name |
VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2 |
Enterasys Matrix N, DFE Gold Enterasys Networking System v6.01, Matrix N, DFE Platinum Enterasys Networking System v6.01, Matrix N, DFE Diamond Enterasys Networking System v6.01 and Matrix X Enterasys Networking System v1.6.4P4 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
US |
CA |
status |
archived |
archived |
not_valid_after |
28.07.2023 |
29.09.2015 |
not_valid_before |
28.07.2021 |
27.02.2009 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/enterasys-networks-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11155-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/enterasys-networks-sec-eng.pdf |
manufacturer |
VMware Inc. |
Enterasys Networks, Inc |
manufacturer_web |
https://www.vmware.com |
https://www.enterasys.com/ |
security_level |
{} |
EAL3+, ALC_FLR.1 |
dgst |
8129b9e38f61ae35 |
a81d36414b9cbf03 |
heuristics/cert_id |
CCEVS-VR-VID-11155-2021 |
383-4-81 |
heuristics/cert_lab |
US |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
7.2 |
6.01, 1.6.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Application Software
- certification_date: 28.07.2021
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 28.07.2023
- id: CCEVS-VR-VID11155
- product: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
- scheme: US
- url: https://www.niap-ccevs.org/product/11155
- vendor: VMware, LLC
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
a1cc4a4e079f4d1f |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf |
{} |
pdf_data/cert_filename |
st_vid11155-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11155-2021: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210803124126-04'00'
- /ModDate: D:20210803124126-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 183258
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid11155-vr.pdf |
enterasys-networks-cert-eng.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID11155-2021
- cert_item: VMware Carbon Black Endpoint Detection and Response (EDR) Windows Sensor 7.2
- cert_lab: US NIAP
- CA:
|
- US:
- CA:
- cert_id: 383-4-81-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID11155-2021: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 2
- EAL 3+: 2
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author:
- /CCEF: CCEF name
- /CR date: 27 February 2009
- /CR version: x.x
- /Certificate date: dd month yyyy
- /CreationDate: D:20090316110620-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer name: Developer name
- /Document number: 383-4-xx-CR
- /ETR title, version, date: ETR title, version, date
- /Evaluation completion date: dd month yyyy
- /ModDate: D:20090316150840-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ST Title: ST title
- /ST date: dd month yyyy
- /ST version: ST version
- /SourceModified: D:20090316150552
- /Sponsor: Sponsor
- /TOE Version: 5.0
- /TOE name and version: TOE name and version
- /TOE short name: TOE short name
- /Title: EAL X+ Evaluation of [Developer Long Name]
- /_AdHocReviewCycleID: 140304685
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Reade, Rick A.
- /_EmailSubject: Current PCR templates ... rick
- pdf_file_size_bytes: 118924
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
st_vid11155-st.pdf |
enterasys-networks-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 2
- EAL 3 augmented: 1
- EAL 3+: 7
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 12
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.1: 6
- ALC_CMS.1: 7
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.1: 6
- ASE_REQ.1: 12
- ASE_TSS.1: 7
- ATE:
- AVA:
|
- ACM:
- ACM_CAP.3: 5
- ACM_SCP: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 3
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 4
- ADV_HLD.2: 3
- ADV_RCR: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 5
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 6
- ALC_FLR: 2
- ALC_FLR.1: 4
- ATE:
- ATE_COV.2: 5
- ATE_DPT.1: 4
- ATE_FUN: 2
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 5
- AVA_SOF.1: 4
- AVA_VLA: 2
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM_EXT.1: 4
- FCS_CKM_EXT.1.1: 1
- FCS_COP: 1
- FCS_RBG_EXT.1: 6
- FCS_RBG_EXT.1.1: 2
- FCS_STO_EXT.1: 7
- FCS_STO_EXT.1.1: 1
- FDP:
- FDP_DAR_EXT: 1
- FDP_DAR_EXT.1: 5
- FDP_DEC_EXT.1: 5
- FDP_DEC_EXT.1.1: 2
- FDP_DEC_EXT.1.2: 2
- FDP_NET_EXT.1: 5
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT.1: 5
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 1
- FMT_MEC_EXT.1: 8
- FMT_MEC_EXT.1.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FPR:
- FPR_ANO_EXT.1: 4
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT.1: 4
- FPT_AEX_EXT.1.1: 2
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 2
- FPT_AEX_EXT.1.4: 2
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT.1: 4
- FPT_API_EXT.1.1: 1
- FPT_IDV_EXT.1: 4
- FPT_IDV_EXT.1.1: 1
- FPT_LIB_EXT.1: 4
- FPT_LIB_EXT.1.1: 1
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 1
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FTP:
- FTP_DIT_EXT.1: 6
- FTP_DIT_EXT.1.1: 1
|
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 2
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 2
- FIA_UAU.1: 4
- FIA_UAU.2: 10
- FIA_UID.1: 8
- FIA_UID.2: 10
- FMT:
- FMT_MOF.1: 28
- FMT_MOF.1.1: 3
- FMT_MSA.3: 3
- FMT_MTD: 1
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 11
- FPT_RVM.1.1: 2
- FPT_SEP.1: 4
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- O.QUALITY: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
|
- A:
- A.INSTALL: 2
- A.LOCATE: 2
- A.MANAGE: 2
- A.NETCON: 2
- A.NOEVIL: 2
- A.PROTECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 8
- O.AUDIT: 8
- O.AUTHENTICATE: 8
- O.PROTECT: 6
- O.TRAFFIC: 4
- OE:
- OE.BYPASS: 4
- OE.MANAGE: 7
- OE.PHYSICAL: 3
- OE.PLATFORM: 3
- OE.PROTECT: 6
- OE.TIME: 4
- OE.TRAFFIC: 3
- T:
- T.MASQUERADE: 2
- T.TAMPERING: 2
- T.UNAUTH: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- RFC:
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- in the claimed Protection Profile. Therefore, the following product functionality is considered out of scope as there are no SFRs that can be mapped to this functionality: • The functionality of collecting: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20210803123122-04'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210803123122-04'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 738522
- pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0416, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0495, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0445, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0582, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0544, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0587, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0515, https://docs.microsoft.com/en-us/windows/, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0561, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0510, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0435, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0437, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0548, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0554, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0498, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0465, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0519, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0543, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0427, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0434, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0473, https://www.niap-ccevs.org/Documents_and_Guidance/view_td.cfm?TD=0540
- pdf_is_encrypted: False
- pdf_number_of_pages: 49
|
- /Author: gmilliken
- /CreationDate: D:20080829094947-04'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20090302093836-05'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title: Enterasys Matrix X and Matrix N ST v1.5
- pdf_file_size_bytes: 463536
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 59
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |