Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
X0mail
SERTIT-014
McAfee Endpoint Encryption 6.2 with ePolicy Orchestrator 4.6
CCEVS-VR-VID-10486-2012
name X0mail McAfee Endpoint Encryption 6.2 with ePolicy Orchestrator 4.6
category Other Devices and Systems Data Protection
scheme NO US
not_valid_after 01.09.2019 13.05.2015
not_valid_before 23.02.2010 10.09.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100223_SERTIT-008CR_issue201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10486-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10486-st.pdf
manufacturer Thales Norway AS McAfee, Inc.
manufacturer_web https://www.thales.no/ https://www.mcafee.com/
security_level EAL4 EAL2+, ALC_FLR.3
dgst f310fe4b0c9c7eb1 51912917205e7c47
heuristics/cert_id SERTIT-014 CCEVS-VR-VID-10486-2012
heuristics/cert_lab [] US
heuristics/extracted_sars ADV_RCR.1, AVA_VLA.2, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, ALC_CMC.4, AVA_SOF.1, ADV_IMP.1, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, AGD_ADM.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_DVS.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ASE_CCL.1, ADV_SPM.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 6.2, 4.6
heuristics/scheme_data
  • category: Sensitive Data Protection
  • certification_date: 10.09.2012
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date: 13.05.2015
  • id: CCEVS-VR-VID10486
  • product: McAfee Endpoint Encryption 6.2 with ePolicy Orchestrator 4.6
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10486
  • vendor: McAfee, LLC
maintenance_updates
pdf_data/report_filename 20100223_SERTIT-008CR_issue201.0.pdf st_vid10486-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10486-2012
    • cert_item: McAfee Endpoint Encryption for PC 6.2 with McAfee ePolicy Orchestrator 4.6
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-014: 16
  • US:
    • CCEVS-VR-VID10486-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 17
    • EAL1: 1
    • EAL4+: 3
    • EAL7: 1
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 3
    • EAL 4: 1
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
  • ALC:
    • ALC_FLR.3: 5
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFC.2: 2
    • FDP_IFF.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.AUTHENTICATION_DA: 1
    • A.AVAILABLE_BACKUP: 1
    • A.CRYPTOGRAPHIC_KEY: 1
    • A.DOMAIN_SEPARATION: 1
    • A.MANAGEMENT: 1
    • A.NON_TECHNICAL_IDE: 1
    • A.NO_MALEVOLENCE: 1
    • A.PROFICIENT_USERS: 1
    • A.SECURE_BACKUP: 1
    • A.TIME_SOURCE: 1
    • A.TRUSTED_SOFTWARE: 1
  • T:
    • T.ACCESS: 1
    • T.ALTERNATE_BOOT_PR: 1
    • T.CONFIG: 1
    • T.EASE_OF_USE_ADMIN: 1
    • T.EASE_OF_USE_USER: 1
    • T.EAVESDROP_TRANSIT: 1
    • T.PASSWORD_LOSS: 1
    • T.RECORD_ACTIONS: 1
    • T.RECOVERY_MASQUER: 1
    • T.REMOVE_DISK: 1
    • T.SYSTEM_ACCESS: 1
    • T.UNAUTHORIZED_MOD: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20100315130843
  • /ModDate: D:20100315130843
  • pdf_file_size_bytes: 542517
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: Evaluation Team
  • /CreationDate: D:20121017085415
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VR
  • /ModDate: D:20121017085415
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validator Report
  • /Title: Validation Report for IronPort Messaging Gateway
  • pdf_file_size_bytes: 440863
  • pdf_hyperlinks: http://www.securityfocus.com/, http://osvdb.org/, http://web.nvd.nist.gov/, http://secunia.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
pdf_data/st_filename XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf st_vid10486-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
  • EAL:
    • EAL2: 2
    • EAL2+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 10
    • ACM_AUT.1.1: 1
    • ACM_CAP.3: 1
    • ACM_CAP.4: 20
    • ACM_SCP.2: 7
  • ADO:
    • ADO_DEL.1: 1
    • ADO_DEL.2: 11
    • ADO_IGS.1: 13
  • ADV:
    • ADV_DVS.1: 1
    • ADV_FSP.1: 7
    • ADV_FSP.2: 12
    • ADV_HLD.1: 2
    • ADV_HLD.2: 17
    • ADV_IMP.1: 11
    • ADV_LLD.1: 18
    • ADV_RCR.1: 9
    • ADV_SPM.1: 15
  • AGD:
    • AGD_ADM.1: 22
    • AGD_USR.1: 16
  • ALC:
    • ALC_DVS.1: 9
    • ALC_LCD.1: 9
    • ALC_TAT.1: 6
  • ATE:
    • ATE_COV.2: 8
    • ATE_DPT.1: 7
    • ATE_FUN.1: 15
    • ATE_IND.2: 10
  • AVA:
    • AVA_MSU.2: 15
    • AVA_SOF.1: 10
    • AVA_VLA.2: 15
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 3
    • ALC_CMS.2: 3
    • ALC_DEL.1: 2
    • ALC_FLR.3: 5
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 4
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 33
    • FAU_GEN.1.1: 1
    • FAU_GEN.2: 16
    • FAU_GEN.2.1: 1
