name |
Microsoft Exchange Server 2010 Enterprise |
EMC® VNXe Operating Environment v2.0 with Unisphere™ running on VNXe Series hardware models VNXe3300 and VNXe3100 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
AU |
CA |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
15.05.2017 |
not_valid_before |
15.09.2010 |
09.08.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Microsoft_Exchange_Server_EAL1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v20-cert-eng.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Microsoft_Exchange_Server_EAL1_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v20-sec-eng.pdf |
manufacturer |
Microsoft Corporation |
EMC Corporation |
manufacturer_web |
https://www.microsoft.com |
https://www.emc.com/ |
security_level |
EAL1+, ALC_FLR.3 |
ALC_FLR.2, EAL3+ |
dgst |
f05d921f3c8e4f8b |
5971db1acc95e3a9 |
heuristics/cert_id |
Certificate Number: 2010/68 |
383-4-181 |
heuristics/cert_lab |
[] |
CANADA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ASE_ECD.1, ALC_FLR.3, AGD_PRE.1, AVA_VAN.1, ALC_CMC.1, ASE_OBJ.1, ASE_REQ.1, AGD_OPE.1, ALC_CMS.1, ATE_IND.1, ADV_FSP.1, ASE_CCL.1, ASE_INT.1 |
ALC_CMS.3, ASE_OBJ.2, ADV_ARC.1, ATE_IND.2, ATE_DPT.1, ALC_FLR.2, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ALC_DVS.1, ADV_TDS.2, ASE_ECD.1, AGD_OPE.1, AVA_VAN.2, ALC_CMC.3, ASE_INT.1, ASE_SPD.1, ASE_REQ.2, ADV_FSP.3, ATE_FUN.1, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1 |
heuristics/extracted_versions |
2010 |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
Microsoft_Exchange_Server_EAL1.pdf |
emc-vnx-v20-cert-eng.pdf |
pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-181-CR
- cert_lab: CANADA
|
pdf_data/report_keywords/cc_cert_id |
- AU:
- Certificate Number: 2010/68: 1
|
- CA:
- 383-4-181: 1
- 383-4-181-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL1: 8
- EAL1 augmented: 5
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 1
- EAL 3+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Microsoft:
- Microsoft: 29
- Microsoft Corporation: 2
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- it should be noted that the way these external lists are complied and transferred to the TOE are out of scope of the evaluation. 2.6 Usage 2.6.1 Evaluated Configuration 27 The evaluated configuration is: 1
- out of scope: 1
|
|
pdf_data/report_metadata |
- /AISEF: stratsec
- /Author: roslyn.dinkgreve
- /Category: Report
- /Cert_Level: EAL1 augmented with ALC_FLR.3
- /Company: Australasian Information Security Evaluation Program
- /CreationDate: D:20100920131525+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Developer: Microsoft Corporation
- /IssueDate: 15 September 2010
- /ModDate: D:20100920131544+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Product: Microsoft Exchange Server 2010 Enterprise (English) 64-bit
- /SourceModified: D:20100920031325
- /Subject: Certificate Number: 2010/68
- /Title: Certification Report
- /docVersion: 1.1
- pdf_file_size_bytes: 249728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: TBD
- /CR_Version: 1.0
- /Client City: Hopkinton
- /Client Country: USA
- /Client Full Name: EMC Corporation
- /Client Postal Code: 01748
- /Client Short Name: EMC
- /Client State: MA
- /Client Street: 171 South Street
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Hewlett-Packard
- /CreationDate: D:20110908103844-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: EMC Corporation
- /Developer Short Name: EMC
- /EAL Level: 3+
- /EAL Level Base: 3
- /EAL Level Text: 3 augmented
- /EAL Long: EAL 3 Augmented
- /EAL Short: EAL 3+
- /ER Document Date: 15 November 2010
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1685-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 1.0
- /ETPlan_date: 8 July 2011
- /ETProcRes_Date: TBD
- /ETProcRes_Doc#: 1685-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 0.1
- /ETProc_Date: 8 July 2011
- /ETProc_Doc#: 1685-000-D004
- /ETProc_Title: Evaluation Test Procedures and Test Resulta
