Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m
JISEC-CC-CRP-C0246
Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
BSI-DSZ-CC-0284-2005
name Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
category Multi-Function Devices Operating Systems
scheme JP DE
not_valid_after 01.03.2015 01.09.2019
not_valid_before 25.02.2010 09.11.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0246_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0284b.pdf
manufacturer Ricoh Company, Ltd. Microsoft Corporation
manufacturer_web https://www.ricoh.com/ https://www.microsoft.com
security_level EAL3+, ALC_FLR.2 EAL4+, ALC_FLR.3
dgst 93cdda41b5a03cdf bbe326d5bfbd5036
heuristics/cert_id JISEC-CC-CRP-C0246 BSI-DSZ-CC-0284-2005
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_IGS.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ALC_FLR.3, ADV_FUN.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions 7.33, 15.000, 1.04, 2.16, 1.11.1, 7.15.02, 7.26, 1.3, 1.59, 1.01, 1.11, 1.10, 01.24, 1.15 6.5.7226.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0246
  • certification_date: 01.02.2010
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0246_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE conforms to the international security standard: "IEEE Std 2600.1TM-2009" security Protection Profile for Digital Multi-function Products. The TOE is a digital Multi-function Product which is composed of Copy Function, Scanner Function, Printer Function and Document Server Function, and it creates a safe environment for customers to use the functions. TOE security functionality The main security functions are described as follows: - Audit Function: to generate / review audit log of the event. - Identification and Authentication Function: to identify and authenticate users, to lock out, to protect passwords, and to enforce automated logout. - Access Control Function: to control available functions for each user, and to control the document operation. - Network Protection Function: to protect information on the Network with use of the encrypted communication. - Residual Data Delete Function: to overwrite the residual data on the Hard Disk with the specific pattern data. - Security Management Function: to make the administrators control the security functions. - Software Verification Function: to ensure the genuine control software by verifying the integrity of the executable codes.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Ricoh imagio MP 5000SP/4000SP with security card Type 9
    • product_type: Multi Function Product
    • protection_profile: 2600.1, Protection Profile for Hardcopy Devices, Operational Environment A 1.0, dated June 2009
    • report_link: https://www.ipa.go.jp/en/security/c0246_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0246_est.pdf
    • toe_version: - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1 Network Support7.26 Network DocBox1.10C Web Support1.59 Web Uapl1.15 animation1.3 Scanner01.24 RPDL7.33 Printer1.11 MSIS7.15.02 RPCS Font1.01 Engine1.04:05 OpePanel1.01 LANG01.01 LANG11.01 ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.03.2015
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0246_it9257.html
  • toe_japan_name: Ricoh imagio MP 5000SP/4000SP with security card Type 9 - Firmware Configuration System VersionV2.16-00 System/Copy1.11.1, Network Support7.26, Network DocBox1.10C, Web Support1.59, Web Uapl1.15, animation1.3, Scanner01.24, RPDL7.33, Printer;1.11, MSIS7.15.02, RPCS Font1.01, Engine1.04:05, OpePanel1.01, LANG01.01, LANG11.01, ADF15.000:15 - ASIC Ic Key1100 - Option Data Erase Opt1.01m
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles 32475ccb695b1644 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf {}
pdf_data/report_filename c0246_erpt.pdf 0284a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0284-2005
    • cert_item: Microsoft Exchange Server 2003 Enterprise Edition, Version/Build 6.5.7226.0 and Hotfix MS05-021
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0246-01: 1
    • Certification No. C0246: 1
  • DE:
    • BSI-DSZ-CC-0284-2005: 19
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
    • EAL3 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.2: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 1
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 1
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 3
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.2: 1
    • AVA_SOF: 4
    • AVA_SOF.1: 1
    • AVA_VLA: 4
    • AVA_VLA.2: 2
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
  • A:
    • A.ACCESS_CONTROL: 2
    • A.COM_PROT: 2
    • A.CORRECT_HW: 2
    • A.INSTALL: 2
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 2
    • A.PHYS_PROTECT: 2
  • T:
    • T.AUTH_DAC: 1
    • T.DL_MISUSE: 1
    • T.OVERFLOW: 1
    • T.SPAM: 1
    • T.UNAUTHUSE: 1
    • T.UNAUTH_DAC: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 6
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • BSI:
    • AIS 32: 1
    • AIS 33: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Technical Report, BSI-DSZ-CC-0284-2005, Version 1, Datum 2005-09-16, TÜV Informationstechnik GmbH (confidential document) [7] Exchange Server 2003 Administration Guide and Exchange Server 2003 product help (part of the: 1
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation, too. B-11 BSI-DSZ-CC-0284-2005 Certification Report 5 Architectural Information: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The relevant Guidance Documentation is delivered together with the software on: 1
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • of Exchange 2003 the components IMAP4, POP3, and X.400 protocol are disabled and therefore out of scope of the evaluation. The TOE runs on the platform Windows Server 2003 operating system (exact: 1
    • out of scope: 4
pdf_data/report_metadata
  • /CreationDate: D:20100629170727+09'00'
  • /ModDate: D:20100629170727+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 230440
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Author: Federal Office for Information Security (BSI)
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20051220074356+01'00'
  • /Creator: Acrobat PDFMaker 7.0.5 für Word
  • /ModDate: D:20051220075600+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20051220064348
  • /Subject: BSI-DSZ-CC-0284-2005
  • /Title: Certification Report
  • pdf_file_size_bytes: 399534
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
pdf_data/st_filename c0246_est.pdf 0284b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL4: 10
    • EAL4 augmented: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_FLR.2: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 9
    • ADV_FSP.2: 2
    • ADV_FUN.1: 1
    • ADV_HLD.1: 2
    • ADV_HLD.2: 3
    • ADV_IGS.1: 1
    • ADV_IMP.1: 3
    • ADV_LLD.1: 4
    • ADV_RCR.1: 5
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
    • ALC_FLR.3: 9
    • ALC_LCD.1: 2
    • ALC_TAT.1: 3
  • ASE:
    • ASE_REQ.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 2
    • AVA_VLA.2: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 27
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 23
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 4
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 18
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
  • FDP:
    • FDP_ACC.1: 42
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 40
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC.1: 25
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 20
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
  • FIA:
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_ACC.1: 1
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 52
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FRU:
    • FRU_RSA.1: 18
    • FRU_RSA.1.1: 2
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.SOFTWARE: 9
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYISCAL: 3
    • OE.PHYSICAL: 1
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
  • A:
    • A.ACCESS_CONTROL: 3
    • A.COM_PROT: 3
    • A.CORRECT_HW: 3
    • A.INSTALL: 4
    • A.MANAGE: 4
    • A.NO_EVIL_ADM: 2
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 4
  • O:
    • O.CONBLK: 13
    • O.DAC: 16
    • O.FILTER_EMAIL: 10
    • O.QUOTA: 12
    • O.RESTDIST: 11
  • OE:
    • OE.COM_PROT: 5
    • OE.DAC: 12
    • OE.INSTALL: 3
    • OE.PHYSICAL: 3
    • OE.PLATFORM_: 1
    • OE.PLATFORM_SUPPORT: 4
  • T:
    • T.AUTH_DAC: 4
    • T.DL_MISUSE: 4
    • T.OVERFLOW: 4
    • T.SPAM: 9
    • T.UNAUTHUSE: 3
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 2
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜViT: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • RC:
      • RC4: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
  • TLS:
    • SSL:
      • SSL: 4
      • SSL 3.0: 1
    • TLS:
      • TLS: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC1725: 1
    • RFC1730: 1
    • RFC821: 11
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • disabled in the default configuration of Exchange, such as the IMAP4, POP3, and X.400 protocol, are out of scope of the evaluation. The security functionality of the TOE comprises access control for mailboxes and: 1
    • out of scope: 2
    • the TOE is Exchange in its default configuration, IMAP4, POP3, and X.400 protocols are disabled and out of scope in the evaluation. Security Target Page 9/64 1. Admin component, which includes the following: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20100618152326+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20100618152326+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - C0246ST_eng_2010-6-18.doc
  • pdf_file_size_bytes: 464939
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
  • /Author: slabihou
  • /CreationDate: D:20050713145508+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 2.41 (Windows 2000 Professional German)
  • /Title: MS_EX_ST_1.9.doc
  • pdf_file_size_bytes: 285736
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different