Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PR/SM for IBM z14 and IBM LinuxONE Systems Driver Level D32L with Bundle Level S29
BSI-DSZ-CC-1048-2018
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
BSI-DSZ-CC-0284-2005
name PR/SM for IBM z14 and IBM LinuxONE Systems Driver Level D32L with Bundle Level S29 Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
not_valid_after 03.09.2023 01.09.2019
not_valid_before 03.09.2018 09.11.2005
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1048c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1048a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1048b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf
manufacturer IBM Corporation Microsoft Corporation
manufacturer_web https://www.ibm.com https://www.microsoft.com
security_level ALC_TAT.3, ALC_FLR.3, EAL5+, ATE_FUN.2, AVA_VAN.5 ALC_FLR.3, EAL4+
dgst 6891375d71da1f18 bbe326d5bfbd5036
heuristics/cert_id BSI-DSZ-CC-1048-2018 BSI-DSZ-CC-0284-2005
heuristics/extracted_sars ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ALC_TAT.3, ASE_INT.1, ALC_DVS.1, ADV_ARC.1, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ASE_REQ.2, ADV_IMP.1, ASE_OBJ.2, ATE_IND.2, ALC_CMC.4, ALC_CMS.5, ADV_INT.2, ALC_FLR.3, ATE_FUN.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1 ATE_DPT.1, ADV_SPM.1, AVA_MSU.2, ASE_SRE.1, ATE_COV.2, AVA_SOF.1, ADV_LLD.1, ASE_INT.1, ALC_DVS.1, AVA_VLA.2, ALC_LCD.1, ADV_IMP.1, AGD_ADM.1, ASE_ENV.1, ADV_HLD.2, ADV_FUN.1, ATE_IND.2, ATE_FUN.1, ADV_FSP.2, ASE_DES.1, ASE_REQ.1, ASE_OBJ.1, ADV_IGS.1, ADV_RCR.1, ALC_FLR.3, ALC_TAT.1, ASE_TSS.1, ASE_PPC.1, AGD_USR.1
heuristics/extracted_versions - 6.5.7226.0
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-1101-2019, BSI-DSZ-CC-1109-2019 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-1005-2016 {}
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-1101-2019, BSI-DSZ-CC-1160-2021, BSI-DSZ-CC-1186-2023, BSI-DSZ-CC-1222-2024, BSI-DSZ-CC-1109-2019, BSI-DSZ-CC-1133-2020 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0846-2013, BSI-DSZ-CC-0715-2011, BSI-DSZ-CC-0900-2014, BSI-DSZ-CC-1005-2016, BSI-DSZ-CC-0793-2012, BSI-DSZ-CC-0953-2015 {}
pdf_data/cert_filename 1048c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1048-2018: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
    • EAL 5: 1
    • EAL 5 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.3: 1
    • ALC_TAT.3: 1
  • ATE:
    • ATE_FUN.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20180910100825+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, PR/SM for IBM z14 and IBM LinuxONE Systems Driver Level D32L with Bundle Level S29, IBM Corporation"
  • /ModDate: D:20180910104020+02'00'
  • /Producer: LibreOffice 5.2
  • /Subject: Certificat, Zertifikat, PR/SM for IBM z14 and IBM LinuxONE
  • /Title: Certification Report BSI-DSZ-CC-1048-2018
  • pdf_file_size_bytes: 918794
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1048a_pdf.pdf 0284a.pdf
pdf_data/report_frontpage
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_FLR.3, ALC_TAT.3, ATE_FUN.2 and AVA_VAN.5
    • cc_version: Product specific Security Target Common Criteria Part 2 conformant
    • cert_id: BSI-DSZ-CC-1048-2018
    • cert_item: PR/SM for IBM z14 and IBM LinuxONE Systems Driver Level D32L with Bundle Level S29
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: None
  • DE:
    • cert_id: BSI-DSZ-CC-0284-2005
    • cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1005-2016: 3
    • BSI-DSZ-CC-1048-2018: 15
  • DE:
    • BSI-DSZ-CC-0284-2005: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 4
    • EAL 5: 3
    • EAL 5 augmented: 2
    • EAL 5+: 1
    • EAL 6: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • ALC:
    • ALC_CMS.5: 1
    • ALC_FLR: 3
    • ALC_FLR.3: 4
    • ALC_TAT.3: 5
  • ATE:
    • ATE_DPT.3: 1
    • ATE_FUN.2: 5
  • AVA:
    • AVA_VAN.5: 5
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 2
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS_CONTROL: 2
    • A.COM_PROT: 2
    • A.CORRECT_HW: 2
    • A.INSTALL: 2
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 2
    • A.PHYS_PROTECT: 2
  • T:
    • T.AUTH_DAC: 1
    • T.DL_MISUSE: 1
    • T.OVERFLOW: 1
    • T.SPAM: 1