- /ETProc_Version: 1.0
- /ETReport_Date: 11 July 2011
- /ETReport_Doc#: 1685-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 0.4
- /EWP_Date: 15 December 2010
- /EWP_Doc#: 1685-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-181
- /Eval_End_Date: 12 July 2011
- /Eval_Start_Date: 2 August 2010
- /Keywords:
- /LeadEvaluator: Greg Lague
- /LeadEvaluatorInitials: GL
- /ModDate: D:20110908103917-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1685
- /ST_Date: 23 June 2011
- /ST_Title: EMC Corporation EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100 Security Target
- /ST_Version: 0.6
- /SVC_Date: TBD
- /SVC_Doc#: 1685-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 0.1
- /SVR_Date: 8 July 2011
- /SVR_Doc#: 1685-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Hopkinton, MA
- /Security Classification: EWA-Canada & EMC Proprietary
- /SourceModified: D:20110908140517
- /Sponsor: EMC
- /Sponsor City: Hopkinton
- /Sponsor Country: USA
- /Sponsor Postal Code: 01748
- /Sponsor State: MA
- /Sponsor Street: 171 South Street
- /Subject:
- /TOE: EMC® VNXe Operating Environment v2.0 with Unisphere™ running on VNXe Series hardware models VNXe3300 and VNXe3100
- /TOE Short: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
- /TOE Short with version: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
- /TOE Short-NoTM: EMC VNXe Operating Environment v2.0
- /TOE Version: v2.0
- /TOE with version: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
- /TOE-NoTM: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 76805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 12
|
pdf_data/st_filename |
Microsoft_Exchange_Server_EAL1_ST.pdf |
emc-vnx-v20-sec-eng.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL1: 10
- EAL1 augmented: 4
|
- EAL:
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 2
- ALC_FLR.3: 7
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.1: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 7
- FDP_ACF: 19
- FDP_ACF.1: 5
- FDP_IFC: 30
- FDP_IFC.1: 12
- FDP_IFF: 60
- FDP_IFF.1: 10
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID.2: 3
- FIA_UID.2.1: 1
- FIA_USB: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA: 50
- FMT_MSA.1: 27
- FMT_MSA.1.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC: 20
- FDP_ACC.1: 2
- FDP_ACF: 16
- FDP_ACF.1: 8
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 32
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 18
- FMT_MTD.1: 3
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.BLOCKLIST: 1
- OE.COM_PROT: 1
- OE.INSTALL: 1
- OE.PHYSICAL: 1
- OE.PLATFORM: 2
|
- A:
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.PROTECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 23
- O.AUDIT: 4
- O.AUDIT_REVIEW: 4
- O.PROTECT: 16
- OE:
- OE.PROPER_NAME_ASSIGNME: 2
- OE.PROPER_NAME_ASSIGNMEN: 1
- OE.SECURE_COMMUNICATIO: 6
- OE.SECURE_COMMUNICATION: 1
- OE.SECURE_SERVERS: 7
- OE.TIME: 3
- T:
- T.DATA_CORRUPTION: 2
- T.IMPROPER_CONFIG: 2
- T.IMPROPER_SERVER: 2
- T.MEDIATE_ACCESS: 2
- T.UNAUTH: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Ken Hendrie (stratsec)
- /Category: ASE
- /Classification:
- /Client: Microsoft Corporation
- /Company: stratsec
- /CreationDate: D:20100920114636+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Document Identifier: E14_EAL1_ASE
- /Document Phase: Released
- /Document Type: ASE
- /EAL: EAL1 augmented with ALC_FLR.3
- /Manager: Amy Blumenfield (amyblu)
- /ModDate: D:20100920114901+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Release Date: 5-JUL-10
- /SourceModified: D:20100920014559
- /Subject: Security Target
- /TOE Build: 14.00.0639.021
- /TOE Full Title: Exchange Server 2010 Enterprise (English) 64-bit
- /TOE Title: Exchange Server 2010
- /Title: Exchange Server 2010
- /Version: 1.0
- pdf_file_size_bytes: 753176
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 52
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |