Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258 G00-83
JISEC-CC-CRP-C0511
Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
Certificate Number: 2011/72
name bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258 G00-83 Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
category Multi-Function Devices Other Devices and Systems
scheme JP AU
not_valid_after 30.05.2021 13.07.2017
not_valid_before 30.05.2016 16.02.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0511_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0511_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf
manufacturer KONICA MINOLTA, INC. Microsoft Corporation
manufacturer_web https://www.konicaminolta.com/index.html https://www.microsoft.com
security_level EAL2+, ALC_FLR.2 EAL4+, ALC_FLR.3
dgst a19ce5fb24c2e668 be0c7f67702ea646
heuristics/cert_id JISEC-CC-CRP-C0511 Certificate Number: 2011/72
heuristics/cpe_matches cpe:2.3:h:konicaminolta:bizhub_c368:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c308:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_c258:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_308:-:*:*:*:*:*:*:*, cpe:2.3:h:konicaminolta:bizhub_368:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*
heuristics/related_cves {} CVE-2018-8151, CVE-2000-0216, CVE-2019-0817, CVE-2016-0138, CVE-1999-1322, CVE-2019-1136, CVE-2018-8302, CVE-2017-8621, CVE-2021-26858, CVE-2018-8154, CVE-2021-26857, CVE-2014-6319, CVE-2019-0724, CVE-2018-0940, CVE-2018-0924, CVE-2020-0688, CVE-2013-5072, CVE-2012-4791, CVE-2019-1084, CVE-2013-0418, CVE-2020-17144
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 368, 308, 258, 83 2010, 64
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0511
  • certification_date: 01.05.2016
  • claim: EAL2+ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0511_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an MFP (Multi-Function Printer) that offers Copy, Scan, Print, Fax, and Document storage and retrieval functions. The TOE provides security functions that conform to U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std 2600.2™-2009) which is the MFP security requirement specification, to prevent unauthorized disclosure and alteration of user’s document data. TOE Security functions The TOE provides the following security functions. - Identification and authentication Function to identify and authenticate users. - User restriction control function Function to restrict available functions of users and to control the access to document data other than accumulated documents only to the authorized users. - Accumulated documents access control function Function to control the access to accumulated documents only to the authorized users. - HDD encryption function Function to encrypt the data that is stored in HDD. - Residual information deletion function Function to overwrite and delete the data stored in HDD, so that they cannot be reused. - Audit log function Function to record audit log related to security functions. - Network communication protection function Function to encrypt communication data on the LAN. - Self-test function Function to verify the integrity of executable codes of HDD encryption function and security functions. - Security management function Function to control the management of security functions only to the authorized users. - External interface separation function Function to prevent unauthorized transfer to LAN from external interface like public phone etc.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258
    • product_type: Multi-Function Printer
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0511_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0511_est.pdf
    • toe_version: G00-83
    • vendor: KONICA MINOLTA, INC.
  • expiration_date: 01.06.2021
  • revalidations: [frozendict({'date': '2017-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0511_it5553_01.html'})]
  • supplier: KONICA MINOLTA,INC.
  • toe_japan_name: bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258G00-83
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0511_it5553.html
  • toe_overseas_name: bizhub C368/bizhub C308/bizhub C258/bizhub C236DN/bizhub C230DN/bizhub C225DN/ineo+ 368/ineo+ 308/ineo+ 258/Sindoh D422/Sindoh D421/Sindoh D420/Sindoh CM3091/Sindoh CM3031/Sindoh CM2071 G00-83
heuristics/protection_profiles 43ce79b420f23a00 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf {}
pdf_data/report_filename c0511_erpt.pdf EFS-T024 CR SP1.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0511-01: 1
    • Certification No. C0511: 1
  • AU:
    • Certificate Number: 2011/72: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ALC:
    • ALC_FLR.3: 9
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 29
    • Microsoft Corporation: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 1
  • TLS:
    • TLS:
      • TLS: 7
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2010-3332: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20160609164313+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160609164839+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 499121
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
pdf_data/st_filename c0511_est.pdf E14_EAL4_ASE_1.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 1
  • EAL:
    • EAL4: 11
    • EAL4 augmented: 4
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • APE:
    • APE_ECD: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 8
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT: 2
    • ASE_INT.1: 2
    • ASE_OBJ: 2
    • ASE_OBJ.2: 2
    • ASE_REQ: 2
    • ASE_REQ.2: 2
    • ASE_SPD: 2
    • ASE_SPD.1: 2
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 2
    • FAU_STG.4: 13
    • FAU_STG.4.1: 2
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 9
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 18
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 20
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 25
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 7
    • FDP_ACF: 24
    • FDP_ACF.1: 5
    • FDP_IFC: 39
    • FDP_IFC.1: 12
    • FDP_IFF: 70
    • FDP_IFF.1: 10
  • FIA:
    • FIA_ATD.1: 3
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 37
    • D.FUNC: 21
    • D.PROT: 8
  • O:
    • O.AUDIT: 6
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.HDD: 9
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 11
    • O.USER_AUTHORIZED: 1
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
  • A:
    • A.BLOCKLIST: 2
    • A.COM_PROT: 2
    • A.INSTALL: 2
    • A.NO_EVIL_ADM: 1
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 2
    • A.PLATFORM: 2
  • O:
    • O.CONBLK: 6
    • O.DAC: 14
    • O.MAIL_FLOW: 5
    • O.REDUCE_SPAM: 6
    • O.RESTDIST: 7
    • O.WIPE: 5
  • OE:
    • OE.BLOCKLIST: 2
    • OE.COM_PROT: 2
    • OE.INSTALL: 3
    • OE.PHYSICAL: 2
    • OE.PLATFORM: 18
  • OSP:
    • OSP.MAIL_FLOW: 3
    • OSP.WIPE: 3
  • T:
    • T.AUTH_DAC: 5
    • T.DL_MISUSE: 4
    • T.SPAM: 7
    • T.UNAUTHUSE: 2
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 10
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 4
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • TLS:
    • TLS:
      • TLSv1.0: 1
      • TLSv1.2: 1
  • TLS:
    • TLS:
      • TLS: 16
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 2821: 9
    • RFC 2822: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The: 1
pdf_data/st_metadata
  • /Author: e08884
  • /CreationDate: D:20160609142628+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160609142628+09'00'
  • /Producer: Acrobat Distiller 15.0 (Windows)
  • /Title: Microsoft Word - 公開用【C0511】英文_ASE_ZeusS-2.00-160524(IPAコメント)_KM.docx
  • pdf_file_size_bytes: 551817
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 80
  • /Author: Aaron Doggett (stratsec)
  • /CreationDate: D:20101223114445+11'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20101223114445+11'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: EAL4 Security Target
  • /Title: Exchange 2010
  • pdf_file_size_bytes: 861830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different