{"product_id":10291,"v_id":10291,"product_name":"Microsoft Windows Vista Enterprise; Windows Server 2008 Standard Edition; Windows Server 2008 Enterprise Edition; Windows Server 2008 Datacenter Edition","certification_status":"Not Certified","certification_date":"2009-08-31T00:08:00Z","tech_type":"Operating System","vendor_id":{"name":"Microsoft Corporation","website":"https://www.microsoft.com"},"vendor_poc":"Tim Myers","vendor_phone":"425-707-9422","vendor_email":"timmyers@microsoft.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>Microsoft Windows Vista and Windows Server 2008 are preemptive multitasking, multiprocessor, and multi-user operating systems.&nbsp; In general, operating systems provide users with a convenient interface to manage underlying hardware.&nbsp; They control the allocation and manage computing resources such as processors, memory, and Input/Output (I/O) devices.&nbsp; Windows Vista and Windows Server 2008 expand these basic operating system capabilities to controlling the allocation and managing higher level IT resources including security principals (user and machine accounts), files, printing objects, services, windowstation, desktops, cryptographic keys, network ports/traffics, directory objects, and web content. Multi-user operating systems such as Windows Vista and Windows Server 2008, keep track of which user is using which resource, grant resource requests, account for resource usage, and mediate conflicting requests from different programs and users.</p>\r\n<p>The TOE has been evaluated for the following hardware configurations:</p>\r\n<ul>\r\n<li>Dell Optiplex 755, 3.0 GHz Intel Core 2 Duo E8400, 64-bit</li>\r\n<li>Dell PowerEdge SC1420, 3.6 GHz Intel Xeon Processor (1 CPU), 32-bit</li>\r\n<li>Dell PowerEdge 1800, 3.2 GHz Intel Xeon Processor (1 CPU), 32-bit</li>\r\n<li>Dell PowerEdge 2970, 1.7 GHz quad core AMD Opteron 2344 Processor (2 CPUs), 64-bit</li>\r\n<li>HP Proliant DL385 G5, 2.1 GHz quad core AMD Opteron 2352 Processor (2 CPUs), 64-bit</li>\r\n<li>HP Proliant DL385, 2.6 GHz AMD Opteron 252 Processor (2 CPUs), 64-bit</li>\r\n<li>Unisys ES7000 Model 7600R, 2.6 GHz Intel Xeon (6-core) (8 CPUs), 64-bit</li>\r\n<li>GemPlus GemPC Twin USB smart cards</li>\r\n</ul>\r\n<p>&nbsp;</p>\r\n<p class=\"aBody\">Windows Vista and Windows Server 2008 are operating systems that supports both workstation and server installations. The evaluation includes four product variants of Windows Vista and Windows Server 2008:</p>\r\n<ul>\r\n<li>Microsoft Windows Vista Enterprise Edition (32-bit and 64-bit versions)</li>\r\n<li>Microsoft Windows Server 2008 Standard Edition (64-bit version)</li>\r\n<li>Microsoft Windows Server 2008 Enterprise Edition (64-bit version)</li>\r\n<li>Microsoft Windows Server 2008 Datacenter</li>\r\n</ul>\r\n<p class=\"aBody\">The server products additionally provide Domain Controller (DC) features including the Active Directory and Kerberos Key Distribution Center (KDC).&nbsp; The server products in the evaluation also provide Internet Information Services (IIS), Certificate Services, HTTP RPC Proxy, File Replication, Directory Replication, Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), Distributed File System (DFS) service, and Removable Storage Manager.&nbsp; All variants include the same security features.&nbsp;&nbsp;&nbsp; The primary difference between the variants is the number of users and types of services they are intended to support.</p>\r\n<p>Windows Vista is suited for business desktops and notebook computers (note that only desktops are included in the evaluated configuration); it is the workstation product.&nbsp;&nbsp;</p>\r\n<p>Designed for departmental and standard workloads, Windows Server 2008 Standard delivers intelligent file and printer sharing; secure connectivity based on Internet technologies, and centralized desktop policy management.&nbsp;</p>\r\n<p>&nbsp;</p>\r\n<p>Windows Server 2008 Enterprise differs from Windows Server 2008 Standard primarily in its support for high-performance servers for greater load handling. These capabilities provide reliability that helps ensure systems remain available.&nbsp;</p>\r\n<p>&nbsp;</p>\r\n<p>Windows Server 2008 Datacenter provides the necessary scalable and reliable foundation to support mission-critical solutions for databases, enterprise resource planning software, high-volume, real-time transaction processing, and server consolidation.