McAfee HARDWARE 1.4 Guia de Instalação Página 2

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 61
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 1
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 2 of 61
Table of Contents
1 INTRODUCTION ............................................................................................... 6
1.1 IDENTIFICATION ......................................................................................................................... 6
1.1.1 TOE Identification ................................................................................................................... 6
1.1.2 ST Identification ...................................................................................................................... 6
1.2 TOE OVERVIEW ....................................................................................................................... 6
1.2.1 Anti-Virus................................................................................................................................. 7
1.2.2 Anti-Spam ............................................................................................................................... 7
1.2.3 Compliance ............................................................................................................................. 7
1.2.4 Quarantine Management ........................................................................................................ 7
1.2.5 Secure Web Delivery .............................................................................................................. 7
1.2.6 Action and Remediation .......................................................................................................... 8
1.3 DOCUMENT CONVENTIONS ........................................................................................................ 8
1.4 DOCUMENT TERMINOLOGY ........................................................................................................ 8
1.4.1 ST Specific Terminology ......................................................................................................... 8
1.4.2 Acronyms .............................................................................................................................. 11
1.5 TOE DESCRIPTION OVERVIEW .............................................................................................12
1.6 ARCHITECTURE DESCRIPTION .................................................................................................12
1.6.1 Context .................................................................................................................................. 12
1.6.2 Virtual hosts .......................................................................................................................... 13
1.6.3 Clustering .............................................................................................................................. 13
1.6.4 MEG Operating System ........................................................................................................ 13
1.7 PHYSICAL BOUNDARIES ...........................................................................................................14
1.7.1 Hardware Components ......................................................................................................... 14
1.7.2 Software Components .......................................................................................................... 15
1.7.3 Guidance Documents ........................................................................................................... 16
1.8 LOGICAL BOUNDARIES ............................................................................................................16
1.8.1 Security Management ........................................................................................................... 17
1.8.2 Identification and Authentication ........................................................................................... 18
1.8.3 Audit and Alerts ..................................................................................................................... 18
1.8.4 Cryptographic Operations ..................................................................................................... 19
1.9 ITEMS EXCLUDED FROM THE TOE............................................................................................19
2 CC CONFORMANCE CLAIM .............................................................................20
3 TOE SECURITY PROBLEM DEFINITION ............................................................21
3.1 ASSUMPTIONS ........................................................................................................................21
3.2 THREATS ................................................................................................................................21
3.3 ORGANIZATIONAL SECURITY POLICY ........................................................................................22
4 SECURITY OBJECTIVES ..................................................................................23
4.1 SECURITY OBJECTIVES FOR THE TOE......................................................................................23
4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT .......................................................................24
4.3 MAPPING OF SECURITY PROBLEM DEFINITION TO SECURITY OBJECTIVES ..................................24
4.4 RATIONALE FOR THREAT COVERAGE .......................................................................................25
4.5 RATIONALE FOR ORGANIZATIONAL SECURITY POLICY COVERAGE .............................................26
Vista de página 1
1 2 3 4 5 6 7 ... 60 61

Comentários a estes Manuais

Sem comentários