This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
FortiMail Appliances running FortiMail Firmware Version 5.2.6 383-4-314 |
Dell EMC™ SupportAssist Enterprise 4.0 with Policy Manager 6.8 487-EWA-2019 |
|
---|---|---|
name | FortiMail Appliances running FortiMail Firmware Version 5.2.6 | Dell EMC™ SupportAssist Enterprise 4.0 with Policy Manager 6.8 |
category | Network and Network-Related Devices and Systems | Other Devices and Systems |
status | archived | active |
not_valid_after | 15.01.2021 | 06.08.2025 |
not_valid_before | 15.01.2016 | 06.08.2020 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-314%20CTv1.0e.docx | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/487%20EWA%202019%20CT%20v1.0.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-314%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/487%20EWA%202019%20CR%20v1.0.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FortiMail%20ST%20v113a.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/487%20EWA%202019%20ST%20v1.2.pdf |
manufacturer | Fortinet, Inc. | Dell EMC |
manufacturer_web | https://www.fortinet.com/ | https://www.dellemc.com/en-ca/index.htm |
security_level | {} | EAL2+, ALC_FLR.2 |
dgst | 724c444f4597f835 | 6be8a83ddab92fc2 |
heuristics/cert_id | 383-4-314 | 487-EWA-2019 |
heuristics/cert_lab | CANADA | [] |
heuristics/cpe_matches | cpe:2.3:a:fortinet:fortimail:5.2:*:*:*:*:*:*:*, cpe:2.3:a:fortinet:fortimail:5.2.6:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2017-3125, CVE-2019-15712, CVE-2017-7732, CVE-2014-8617, CVE-2015-3293, CVE-2021-24007, CVE-2021-26100, CVE-2022-26114, CVE-2021-32591, CVE-2019-15707, CVE-2020-15933, CVE-2021-26099, CVE-2021-36166, CVE-2021-32586, CVE-2020-9294, CVE-2021-22129 | {} |
heuristics/extracted_sars | AGD_OPE.1, ADV_FSP.1, ASE_REQ.1, ASE_OBJ.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, ASE_INT.1, ASE_TSS.1, ATE_IND.1 | ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ALC_FLR.2 |
heuristics/extracted_versions | 5.2.6 | 4.0, 6.8 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | ac9abe3d5c5a31f0 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf | {} |
pdf_data/cert_filename | 383-4-314 CTv1.0e.docx | 487 EWA 2019 CT v1.0.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-314 CR v1.0e.pdf | 487 EWA 2019 CR v1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | FortiMail ST v113a.pdf | 487 EWA 2019 ST v1.2.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |