name |
Symantec™ Control Compliance Suite v10.5.1 |
SecureVue v3.6.3 CP1 |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
CA |
US |
status |
archived |
archived |
not_valid_after |
15.05.2017 |
20.05.2015 |
not_valid_before |
16.09.2011 |
20.05.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/symantec-ccs-v1051-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/symantec-ccs-v1051-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10379-st.pdf |
manufacturer |
Symantec Corporation |
EiQ Networks, Inc. |
manufacturer_web |
https://www.symantec.com |
https://www.EiQNetworks.com/ |
security_level |
EAL3+, ALC_FLR.2 |
EAL2+, ALC_FLR.2 |
dgst |
8a4f10021c7b792e |
78bafa65426e3c35 |
heuristics/cert_id |
383-4-178 |
CCEVS-VR-VID-10379-2013 |
heuristics/cert_lab |
CANADA |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
10.5.1 |
3.6.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Enterprise Security Management, Network Management
- certification_date: 20.05.2013
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date: 20.05.2015
- id: CCEVS-VR-VID10379
- product: SecureVue v3.6.3 CP1
- scheme: US
- url: https://www.niap-ccevs.org/product/10379
- vendor: EiQ Networks, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
symantec-ccs-v1051-cert-eng.pdf |
st_vid10379-vr.pdf |
pdf_data/report_frontpage |
- US:
- CA:
- cert_id: 383-4-178-CR
- cert_lab: CANADA
|
- US:
- cert_id: CCEVS-VR-VID10379-2013
- cert_item: SecureVue, Version 3.6.3 CP1
- cert_lab: US NIAP
- CA:
|
pdf_data/report_keywords/cc_cert_id |
- CA:
- 383-4-178: 1
- 383-4-178-CR: 1
|
- US:
- CCEVS-VR-VID10379-2013: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 8
- EAL 2 augmented: 2
- EAL 3: 1
- EAL2: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 2
- ALC_FLR.2: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 5
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 3
- FAU_SAR.3: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_SOS.1: 1
- FIA_UAU.5: 1
- FIA_UAU.7: 1
- FIA_UAU_EXP.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_ITT_EXP.1: 3
- FPT_TST_EXP.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-3: 1
- FIPS 197: 1
- ISO:
- PKCS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- both of which are out of scope: 1
- operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). 8 of 40 The TOE employs password masking during input, and a password policy that controls the: 1
- out of scope: 2
- resources. 4. The following are not included in the Evaluation Scope: TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered: 1
|
pdf_data/report_metadata |
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1 Revision 3
- /CC date: July 2009
- /CEM Version: 3.1 Revision 3
- /CEM date: July 2009
- /CR_Date: 16 September 2011
- /CR_Version: 1.0
- /Client City: Mountain View
- /Client Country: USA
- /Client Full Name: Symantec Corporation
- /Client Postal Code: 94043
- /Client Short Name: Symantec
- /Client State: California
- /Client Street: 350 Ellis Street
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Microsoft
- /CreationDate: D:20110919131233-04'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Developer Long Name: Symantec Corporation
- /Developer Short Name: Symantec
- /EAL Level: 3+
- /EAL Level Base: 3
- /EAL Level Text: 3 augmented
- /EAL Long: EAL 3 Augmented
- /EAL Short: EAL 3+
- /ER Document Date: 21 September 2010
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1693-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 0.1
- /ETPlan_date: TBD
- /ETProcRes_Date: TBD
- /ETProcRes_Doc#: 1693-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 0.1
- /ETProc_Date: TBD
- /ETProc_Doc#: 1693-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: 0.1
- /ETReport_Date: 26 August 2011
- /ETReport_Doc#: 1693-000-D002
- /ETReport_Title: Preliminary Evaluation Technical Report
- /ETReport_TitleShort: PETR
- /ETReport_Version: 0.4
- /EWP_Date: 10 November 2010
- /EWP_Doc#: 1693-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-178
- /Eval_End_Date: 1 October 2011
- /Eval_Start_Date: 1 October 2010
- /LeadEvaluator: Kim Frawley-Braun
- /LeadEvaluatorInitials: KB
- /ModDate: D:20110926132427-04'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1693
- /ST_Date: 25 August, 2011
- /ST_Title: Symantec™ Control Compliance Suite v10.5.1 Security Target
- /ST_Version: 0.19
- /SVC_Date: TBD
- /SVC_Doc#: 1693-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 0.1
- /SVR_Date: TBD
- /SVR_Doc#: 1693-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Mountain View
- /Security Classification: EWA-Canada & Symantec Proprietary
- /SourceModified: D:20110919171209
- /Sponsor: Symantec
- /Sponsor City: California
- /Sponsor Country: USA
- /Sponsor Postal Code: 94043
- /Sponsor State: Mountain View
- /Sponsor Street: 350 Ellis Street
- /TOE: Symantec™ Control Compliance Suite v10.5.1
- /TOE Short: Symantec™ CCS v10.5.1
- /TOE Short with version: Symantec™ CCS v10.5.1
- /TOE Short-NoTM: Symantec CCS v10.5.1
- /TOE Version: v10.5.1
- /TOE with version: Symantec™ Control Compliance Suite v10.5.1
- /TOE-NoTM: Symantec Control Compliance Suite v10.5.1
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 101299
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
|
pdf_data/st_filename |
symantec-ccs-v1051-sec-eng.pdf |
st_vid10379-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 1
- EAL3: 3
- EAL3 augmented: 1
- EAL3+: 3
|
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 4: 1
- EAL1: 1
- EAL2: 6
- EAL2 augmented: 4
- EAL3: 1
- EAL5: 1
- EAL7: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 5
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.2: 4
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FCS:
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FIA:
- FMT:
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_STM.1: 7
- FTP:
- FTP_ITC.1: 6
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 9
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 6
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UAU_EXP.2: 17
- FIA_UAU_EXP.2.1: 2
- FIA_UID.1: 8
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 1
- FPT_ITT_EXP.1: 14
- FPT_ITT_EXP.1.1: 2
- FPT_ITT_EXP.1.2: 2
- FPT_STM.1: 2
- FPT_TST: 2
- FPT_TST_EXP.1: 13
- FPT_TST_EXP.1.1: 2
- FPT_TST_EXP.1.2: 2
- FPT_TST_EXP.1.3: 2
- FTP:
- FTP_ITC: 1
- FTP_ITT.1: 1
- FTP_ITT_EXP.1: 1
- FTP_TST_EXP.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHEN: 2
- A.MANAGE: 3
- A.NOEVIL: 2
- A.PROTECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 4
- O.ANALYZE: 4
- O.AUDIT: 4
- O.CERT: 4
- O.ROBUST: 4
- O.SAFEFAIL: 4
- O.SCAN: 4
- OE:
- OE.AUTHEN: 3
- OE.MANAGE: 6
- OE.PROTECT: 4
- OE.TIME: 3
- T:
- T.ACCOUNT: 2
- T.EXPLOIT: 2
- T.FALASC: 2
- T.SELPRO: 2
- T.SPOOF: 2
- T.TOEFAIL: 2
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 12
- FIPS 180-2: 1
- FIPS 186-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS PUB 180-2: 1
- X509:
|
- FIPS:
- RFC:
- RFC 2865: 1
- RFC 3080: 1
- RFC 4251: 2
- RFC 5424: 2
- RFC 959: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Data Collector Host OS Agents (UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe) Distributed and tiered: 1
- A: SecureVue v3.6 Data Collector is supported to run on VMWare ESX 4.x and ESXi platform but is out of scope of this evaluation. SecureVue Version 3.6.3 CP1 Security Target SecureVue Version 3.6.3 CP1: 1
- Server. Therefore, for the purpose of this evaluation this executable was not tested and considered out of scope. 1.4.4 Trusted Channel between TOE components The TSF includes a trusted communication: 1
- UNIX, Windows) 1.4.8.2 Out-of-Scope TOE functionality considered out of scope High availability option Data Collector Configuration (DCConf.exe: 1
- both of which are out of scope: 1
- operating environment between the browser and the Apache/Microsoft IIS server (both of which are out of scope). Each user has the type of authentication assigned to it (AD, RADIUS, or Native). If a user is: 1
- out of scope: 4
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |