECTION: 6
    • O.TIME_STAMPS: 4
    • O.TOE_ACCESS: 10
    • O.VULNERABILITY_: 5
    • O.VULNERABILITY_ANALYSI: 3
    • O.VULNERABILITY_ANALYSIS: 1
  • OE:
    • OE.ADMIN: 1
    • OE.AUDIT_PROTECTION: 4
    • OE.AUDIT_REVIEW: 4
    • OE.MANAGE: 8
    • OE.NO_EVIL: 7
    • OE.NO_GENERAL_PURP: 1
    • OE.NO_GENERAL_PURPO: 1
    • OE.NO_GENERAL_PURPOS: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.PHYSICAL: 3
    • OE.PROTECT_MGMT_CO: 1
    • OE.PROTECT_MGMT_COM: 1
    • OE.PROTECT_MGMT_COMM: 1
    • OE.PROTECT_MGMT_COMMS: 1
    • OE.RESIDUAL_INFORMA: 1
    • OE.RESIDUAL_INFORMATI: 3
    • OE.RESIDUAL_INFORMATIO: 2
    • OE.RESIDUAL_INFORMATION: 1
    • OE.SELF_PROTECTION: 6
    • OE.TIME_STAMPS: 4
    • OE.TOE_ACCESS: 8
    • OE.TOE_NO_BYPASS: 7
  • T:
    • T.ACCIDENTAL_: 1
    • T.ACCIDENTAL_ADMIN_: 2
    • T.ACCIDENTAL_CRYPTO_COM: 1
    • T.MASQUERADE: 2
    • T.POOR_DESIGN: 2
    • T.POOR_IMPLEMENTATION: 2
    • T.POOR_TEST: 2
    • T.RESIDUAL_DATA: 2
    • T.SIGNAL_DETECT: 1
    • T.TSF_COMPROMISE: 2
    • T.UNATTENDED_: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNAUTHORIZED_: 1
    • T.UNAUTH_ADMIN_ACCESS: 2
  • A:
    • A.ACCESS_CONTROL: 3
    • A.COM_PROT: 3
    • A.CORRECT_HW: 3
    • A.INSTALL: 4
    • A.MANAGE: 4
    • A.NO_EVIL_ADM: 2
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 4
  • O:
    • O.CONBLK: 13
    • O.DAC: 16
    • O.FILTER_EMAIL: 10
    • O.QUOTA: 12
    • O.RESTDIST: 11
  • OE:
    • OE.COM_PROT: 5
    • OE.DAC: 12
    • OE.INSTALL: 3
    • OE.PHYSICAL: 3
    • OE.PLATFORM_: 1
    • OE.PLATFORM_SUPPORT: 4
  • T:
    • T.AUTH_DAC: 4
    • T.DL_MISUSE: 4
    • T.OVERFLOW: 4
    • T.SPAM: 9
    • T.UNAUTHUSE: 3
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 2
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜViT: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 1
  • AES_competition:
    • RC:
      • RC4: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • SSH:
    • SSH: 6
  • TLS:
    • TLS:
      • TLS: 1
  • TLS:
    • SSL:
      • SSL: 4
      • SSL 3.0: 1
    • TLS:
      • TLS: 4
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CCM:
    • CCM: 2
pdf_data/st_keywords/side_channel_analysis
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-1: 1
    • FIPS 140-2: 13
    • FIPS PUB 140-2: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC1725: 1
    • RFC1730: 1
    • RFC821: 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • out of scope: 2
    • the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
pdf_data/st_metadata
  • /Author: User
  • /CreationDate: D:20090520174815
  • /Creator: Pdf995
  • /Keywords:
  • /ModDate: D:20090520174815
  • /Producer: GPL Ghostscript 8.15
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 546993
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /Author: slabihou
  • /CreationDate: D:20050713145508+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
  • /Title: MS_EX_ST_1.9.doc
  • pdf_file_size_bytes: 285736
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different