    • T.UNAUTHUSE: 1
    • T.UNAUTH_DAC: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 6
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
  • BSI:
    • BSI 7125: 2
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 14
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • BSI:
    • AIS 32: 1
    • AIS 33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 2, 2018-08-01, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [8] z14 Hardware Management Console Operations Guide Version 2.14.0, Version 2.14.0, September: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • ConfidentialDocument:
    • Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
    • out of scope: 4
pdf_data/report_metadata
  • /Author: Federal Office for Information Security (BSI)
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20051220074356+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /ModDate: D:20051220075600+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051220064348
  • /Subject: BSI-DSZ-CC-0284-2005
  • /Title: Certification Report
  • pdf_file_size_bytes: 399534
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
pdf_data/st_filename 1048b_pdf.pdf 0284b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1048: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5: 4
  • EAL:
    • EAL4: 10
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 2
    • ADV_IMP.1: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.3: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.3: 2
    • ATE_FUN.2: 4
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 4
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 9
    • ADV_FSP.2: 2
    • ADV_FUN.1: 1
    • ADV_HLD.1: 2
    • ADV_HLD.2: 3
    • ADV_IGS.1: 1
    • ADV_IMP.1: 3
    • ADV_LLD.1: 4
    • ADV_RCR.1: 5
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
    • ALC_FLR.3: 9
    • ALC_LCD.1: 2
    • ALC_TAT.1: 3
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 2
    • FDP_ACC.2: 25
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 43
    • FDP_ACF.1: 14
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_RIP.2: 8
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 27
    • FMT_MSA.1: 14
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 13
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_RSA.1: 7
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FDP:
    • FDP_ACC.1: 42
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 40
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 25
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 20
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_ACC.1: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FRU:
    • FRU_RSA.1: 18
    • FRU_RSA.1.1: 2
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.SIE: 3
  • T:
    • T.LPAR_XCTL: 5
  • A:
    • A.ACCESS_CONTROL: 3
    • A.COM_PROT: 3
    • A.CORRECT_HW: 3
    • A.INSTALL: 4
    • A.MANAGE: 4
    • A.NO_EVIL_ADM: 2
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 4
  • O:
    • O.CONBLK: 13
    • O.DAC: 16
    • O.FILTER_EMAIL: 10
    • O.QUOTA: 12
    • O.RESTDIST: 11
  • OE:
    • OE.COM_PROT: 5
    • OE.DAC: 12
    • OE.INSTALL: 3
    • OE.PHYSICAL: 3
    • OE.PLATFORM_: 1
    • OE.PLATFORM_SUPPORT: 4
  • T:
    • T.AUTH_DAC: 4
    • T.DL_MISUSE: 4
    • T.OVERFLOW: 4
    • T.SPAM: 9
    • T.UNAUTHUSE: 3
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 2
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 1
  • TUV:
    • TÜViT: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC4: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
      • SSL 3.0: 1
    • TLS:
      • TLS: 4
pdf_data/st_keywords/side_channel_analysis
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 22
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC1725: 1
    • RFC1730: 1
    • RFC821: 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • out of scope: 2
    • the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
pdf_data/st_metadata
  • /Author: slabihou
  • /CreationDate: D:20050713145508+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
  • /Title: MS_EX_ST_1.9.doc
  • pdf_file_size_bytes: 285736
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different