McAfee HARDWARE 1.4 Guia de Instalação Página 18

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 61
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 17
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 18 of 61
Administrator functions can be managed within the internal network (Out of band management) through
an administrator management computer, or remotely in an encrypted form via HTTPS. The administrator
management computer is a general purpose computing device, and requires only a browser to
communicate locally with the TOE appliance. The browser required for administrator management of the
TOE is either Microsoft Internet Explorer 7.0, 8.0 or 9.0, or Firefox 3.5, 3.6 or 4.0. The session uses
HTTPS with Transport Layer Security (TLS) v1 encryption, using AES with cryptographic key size of 128-
bits. The SSLv2/v3 protocols are explicitly disabled. ActiveX is enabled.
The Administrator management computer is only used for input and display purposes: the functions
discussed herein are all implemented on the MEG TOE Appliance.
TOE security functions cannot be bypassed. All access to TOE security functions requires Administrator
level access to the TOE. The McAfee MEG authentication process ensures that a valid username and
password combination must be entered prior to allowing any changes to TSF settings.
1.8.2 Identification and Authentication
The McAfee MEG TOE requires that administrators of the TOE are identified and authenticated prior to
gaining access to TSF data. Traffic through the device is evaluated based on the core functionality of the
TOE, however, the network users of the traffic which travels through the appliance do not directly interact
with the TOE appliance. These network users are only identified to the appliance by IP address, referring
URL or email address. The TOE is transparent to network users passing traffic through the appliance.
The MEG Operating System supports the identification and password based authentication and requires
that Administrators submit username and password prior to gaining access to the TOE appliance.
The MEG Appliance provides role based access controls to allow appliance Administrators to establish
multiple roles with configurable access options to assist in managing various functions within the
appliance.
The TOE supports the use of external authentication servers such as LDAP. However, the use of external
authentication servers is not included in the evaluated configuration.
The use of a firewall in conjunction with the McAfee MEG TOE is recommended. However, this is not part
of the evaluated configuration and is not required to meet the Security Functional Requirements claimed
in this Security Target.
Remote access cards may be used for remote administration for Enterprise level deployments. However,
the evaluated configuration does not include this option.
1.8.3 Audit and Alerts
The McAfee MEG TOE supports full logging of all Administrator actions that result in changes to the TSF.
In addition, detailed audit logs are produced that identify TSF activities, traffic scans completed, and
updates made to.dat signature files. Audit generation and related audit security functions are provided by
the MEG Operating System. Audit Management features are provided within the product software to allow
for detailed review of audit records. There is also a provision within the TOE for exporting log records to
an external server.
The TOE utilizes policies that enforce action to be taken for specified events. Based on the configuration
of these policies, alerts may be specified that will notify the Administrator via email of events that match
the parameters of the policy.
Alerts can be configured for specific Viruses/Malware/Spyware identified in scanning, content filtering
Vista de página 17
1 2 ... 13 14 15 16 17 18 19 20 21 22 23 ... 60 61

Comentários a estes Manuais

Sem comentários