Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2
CCEVS-VR-VID-10184-2008
Microsoft Windows 11 (version 22H2), Microsoft Windows 10 (version 22H2), Microsoft Windows Server 2022, Microsoft Windows Server Datacenter: Azure Edition, Microsoft Azure Stack HCIv2 version 22H2, Microsoft Azure Stack Hub, Microsoft Azure Stack Edge
2023-8-INF-4178
name Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2 Microsoft Windows 11 (version 22H2), Microsoft Windows 10 (version 22H2), Microsoft Windows Server 2022, Microsoft Windows Server Datacenter: Azure Edition, Microsoft Azure Stack HCIv2 version 22H2, Microsoft Azure Stack Hub, Microsoft Azure Stack Edge
scheme US ES
status archived active
not_valid_after 07.02.2010 17.01.2029
not_valid_before 07.02.2008 17.01.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-08_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10184-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-08-INF-4178.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10184-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-08-ST_lite.pdf
security_level EAL4+, ALC_FLR.3 {}
dgst cf3575b11c3e657d f4ec532602eb2c7d
heuristics/cert_id CCEVS-VR-VID-10184-2008 2023-8-INF-4178
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:o:microsoft:windows_2003_server:-:sp2:itanium:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x86:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x64:*, cpe:2.3:o:microsoft:windows_2003_server:-:r2_sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:itanium:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:compute_cluster:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:itanium:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:datacenter:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:enterprise:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:standard:*:itanium:*, cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:storage:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x86:* {}
heuristics/related_cves CVE-2009-2510, CVE-2013-1269, CVE-2009-1920, CVE-2009-0235, CVE-2008-2250, CVE-2013-3894, CVE-2011-1878, CVE-2015-2364, CVE-2009-0089, CVE-2010-1897, CVE-2008-1441, CVE-2013-3129, CVE-2013-3879, CVE-2015-1680, CVE-2012-1528, CVE-2011-1227, CVE-2010-2731, CVE-2011-0661, CVE-2008-0015, CVE-2013-1278, CVE-2013-1295, CVE-2009-1124, CVE-2008-1454, CVE-2011-0034, CVE-2006-4692, CVE-2013-3866, CVE-2013-3863, CVE-2012-5364, CVE-2015-1643, CVE-2013-0810, CVE-2008-3464, CVE-2010-0018, CVE-2013-1343, CVE-2008-0322, CVE-2013-1285, CVE-2010-1098, CVE-2006-2374, CVE-2013-3174, CVE-2011-1970, CVE-2011-2018, CVE-2011-0087, CVE-2015-0008, CVE-2011-0674, CVE-2007-0040, CVE-2009-1511, CVE-2010-0252, CVE-2008-3012, CVE-2009-0085, CVE-2007-1531, CVE-2011-1880, CVE-2009-0232, CVE-2011-0090, CVE-2015-2374, CVE-2009-2509, CVE-2015-0010, CVE-2011-0667, CVE-2010-0719, CVE-2008-2252, CVE-2015-0088, CVE-2007-1206, CVE-2008-1083, CVE-2011-0672, CVE-2007-1204, CVE-2013-1276, CVE-2011-0040, CVE-2010-1734, CVE-2011-1236, CVE-2011-1875, CVE-2010-3963, CVE-2010-2739, CVE-2008-4114, CVE-2011-3400, CVE-2010-4562, CVE-2014-0315, CVE-2011-0677, CVE-2015-0005, CVE-2009-2507, CVE-2010-0235, CVE-2011-0673, CVE-2013-1291, CVE-2010-0818, CVE-2011-0666, CVE-2010-0022, CVE-2008-3014, CVE-2010-3943, CVE-2015-0009, CVE-2008-4036, CVE-2014-4113, CVE-2010-0484, CVE-2009-1928, CVE-2008-6819, CVE-2015-0093, CVE-2013-1294, CVE-2011-1237, CVE-2010-3940, CVE-2011-0675, CVE-2019-1489, CVE-2011-0670, CVE-2009-1133, CVE-2015-1702, CVE-2011-0030, CVE-2009-0231, CVE-2013-1283, CVE-2009-1922, CVE-2007-1912, CVE-2015-1727, CVE-2014-1767, CVE-2009-2500, CVE-2011-0665, CVE-2012-1870, CVE-2011-0676, CVE-2009-2515, CVE-2013-1342, CVE-2011-1894, CVE-2011-3402, CVE-2011-1238, CVE-2013-3175, CVE-2006-0005, CVE-2014-1819, CVE-2008-2249, CVE-2011-1232, CVE-2014-1818, CVE-2011-1869, CVE-2008-4250, CVE-2013-3167, CVE-2015-0060, CVE-2013-1272, CVE-2011-1243, CVE-2004-0840, CVE-2011-0033, CVE-2007-0069, CVE-2011-5046, CVE-2007-0038, CVE-2012-0159, CVE-2015-0081, CVE-2009-3020, CVE-2009-2503, CVE-2008-1087, CVE-2009-1926, CVE-2015-1723, CVE-2008-1086, CVE-2013-1264, CVE-2009-2514, CVE-2009-2494, CVE-2012-1852, CVE-2007-0066, CVE-2009-2504, CVE-2011-1879, CVE-2015-0004, CVE-2013-3869, CVE-2013-3899, CVE-2010-3941, CVE-2010-2742, CVE-2010-2744, CVE-2010-0238, CVE-2011-3415, CVE-2012-1868, CVE-2013-3200, CVE-2009-0079, CVE-2011-0041, CVE-2009-4210, CVE-2015-0061, CVE-2010-1883, CVE-2010-3957, CVE-2012-0009, CVE-2010-2265, CVE-2015-1716, CVE-2009-0550, CVE-2013-1340, CVE-2015-2363, CVE-2015-0092, CVE-2013-1286, CVE-2013-5056, CVE-2009-3677, CVE-2012-0004, CVE-2013-3661, CVE-2015-1722, CVE-2015-2416, CVE-2007-3463, CVE-2010-1886, CVE-2002-2324, CVE-2007-1765, CVE-2012-0173, CVE-2010-3974, CVE-2013-3918, CVE-2013-5065, CVE-2010-1735, CVE-2014-1807, CVE-2011-0654, CVE-2010-1885, CVE-2007-6753, CVE-2011-2003, CVE-2003-0907, CVE-2013-3173, CVE-2010-0231, CVE-2007-0843, CVE-2014-0317, CVE-2010-0028, CVE-2010-1255, CVE-2006-2373, CVE-2015-1677, CVE-2009-2516, CVE-2010-0485, CVE-2017-8487, CVE-2011-1239, CVE-2011-0671, CVE-2015-1768, CVE-2013-1263, CVE-2009-0083, CVE-2013-3876, CVE-2011-1886, CVE-2003-0904, CVE-2010-0487, CVE-2013-1279, CVE-2015-2365, CVE-2012-0005, CVE-2008-3648, CVE-2009-0243, CVE-2010-0035, CVE-2015-2370, CVE-2011-0039, CVE-2013-1262, CVE-2011-0045, CVE-2013-3172, CVE-2014-6324, CVE-2008-1456, CVE-2015-0096, CVE-2012-0149, CVE-2007-2224, CVE-2014-6317, CVE-2014-1817, CVE-2015-2371, CVE-2009-1123, CVE-2015-0095, CVE-2012-1890, CVE-2015-0094, CVE-2011-1233, CVE-2014-0300, CVE-2015-0011, CVE-2009-4311, CVE-2012-1527, CVE-2009-1808, CVE-2010-2550, CVE-2011-1235, CVE-2013-3864, CVE-2011-3414, CVE-2007-1537, CVE-2008-1457, CVE-2009-3126, CVE-2012-0006, CVE-2013-3128, CVE-2002-0862, CVE-2009-0081, CVE-2007-5145, CVE-2015-1676, CVE-2012-0154, CVE-2013-1259, CVE-2013-1252, CVE-2010-0025, CVE-2011-1264, CVE-2011-1284, CVE-2015-1645, CVE-2009-0082, CVE-2008-4038, CVE-2013-0077, CVE-2013-3181, CVE-2010-0021, CVE-2012-0157, CVE-2012-1866, CVE-2009-2513, CVE-2002-2132, CVE-2014-6355, CVE-2009-1930, CVE-2011-1240, CVE-2015-2417, CVE-2015-0015, CVE-2011-1283, CVE-2011-1870, CVE-2010-2743, CVE-2012-1865, CVE-2013-1257, CVE-2011-1876, CVE-2009-2493, CVE-2015-2360, CVE-2012-1867, CVE-2009-1925, CVE-2010-0237, CVE-2009-0234, CVE-2013-3136, CVE-2012-1893, CVE-2011-1974, CVE-2009-1923, CVE-2010-0812, CVE-2011-1242, CVE-2009-1546, CVE-2011-0662, CVE-2010-0486, CVE-2010-0232, CVE-2012-1848, CVE-2010-2563, CVE-2011-0042, CVE-2004-0119, CVE-2008-4609, CVE-2011-1881, CVE-2012-2553, CVE-2007-5133, CVE-2012-0003, CVE-2011-1226, CVE-2011-2005, CVE-2007-2218, CVE-2010-4701, CVE-2012-0181, CVE-2007-1211, CVE-2013-1273, CVE-2013-1287, CVE-2015-1721, CVE-2015-0091, CVE-2008-2245, CVE-2013-1249, CVE-2013-1277, CVE-2015-2369, CVE-2009-2653, CVE-2015-0003, CVE-2009-0086, CVE-2012-0151, CVE-2009-2508, CVE-2010-2567, CVE-2011-1991, CVE-2013-1341, CVE-2010-0819, CVE-2012-0001, CVE-2008-1436, CVE-2009-4313, CVE-2010-1896, CVE-2010-2568, CVE-2011-1868, CVE-2013-1261, CVE-2007-3034, CVE-2011-0086, CVE-2012-0002, CVE-2012-2529, CVE-2011-2014, CVE-2011-0088, CVE-2009-1545, CVE-2011-3408, CVE-2010-3144, CVE-2013-1248, CVE-2012-1864, CVE-2009-1127, CVE-2009-0094, CVE-2009-2511, CVE-2014-4118, CVE-2015-0075, CVE-2009