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 20
    • FAU_SAR.2: 15
    • FAU_STG.1: 21
    • FAU_STG.3: 15
    • FAU_STG.4: 9
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.2: 10
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 4
    • FDP_IFC.2: 9
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.2: 10
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 2
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_IFF.2.7: 1
    • FDP_ITC.2: 10
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 5
    • FDP_ITT.1.1: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 17
    • FIA_UAU.2.1: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 24
    • FIA_USB.1: 13
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 2
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_RCV.1: 8
    • FPT_RCV.1.1: 1
    • FPT_RCV.2: 11
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RCV.4: 9
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
    • FPT_SEP.3: 10
    • FPT_SEP.3.1: 1
    • FPT_SEP.3.2: 1
    • FPT_SEP.3.3: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TSE.1: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_TSE.1: 19
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 23
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_DSK: 17
  • FIA:
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.1.1: 2
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 5
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 2
    • FMT_REV.1: 5
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 1
    • FPT_TST.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADM_TRAINING: 4
    • A.AUDIT_REVIEW: 3
    • A.CONFIDENCE: 4
    • A.INVALIDATE: 3
    • A.NETWORK: 4
    • A.NOTIFY: 3
    • A.OS: 5
    • A.PHYSICAL: 4
    • A.PHYSICAL_LOC: 3
    • A.USR_TRAINING: 3
  • O:
    • O.ACCESS_HIST: 13
    • O.AUDIT: 13
    • O.AUTO_LOGOUT: 10
    • O.CMD_ACL: 7
    • O.CMD_LOG: 16
    • O.DAC: 8
    • O.DIG_SIGN: 3
    • O.ID_AUTH: 14
    • O.LABELLING: 8
    • O.LOCK: 8
    • O.MAC: 9
    • O.MAC_INTEGRITY: 10
    • O.MANAGE: 6
    • O.MESSAGING: 8
    • O.RECOVER: 9
    • O.REF_MONITOR: 8
    • O.RESOURCE_SHARE: 7
    • O.REUSE: 9
    • O.ROLES: 10
    • O.ROLE_MNG: 7
    • O.SELF_TEST: 8
  • OE:
    • OE.ACCOUNTABLE: 11
    • OE.AUDIT: 13
    • OE.ID_AUTH: 8
    • OE.NETWORK: 17
    • OE.PHYSICAL: 1
    • OE.TRAF_SEPARATION: 11
  • A:
    • A.AUTHENTICATION_DATA_PRIVATE: 4
    • A.AVAILABLE_BACKUP: 4
    • A.CRYPTOGRAPHIC_KEY_DESTRUCTION: 4
    • A.DOMAIN_SEPARATION: 3
    • A.MANAGEMENT: 4
    • A.NON_TECHNICAL_IDENTITY_VERIFICATION: 4
    • A.NO_MALEVOLENCE: 4
    • A.PROFICIENT_USERS: 5
    • A.SECURE_BACKUP: 3
    • A.TIME_SOURCE: 4
    • A.TRUSTED_SOFTWARE: 4
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUDIT: 12
    • O.AUTHORISATION: 11
    • O.CRYPOTOGRAPHIC_KEYS: 1
    • O.CRYPTOGRAPHIC_KEYS: 3
    • O.CRYPTOGRAPHIC_OPERATIONS: 9
    • O.DATA_TRANSFER: 4
    • O.EASE_OF_USE_USER: 8
    • O.EFFECTIVE_ADMINISTRATION: 3
    • O.ENCRYPTED_MEDIA: 3
    • O.PROTECT: 8
    • O.SECURE_RECOVERY: 8
  • OE:
    • OE.AUTH: 2
    • OE.AVAILABLE_BACKUP: 2
    • OE.CRYPTOGRAPHIC_KEY_DESTRUCTION: 4
    • OE.DOMAIN_SEPARATION: 4
    • OE.EASE_OF_USE_ADMIN: 3
    • OE.EASE_OF_USE_USER: 4
    • OE.MANAGED: 5
    • OE.NON_TECHNICAL_IDENTITY_VERIFICATION: 4
    • OE.SECURE_BACKUP: 4
    • OE.TIME_SOURCE: 5
    • OE.TRUSTED_SOFTWARE: 2
  • T:
    • T.ACCESS: 7
    • T.ALTERNATE_BOOT_PROCESS: 3
    • T.CONFIG: 1
    • T.CONFIG_MODIFICATION: 3
    • T.CORRUPT_AUDIT: 5
    • T.EASE_OF_USE_ADMIN: 4
    • T.EASE_OF_USE_USER: 3
    • T.EAVESDROP_TRANSIT: 3
    • T.PASSWORD_LOSS: 5
    • T.RECORD_ACTIONS: 6
    • T.RECOVERY_MASQUERADE: 5
    • T.REMOVE_DISK: 4
    • T.SYSTEM_ACCESS: 6
    • T.UNAUTHORISED_MODIFICATION: 7
    • T.UNAUTHORIZED_MODIFICATION: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 11
      • AES-256: 6
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 74
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • ISO:
    • ISO/IEC 15408: 10
  • RFC:
    • RFC 2156: 1
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 197: 2
  • NIST:
    • SP 800-90: 2
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5246: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Thales Norway AS
  • /CreationDate: D:20090430154245+02'00'
  • /Creator: PDFCreator Version 0.9.3
  • /Keywords:
  • /ModDate: D:20090430154245
  • /Producer: AFPL Ghostscript 8.13
  • /Subject:
  • /Title: XOmail Version 14.2 Security Target ed 10-public
  • pdf_file_size_bytes: 2346280
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 111
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different