</p>\r\n<p>&nbsp;</p>\r\n<p>The collection of additional features that were not available in a previous Windows operating system CC evaluation, but are included in this evaluation of Windows Vista and Windows Server 2008 are as follows:</p>\r\n<p>&nbsp;</p>\r\n<ul>\r\n<li><strong>Address Space Load Randomization</strong> &ndash; To address buffer overflows, the Address Space Load Randomization (ASLR) feature makes it difficult for nefarious software to predict where interfaces are located in memory because APIs are located by loading system DLLs and executables at a different location every time the system boots.</li>\r\n<li><strong>Code Integrity Verification</strong> - Kernel-mode code signing (KMCS) prevents kernel-mode device drivers from loading unless they are published and digitally signed by developers who have been vetted by one of a handful of trusted certificate authorities (CAs).</li>\r\n<li><strong>Data Protection Enhancements</strong> -The Encrypting File System, provides user-based file and directory encryption and has been enhanced to allow storage of encryption keys on smart cards, providing better protection of encryption keys. The new BitLocker Drive Encryption enterprise feature adds drive-level data protection. On a computer with appropriate hardware (e.g, Trusted Platform Module (TPM) support), BitLocker Drive Encryption provides full volume encryption of the system volume, including Windows system files and the hibernation file, which helps protect data from being compromised on a lost or stolen machine and helps assure a secure boot.</li>\r\n<li><strong>Kernel Transaction Manager </strong>- Windows Vista and Windows Server 2008 include a kernel-mode transaction engine that enables applications to use atomic transactions on resources to facilitate improved error recovery.</li>\r\n<li><strong>Mandatory Integrity Control</strong> - In addition to Discretionary Access Control (DAC), Vista and Windows Server 2008 provide Mandatory Integrity Control (MIC). MIC uses integrity levels and a mandatory policy to evaluate access. Processes and securable objects (e.g., files) are assigned integrity levels that determine their levels of protection or access.</li>\r\n<li><strong>User Account Control</strong> - User Account Control (UAC) enables users to perform common tasks as non-administrators, called standard users, and as administrators without having to switch users, log off, or use Run As. A standard user account is synonymous with a user account in Windows Vista and Windows Server 2008. User accounts that are members of the local Administrators group will run most applications as a standard user.</li>\r\n</ul>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance with the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The criteria against which the Windows Vista and Windows Server 2008 Target of Evaluation (TOE) was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 2.3.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 2.3.&nbsp; Science Applications International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the product is EAL 4 augmented with ALC_FLR.3, AVA_VLA.3.&nbsp; The product, when configured as identified in the Microsoft Windows Common Criteria Evaluation Document, version 6, July 29, 2009, satisfies all of the security functional requirements stated in the Windows Vista and Windows Server 2008 Security Target (Version 1.0). The project underwent three Validation Oversight Panel (VOR) panel reviews.&nbsp; The evaluation was completed in August 2009.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report, (report number CCEVS-VR-VID10291-2009, dated 31 August 2009) prepared by CCEVS.</p>","environmental_strengths":"<p>Windows Vista and Windows Server 2008 support the following security functions:</p>\r\n<p>&nbsp;</p>\r\n<ul>\r\n<li><strong>Security Audit</strong> &ndash; Windows Vista and Windows Server 2008 have the ability to collect audit data, review audit logs, protect audit logs from overflow, and restrict access to audit logs.&nbsp; Audit information generated by the system includes date and time of the event, user who caused the event to be generated, computer where the event occurred, and other event specific data.&nbsp; Authorized administrators can review audit logs. </li>\r\n<li><strong>Identification and Authentication</strong> &ndash; Windows Vista and Windows Server 2008 require each user to be identified and authenticated (using password or smart card) prior to performing any functions.&nbsp; An interactive user invokes a trusted path in order to protect his I&amp;A information.&nbsp; Windows Vista and Windows Server 2008 maintain databases of accounts including their identities, authentication information, group associations, and privilege and logon rights associations.&nbsp; Windows Vista and Windows Server 2008 include a set of account policy functions that include the ability to define minimum password length, number of failed logon attempts, duration of lockout, and password age.</li>\r\n<li><strong>Security Management</strong> &ndash; Windows Vista and Windows Server 2008 includes a number of functions to manage policy implementation.&nbsp; Policy management is controlled through a combination of access control, membership in administrator groups, and privileges.&nbsp; </li>\r\n<li><strong>User Data Protection</strong> &ndash; Windows Vista and Windows Server 2008 protect user data by enforcing several access control policies (Discretionary Access Control, Mandatory Integrity Control, Encrypting File System, WEBUSER and web content provider access control) and several information flow policies (IPSec filter information flow control, Windows Firewall); and, object and subject residual information protection.&nbsp; Windows Vista and Windows Server 2008 use access control methods to allow or deny access to objects, such as files, directory entries, printers, and web content.&nbsp; Windows Vista and Windows Server 2008 uses information flow control methods to control the flow of IP traffic and packets. It authorizes access to these resource objects through the use of security descriptors (SDs, which are sets of information identifying users and their specific access to resource objects), web permissions, IP filters, and port mapping rules. Windows Vista and Windows Server 2008 also protects user data by ensuring that resources exported to user-mode processes do not have any residual information.</li>\r\n<li><strong>Cryptographic Protection - </strong>Windows Vista and Windows Server 2008 provide FIPS-140-2 validated cryptographic functions that support encryption/decryption, cryptographic signatures, cryptographic hashing, cryptographic key agreement, and random number generation. The TOE additionally provides support for public keys, credential management and certificate validation functions and provides support for the National Security Agency&rsquo;s Suite B crypto algorithms. The TOE also provides extensive auditing support in support of crypto requirements, support for replaceable random number generators, and a key isolation service designed to limit the potential exposure of secret and private keys.</li>\r\n<li><strong>Protection of TOE Security Functions</strong> &ndash; Windows Vista and Windows Server 2008 provides a number of features to ensure the protection of TOE security functions.&nbsp;&nbsp; Windows Vista and Windows Server 2008 protects against unauthorized data disclosure and modification by using a suite of Internet standard protocols including IPSec and ISAKMP.&nbsp; Windows Vista and Windows Server 2008 ensure process isolation security for all processes through private virtual address spaces, execution context and security context.&nbsp; The Windows Vista and Windows Server 2008 data structures defining process address space, execution context, memory protection, and security context are stored in protected kernel-mode memory. BitLocker protects hard drive data by providing Secure Startup (integrity checking of early boot components) and Full Volume Encryption (FVE). FVE protects data by encrypting entire disk volumes; in the case of the Windows operating system volume, this includes the swap and hibernation files. Secure Startup provides integrity checking of the early boot components, ensuring that FVE decryption is performed only if those components are found to be unchanged and the encrypted drive is located in the original computer.</li>\r\n<li><strong>Resource Utilization</strong> &ndash; Windows Vista and Windows Server 2008 can limit the amount of disk space that can be used by an identified user or group on a specific disk volume.&nbsp; Each volume has a set of properties that can be changed only by a member of the administrator group.&nbsp; These properties allow an authorized administrator to enable quota management, specify quota thresholds, and select actions when quotas are exceeded.</li>\r\n<li><strong>Session Locking</strong> &ndash; Windows Vista and Windows Server 2008 provides the ability for a user to lock their session immediately or after a defined interval.&nbsp; It constantly monitors the mouse and keyboard for activity and locks the workstation after a set period of inactivity.&nbsp; Windows Vista and Windows Server 2008 allow an authorized administrator to configure the system to display a logon banner that describes usage policies before the logon dialog.</li>\r\n</ul>","features":[]}