-1126, CVE-2010-3942, CVE-2011-0028, CVE-2009-0078, CVE-2008-4834, CVE-2014-4076, CVE-2009-0093, CVE-2008-1453, CVE-2011-2011, CVE-2011-3397, CVE-2008-2251, CVE-2007-1212, CVE-2010-1888, CVE-2011-1874, CVE-2013-1271, CVE-2007-2219, CVE-2014-0266, CVE-2013-1274, CVE-2011-1225, CVE-2010-0234, CVE-2011-1249, CVE-2013-3878, CVE-2015-1720, CVE-2015-1719, CVE-2010-4398, CVE-2008-5044, CVE-2003-1048, CVE-2013-3660, CVE-2010-1689, CVE-2017-0176, CVE-2015-0089, CVE-2015-0073, CVE-2011-3416, CVE-2009-2502, CVE-2009-0119, CVE-2006-6723, CVE-2007-5352, CVE-2010-0476, CVE-2010-0023, CVE-2000-1218, CVE-2012-2530, CVE-2008-3465, CVE-2012-1853, CVE-2011-0658, CVE-2010-0480, CVE-2007-3036, CVE-2013-3865, CVE-2010-1895, CVE-2013-3940, CVE-2010-3959, CVE-2013-1251, CVE-2007-3898, CVE-2015-0087, CVE-2015-1724, CVE-2010-0269, CVE-2013-1275, CVE-2015-0074, CVE-2013-1345, CVE-2011-0089, CVE-2009-1139, CVE-2010-0233, CVE-2010-0016, CVE-2014-1814, CVE-2009-0320, CVE-2011-0660, CVE-2014-6321, CVE-2015-0077, CVE-2008-1445, CVE-2009-2519, CVE-2011-1241, CVE-2010-3939, CVE-2013-1253, CVE-2010-2553, CVE-2009-0230, CVE-2015-0014, CVE-2007-1215, CVE-2010-0236, CVE-2015-0080, CVE-2013-3198, CVE-2010-2746, CVE-2012-2556, CVE-2010-2729, CVE-2010-1891, CVE-2011-1985, CVE-2011-1884, CVE-2009-1125, CVE-2013-1250, CVE-2010-2740, CVE-2010-2741, CVE-2007-2237, CVE-2008-4835, CVE-2008-0088, CVE-2011-3401, CVE-2011-1282, CVE-2013-1334, CVE-2015-0090, CVE-2009-1544, CVE-2014-4064, CVE-2010-1882, CVE-2010-1690, CVE-2010-0811, CVE-2014-4077, CVE-2015-2367, CVE-2012-2527, CVE-2002-0391, CVE-2013-1256, CVE-2010-2738, CVE-2015-0006, CVE-2011-1281, CVE-2011-1268, CVE-2012-0148, CVE-2008-1451, CVE-2015-0057, CVE-2008-1440, CVE-2008-1084, CVE-2009-1929, CVE-2013-1270, CVE-2015-1726, CVE-2013-3196, CVE-2013-1254, CVE-2009-1924, CVE-2010-3222, CVE-2011-1882, CVE-2011-0043, CVE-2010-3956, CVE-2012-5362, CVE-2015-1678, CVE-2011-1984, CVE-2011-1967, CVE-2011-1231, CVE-2010-3227, CVE-2007-2228, CVE-2008-4327, CVE-2007-0214, CVE-2010-4669, CVE-2008-0020, CVE-2010-0020, CVE-2010-2566, CVE-2013-1344, CVE-2009-2528, CVE-2010-3140, CVE-2008-0083, CVE-2011-1873, CVE-2011-1968, CVE-2007-1205, CVE-2013-5058, CVE-2006-5758, CVE-2013-1255, CVE-2003-0813, CVE-2011-0096, CVE-2013-1260, CVE-2010-3970, CVE-2013-1268, CVE-2011-1248, CVE-2009-2517, CVE-2012-1850, CVE-2011-1234, CVE-2014-6332, CVE-2011-1230, CVE-2007-6026, CVE-2015-1644, CVE-2005-1987, CVE-2010-1887, CVE-2009-4312, CVE-2009-3675, CVE-2008-3013, CVE-2011-1885, CVE-2012-0180, CVE-2011-1883, CVE-2009-0233, CVE-2014-0318, CVE-2012-4774, CVE-2012-0013, CVE-2015-1679, CVE-2013-1265, CVE-2015-1701, CVE-2013-1267, CVE-2013-1258, CVE-2009-0087, CVE-2014-4115, CVE-2011-3406, CVE-2015-1725, CVE-2012-1851, CVE-2006-7210, CVE-2012-0217, CVE-2013-1300, CVE-2009-2501, CVE-2013-3197, CVE-2009-2524, CVE-2014-4148, CVE-2011-0657, CVE-2012-2526, CVE-2009-0568, CVE-2010-0820, CVE-2006-5586, CVE-2010-0024, CVE-2017-8461, CVE-2013-1266, CVE-2010-0027, CVE-2012-4786, CVE-2010-1894, CVE-2012-0175, CVE-2015-2387, CVE-2009-0229, CVE-2015-1637, CVE-2013-3195, CVE-2011-1229, CVE-2011-3417, CVE-2011-1247, CVE-2010-0250, CVE-2013-1313, CVE-2013-3887, CVE-2014-0323, CVE-2013-1280, CVE-2008-0087, CVE-2014-0301, CVE-2011-2600, CVE-2014-4971, CVE-2011-1228, CVE-2007-5348 {}
heuristics/extracted_sars ADV_LLD.1, ALC_TAT.1, ATE_FUN.1, ALC_DVS.1, ADV_IMP.1, ADV_SPM.1, AVA_SOF.1, AGD_ADM.1, ADV_HLD.2, ADV_FSP.2, AGD_USR.1, AVA_MSU.2, AVA_VLA.2, ATE_COV.2, ALC_FLR.3, ADV_RCR.1, ATE_DPT.1, ALC_LCD.1, ATE_IND.2 AGD_PRE.1, ASE_CCL.1, ALC_CMS.1, ASE_OBJ.2, ASE_INT.1, ASE_TSS.1, ADV_FSP.1, ALC_TSU_EXT.1, ASE_REQ.2, AVA_VAN.1, AGD_OPE.1, ATE_IND.1, ASE_ECD.1, ASE_SPD.1, ALC_CMC.1
heuristics/extracted_versions 2003 10, 2022, 11
heuristics/scheme_data
  • category: Operating System
  • certification_date: 07.02.2008
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID10184
  • product: Microsoft Windows Server 2003 SP2 including R2, Standard, Enterprise, Datacenter, x64, and Itanium Editions; Windows XP Professional SP2 and x64 SP2; Windows XP Embedded SP2 (for specific TOE software updates, patches, and hotfixes see Section 1 of Security Target)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10184
  • vendor: Microsoft Corporation
  • category: Operating systems
  • certification_date: 17.01.2024
  • enhanced:
  • manufacturer: Microsoft Corp.
  • product: Microsoft Windows 11 (version 22H2), Microsoft Windows 10 (version 22H2), Microsoft Windows Server 2022, Microsoft Windows Server Datacenter: Azure Edition, Microsoft Azure Stack HCIv2 version 22H2, Microsoft Azure Stack Hub, Microsoft Azure Stack Edge
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/1005-microsoft-windows-11-version-22h2-microsoft-windows-10-version-22h2-microsoft-windows-server-2022-microsoft-windows-server-datacenter-azure-edition-microsoft-azure-stack-hciv2-version-22h2-microsoft-azure-stack-hub-microsoft-azure-stack-edge
protection_profiles


pdf_data/cert_filename 2023-08_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
  • Microsoft:
    • Microsoft: 21
    • Microsoft Corporation: 1
pdf_data/cert_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 901903
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10184-vr.pdf 2023-08-INF-4178.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10184-2008
    • cert_item: Microsoft Windows Server 2003, Microsoft Windows XP Professional, and Microsoft Windows XP embedded
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10184-2008: 1
  • ES:
    • 2023-8-INF-4178- v1: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_FLR: 2
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 4
    • FAU_SEL.1: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM_EXT.2: 1
    • FCS_CKM_EXT.4: 1
    • FCS_CKM_EXT.8: 1
    • FCS_COP.1: 4
    • FCS_DTLS_EXT.1: 1
    • FCS_EAP_EXT.1: 1
    • FCS_RBG_EXT.1: 1
    • FCS_STO_EXT.1: 1
    • FCS_TLSC_EXT.1: 2
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.3: 1
    • FCS_TLSC_EXT.4: 1
    • FCS_WPA_EXT.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 1
    • FDP_IFC_EXT.1: 1
    • FDP_RIP.2: 1
    • FDP_VPN_EXT.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_BLT_EXT.1: 1
    • FIA_BLT_EXT.2: 1
    • FIA_BLT_EXT.3: 1
    • FIA_BLT_EXT.4: 1
    • FIA_BLT_EXT.6: 1
    • FIA_BLT_EXT.7: 1
    • FIA_PSK_EXT.1: 1
    • FIA_PSK_EXT.2: 1
    • FIA_UAU.5: 1
  • FMT:
    • FMT_MOF_EXT.1: 2
    • FMT_SMF.1: 2
    • FMT_SMF_EXT.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 1
    • FPT_ASLR_EXT.1: 1
    • FPT_SBOP_EXT.1: 1
    • FPT_SRP_EXT.1: 1
    • FPT_TST_EXT.1: 2
    • FPT_TST_EXT.3: 1
    • FPT_TUD_EXT.1: 1
    • FPT_TUD_EXT.2: 1
  • FTA:
    • FTA_TAB.1: 1
    • FTA_WSE_EXT.1: 1
  • FTP:
    • FTP_BLT_EXT.1: 1
    • FTP_BLT_EXT.2: 1
    • FTP_BLT_EXT.3: 2
    • FTP_ITC.1: 1
    • FTP_ITC_EXT.1: 3
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.U: 4
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 68
    • Microsoft Corporation: 2
  • Microsoft:
    • Microsoft: 132
    • Microsoft Corporation: 3
  • Qualcomm:
    • Qualcomm: 1
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 4
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 2
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 11
  • TLS:
    • DTLS:
      • DTLS: 3
    • TLS:
      • TLS: 7
  • VPN:
    • VPN: 15
pdf_data/report_keywords/standard_id
  • X509:
    • X.509: 3
  • FIPS:
    • FIPS 140-2: 1
  • X509:
    • X.509: 6
pdf_data/report_metadata
  • /Author: Santosh Chokhani
  • /Company: Orion
  • /CreationDate: D:20080222120444-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20080222120502-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080222170424
  • /Title: Validation Report
  • pdf_file_size_bytes: 222190
  • pdf_hyperlinks: http://www.cve.mitre.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename st_vid10184-st.pdf 2023-08-ST_lite.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 4: 14
    • EAL 4 augmented: 5
    • EAL3: 2
    • EAL4: 21
    • EAL4 augmented: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 14
    • ACM_CAP.4: 24
    • ACM_SCP.2: 11
  • ADO:
    • ADO_DEL.2: 11
    • ADO_IGS.1: 10
  • ADV:
    • ADV_FSP.2: 14
    • ADV_HLD.2: 16
    • ADV_IMP.1: 11
    • ADV_LLD.1: 18
    • ADV_RCR.1: 8
    • ADV_SPM.1: 13
  • AGD:
    • AGD_ADM.1: 15
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 11
    • ALC_FLR.3: 25
    • ALC_LCD.1: 12
    • ALC_TAT.1: 13
  • ATE:
    • ATE_COV.2: 11
    • ATE_DPT.1: 9
    • ATE_FUN.1: 14
    • ATE_IND.2: 12
  • AVA:
    • AVA_MSU.2: 18
    • AVA_SOF.1: 11
    • AVA_VLA.2: 16
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 8
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 14
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 13
    • FAU_SAR.3.1: 2
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 14
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXP.1: 1
    • FCS_CKM_EXP.2.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 31
    • FCS_COP.1.1: 16
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.2: 37
    • FDP_ACC.2.1: 4
    • FDP_ACC.2.2: 4
    • FDP_ACF.1: 45
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 4
    • FDP_ACF.2: 2
    • FDP_IFC.1: 41
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 29
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 3
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_IFF.1.6: 3
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITT.1: 9
    • FDP_ITT.1.1: 1
    • FDP_RIP.2: 11
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 18
    • FIA_USB.1: 4
  • FMT:
    • FMT_MOF.1: 46
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 73
    • FMT_MSA.1.1: 8
    • FMT_MSA.2: 9
    • FMT_MSA.3: 64
    • FMT_MSA.3.1: 7
    • FMT_MSA.3.2: 7
    • FMT_MTD.1: 141
    • FMT_MTD.1.1: 17
    • FMT_MTD.1.2: 1
    • FMT_MTD.2: 11
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV: 1
    • FMT_REV.1: 19
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 11
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.3: 8
    • FMT_SMR.3.1: 1
  • FPT:
    • FPT_AMT.1: 7
    • FPT_ITT.1: 6
    • FPT_ITT.3: 3
    • FPT_RPL: 1
    • FPT_RPL.1: 3
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
    • FPT_SUS: 3
    • FPT_TRC.1: 4
  • FRU:
    • FRU_RSA.1: 9
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_LSA.1: 1
    • FTA_MCS.1: 2
    • FTA_MSC.1: 1
    • FTA_SSL.1: 8
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 12
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
    • FTA_TRP.1: 1
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 9
    • FAU_GEN.1: 37
    • FAU_GEN.1.1: 5
    • FAU_GEN.1.2: 6
    • FAU_SEL: 2
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
  • FCS:
    • FCS_CKM: 15
    • FCS_CKM.1: 64
    • FCS_CKM.1.1: 4
    • FCS_CKM.2: 35
    • FCS_CKM.2.1: 3
    • FCS_CKM_EXT: 2
    • FCS_CKM_EXT.2: 7
    • FCS_CKM_EXT.2.1: 1
    • FCS_CKM_EXT.4: 7
    • FCS_CKM_EXT.4.1: 3
    • FCS_CKM_EXT.4.2: 1
    • FCS_CKM_EXT.8: 8
    • FCS_CKM_EXT.8.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 88
    • FCS_COP.1.1: 5
    • FCS_DTLS_EXT: 1
    • FCS_DTLS_EXT.1: 13
    • FCS_DTLS_EXT.1.1: 2
    • FCS_DTLS_EXT.1.2: 2
    • FCS_EAP_EXT: 1
    • FCS_EAP_EXT.1: 7
    • FCS_EAP_EXT.1.1: 1
    • FCS_PSK_EXT.1: 2
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 18
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
    • FCS_STO_EXT: 1
    • FCS_STO_EXT.1: 7
    • FCS_STO_EXT.1.1: 1
    • FCS_TLCS_EXT: 2
    • FCS_TLCS_EXT.1: 1
    • FCS_TLCS_EXT.2: 1
    • FCS_TLSC: 1
    • FCS_TLSC_EXT: 9
    • FCS_TLSC_EXT.1: 24
    • FCS_TLSC_EXT.1.1: 3
    • FCS_TLSC_EXT.1.2: 3
    • FCS_TLSC_EXT.1.3: 2
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.1.5: 1
    • FCS_TLSC_EXT.2: 21
    • FCS_TLSC_EXT.2.1: 2
    • FCS_TLSC_EXT.3: 13
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.4: 12
    • FCS_TLSC_EXT.4.1: 1
    • FCS_TLS_EXT.1: 2
    • FCS_TLS_EXT.2: 2
    • FCS_TLS_EXT.3: 1
    • FCS_TLS_EXT.4: 1
    • FCS_WPA_EXT.1: 7
    • FCS_WPA_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT: 1
    • FDP_ACF_EXT.1: 7
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 9
    • FDP_IFC_EXT.1.1: 1
    • FDP_RDP.2: 1
    • FDP_RIP: 1
    • FDP_RIP.2: 7
    • FDP_RIP.2.1: 1
    • FDP_VPN_EXT: 1
    • FDP_VPN_EXT.1: 5
    • FDP_VPN_EXT.1.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_BLT_EXT: 1
    • FIA_BLT_EXT.1: 9
    • FIA_BLT_EXT.1.1: 2
    • FIA_BLT_EXT.2: 9
    • FIA_BLT_EXT.2.1: 2
    • FIA_BLT_EXT.3: 9
    • FIA_BLT_EXT.3.1: 2
    • FIA_BLT_EXT.4: 9
    • FIA_BLT_EXT.4.1: 2
    • FIA_BLT_EXT.4.2: 2
    • FIA_BLT_EXT.5: 1
    • FIA_BLT_EXT.6: 11
    • FIA_BLT_EXT.6.1: 4
    • FIA_BLT_EXT.7: 8
    • FIA_BLT_EXT.7.1: 5
    • FIA_PAE_EXT: 1
    • FIA_PAE_EXT.1: 7
    • FIA_PAE_EXT.1.1: 1
    • FIA_PSK_EXT: 1
    • FIA_PSK_EXT.1: 5
    • FIA_PSK_EXT.1.1: 2
    • FIA_PSK_EXT.1.2: 3
    • FIA_PSK_EXT.2: 4
    • FIA_PSK_EXT.2.1: 2
    • FIA_UAU: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF_EXT: 3
    • FMT_MOF_EXT.1: 17
    • FMT_MOF_EXT.1.1: 2
    • FMT_SMF: 9
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 2
    • FMT_SMF_EXT: 4
    • FMT_SMF_EXT.1: 20
    • FMT_SMF_EXT.1.1: 4
  • FPT:
    • FPT_ACF_EXT: 1
    • FPT_ACF_EXT.1: 7
    • FPT_ACF_EXT.1.1: 2
    • FPT_ACF_EXT.1.2: 2
    • FPT_ASLR_EXT: 1
    • FPT_ASLR_EXT.1: 7
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT: 1
    • FPT_SBOP_EXT.1: 7
    • FPT_SBOP_EXT.1.1: 1
    • FPT_SRP_EXT: 1
    • FPT_SRP_EXT.1: 7
    • FPT_SRP_EXT.1.1: 1
    • FPT_TST_EXT: 8
    • FPT_TST_EXT.1: 19
    • FPT_TST_EXT.1.1: 2
    • FPT_TST_EXT.1.2: 1
    • FPT_TST_EXT.3: 8
    • FPT_TST_EXT.3.1: 1
    • FPT_TST_EXT.3.2: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 12
    • FPT_TUD_EXT.1.1: 2
    • FPT_TUD_EXT.1.2: 2
    • FPT_TUD_EXT.2: 8
    • FPT_TUD_EXT.2.1: 2
    • FPT_TUD_EXT.2.2: 2
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 7
    • FTA_TAB.1.1: 1
    • FTA_WSE_EXT: 1
    • FTA_WSE_EXT.1: 8
    • FTA_WSE_EXT.1.1: 1
  • FTP:
    • FTP_BLT_EXT: 8
    • FTP_BLT_EXT.1: 10
    • FTP_BLT_EXT.1.1: 1
    • FTP_BLT_EXT.1.2: 1
    • FTP_BLT_EXT.2: 8
    • FTP_BLT_EXT.2.1: 1
    • FTP_BLT_EXT.3: 16
    • FTP_BLT_EXT.3.1: 2
    • FTP_ITC: 5
    • FTP_ITC.1: 17
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_ITC_EXT: 1
    • FTP_ITC_EXT.1: 24
    • FTP_ITC_EXT.1.1: 2
    • FTP_TRP: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
    • FTP_TST_EXT: 1
    • FTP_TST_EXT.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT: 3
    • A.COOP: 5
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 3
    • A.PEER: 3
    • A.PROTECT: 2
  • O:
    • O.ASSURANCE: 4
    • O.AUDITING: 8
    • O.AUDIT_: 1
    • O.AUDIT_PROTECTION: 4
    • O.AUTHORIZATION: 8
    • O.CREDEN: 4
    • O.DISCRETIONARY_ACCESS: 3
    • O.ENCRYPTED_DATA: 11
    • O.ENFORCEMENT: 9
    • O.FRAMEWORK: 5
    • O.INSTALL: 4
    • O.IPSEC: 13
    • O.LEGAL_WARNING: 4
    • O.LIMIT_AUTHORIZATION: 9
    • O.MANAGE: 7
    • O.MEDIATE: 9
    • O.OUTDATED_SW: 2
    • O.PARTIAL_RECOVERY: 8
    • O.PHYSICAL: 5
    • O.PROTECT: 9
    • O.RESIDUAL_INFORMATION: 8
    • O.SOFTWARE_PROTECT: 4
    • O.TRUSTED_PATH: 8
    • O.UPDATED_SW: 1
  • T:
    • T.ADDRESS_MASQUERADE: 4
    • T.ADMIN_ERROR: 4
    • T.AUDIT_COMPROMISE: 5
    • T.AUDIT_CORRUPT: 4
    • T.CONFIG_CORRUPT: 3
    • T.EAVESDROP: 4
    • T.LOST_DATA: 3
    • T.MALICIOUS_CODE_EXEC: 4
    • T.MASQUERADE: 3
    • T.OBJECTS_NOT_CLEAN: 4
    • T.OLD_SW: 3
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATION: 4
    • T.REPLAY: 4
    • T.SPOOF: 4
    • T.SYSACC: 4
    • T.TCPIP_ATTACK: 3
    • T.UNATTENDED_SESSION: 5
    • T.UNAUTH_ACCESS: 7
    • T.UNAUTH_MODIFICATION: 4
    • T.UNDETECTED_ACTIONS: 4
    • T.UNIDENTIFIED_ACTIONS: 8
    • T.USER_CORRUPT: 7
    • T.USER_CURRUPT: 1
  • A:
    • A.NO_TOE_BYPASS: 5
    • A.PHYSICAL: 2
    • A.PLATFORM: 3
    • A.PROPER_ADMIN: 3
    • A.PROPER_USER: 3
    • A.TRUSTED_ADMIN: 3
    • A.TRUSTED_CONFIG: 2
  • O:
    • O.ACCOUNTABILITY: 8
    • O.AUTHENTICATION: 3
    • O.AUTH_COMM: 5
    • O.CRYPTOGRAPHIC_FUNCTIONS: 8
    • O.INTEGRITY: 7
    • O.KNOWN_STATE: 4
    • O.MANAGEMENT: 8
    • O.NONDISCLOSURE: 3
    • O.PROTECTED_COMMS: 13
    • O.PROTECTED_STORAGE: 4
    • O.SELF_TEST: 4
    • O.SYSTEM_: 1
    • O.SYSTEM_MONITORING: 5
    • O.TOE_ADMINISTRATION: 6
    • O.TSF_SELF_TEST: 2
    • O.WIRELESS_ACCESS_POINT_: 1
    • O.WIRELESS_ACCESS_POINT_CO: 1
    • O.WIRELESS_ACCESS_POINT_CONNECTION: 1
  • OE:
    • OE.NO_TOE_BYPASS: 6
    • OE.PHYSICAL: 2
    • OE.PLATFORM: 3
    • OE.PROPER_ADMIN: 4
    • OE.PROPER_USER: 4
    • OE.TRUSTED_ADMIN: 5
    • OE.TRUSTED_CONFIG: 2
  • SA:
    • SA: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 2
    • T.LOCAL_ATTACK: 2
    • T.NETWORK_ATTACK: 8
    • T.NETWORK_EAVESDROP: 6
    • T.TSF_CONFIGURATION: 2
    • T.TSF_FAILURE: 5
    • T.UNAUTHORIZED: 1
    • T.UNAUTHORIZED_ACCESS: 7
    • T.UNDETECTED_ACTIONS: 3
    • T.USER_DATA_REUSE: 2
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 1
  • Infineon:
    • Infineon: 1
  • Microsoft:
    • Microsoft: 51
    • Microsoft Corporation: 186
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 312
    • Microsoft Corporation: 5
  • Qualcomm:
    • Qualcomm: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
    • RC:
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 12
    • DES:
      • DES: 18
  • constructions:
    • MAC:
      • HMAC: 6
  • AES_competition:
    • AES:
      • AES: 31
      • AES-128: 1
      • AES-256: 4
    • RC:
      • RC4: 1
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 24
      • HMAC-SHA-256: 3
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 17
  • ECC:
    • ECC:
      • ECC: 12
    • ECDH:
      • ECDH: 14
      • ECDHE: 7
    • ECDSA:
      • ECDSA: 28
  • FF:
    • DH:
      • DH: 10
      • DHE: 4
      • Diffie-Hellman: 13
    • DSA:
      • DSA: 18
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 21
      • SHA1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 3
  • SHA:
    • SHA1:
      • SHA-1: 9
      • SHA1: 1
    • SHA2:
      • SHA-2: 1
      • SHA-256: 17
      • SHA-384: 7
      • SHA-512: 3
      • SHA256: 4
      • SHA384: 3
      • SHA512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 6
  • KA:
    • Key agreement: 5
  • KEX:
    • Key Exchange: 23
  • MAC:
    • MAC: 23
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 11
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 5
  • VPN:
    • VPN: 3
  • IKE:
    • IKE: 52
    • IKEv1: 32
    • IKEv2: 32
  • IPsec:
    • IPsec: 164
  • PGP:
    • PGP: 1
  • TLS:
    • DTLS:
      • DTLS: 23
      • DTLS 1.0: 2
      • DTLS 1.2: 3
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 122
      • TLS 1.0: 4
      • TLS 1.1: 4
      • TLS 1.2: 5
  • VPN:
    • VPN: 256
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 12
  • PRNG:
    • DRBG: 8
    • PRNG: 2
  • RNG:
    • RBG: 13
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 5
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 5
  • ECB:
    • ECB: 1
  • GCM:
    • GCM: 8
  • XTS:
    • XTS: 5
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 20
    • P-384: 26
    • P-521: 22
    • secp256r1: 3
    • secp384r1: 3
    • secp521r1: 4
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_NULL_WITH_NULL_NULL: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA: 5
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 5
    • FIPS 140-1: 6
    • FIPS 140-2: 5
    • FIPS 140-214: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 2
    • FIPS 197: 2
    • FIPS 46-3: 3
  • PKCS:
    • PKCS#1: 2
    • PKCS#5: 7
  • RFC:
    • RFC 2617: 1
    • RFC 3739: 1
  • X509:
    • X.509: 3
    • x.509: 1
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 1
    • FIPS 180-4: 5
    • FIPS 186-4: 45
    • FIPS 197: 6
    • FIPS 198-1: 1
    • FIPS 198-2: 5
    • FIPS PUB 186-4: 8
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 2900-2: 1
  • NIST:
    • NIST SP 800-38A: 6
    • NIST SP 800-38C: 7
    • NIST SP 800-38D: 6
    • NIST SP 800-38E: 6
    • NIST SP 800-38F: 7
    • NIST SP 800-56A: 5
    • NIST SP 800-56B: 5
    • NIST SP 800-57: 1
    • NIST SP 800-90: 5
    • NIST SP 800-90A: 1
    • NIST SP 800-90B: 1
    • SP 800-56A: 2
    • SP 800-90: 1
  • PKCS:
    • PKCS #7: 1
  • RFC:
    • RFC 2246: 2
    • RFC 2396: 1
    • RFC 2404: 1
    • RFC 2408: 1
    • RFC 2818: 1
    • RFC 3268: 1
    • RFC 3394: 1
    • RFC 3526: 3
    • RFC 3546: 2
    • RFC 3602: 1
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4301: 5
    • RFC 4303: 1
    • RFC 4304: 1
    • RFC 4306: 1
    • RFC 4346: 1
    • RFC 4347: 1
    • RFC 4366: 1
    • RFC 4492: 1
    • RFC 4681: 1
    • RFC 4868: 3
    • RFC 4945: 1
    • RFC 5114: 2
    • RFC 5216: 2
    • RFC 5246: 14
    • RFC 5280: 8
    • RFC 5288: 8
    • RFC 5289: 18
    • RFC 5430: 1
    • RFC 5759: 1
    • RFC 6066: 2
    • RFC 6125: 1
    • RFC 6347: 2
    • RFC 6379: 1
    • RFC 6960: 1
    • RFC 6961: 1
    • RFC 7296: 1
    • RFC 8017: 1
    • RFC 8247: 1
    • RFC 8784: 1
    • RFC 8996: 2
  • X509:
    • X.509: 38
    • x.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • kernel. Software loaded for execution directly by the platform (e.g. first-stage bootloaders) is out of scope. For each additional category of executable code verified before execution, the evaluator will: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: SAIC
  • /Company: SAIC
  • /CreationDate: D:20080222121234-05'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20080222121818-05'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20080222171054
  • /Title: Windows 2003/XP Security Target
  • pdf_file_size_bytes: 1878359
  • pdf_hyperlinks: http://creativecommons.org/licenses/by-nd-nc/1.0/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 183
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different