{"product_id":10332,"v_id":10332,"product_name":"McAfee Vulnerability Manager 6.8","certification_status":"Not Certified","certification_date":"2011-01-31T00:01:00Z","tech_type":"Wireless Monitoring","vendor_id":{"name":"McAfee, LLC","website":"www.mcafee.com"},"vendor_poc":"David Gerendas","vendor_phone":"949-860-3369","vendor_email":"david_gerendas@mcafee.com","assigned_lab":{"cctl_name":"COACT, Inc. Labs"},"product_description":"<p><strong>Product Description<strong>:</strong></strong></p>\r\n<p>The TOE is a Vulnerability Management System that scans specified targets for vulnerabilities and mis-configurations. It provides a management interface to configure the system and generate reports regarding the results of the scans. &nbsp;</p>\r\n<p>The TOE consists of the following components:</p>\r\n<p>&nbsp;</p>\r\n<ol>\r\n<li>The Enterprise Manager provides authorized users with access to the TOE through their Web browsers. It allows them to manage and run the TOE from anywhere on the network. Access is protected by user identification and authentication.</li>\r\n<li>One or more Scan Engines scan the network environment. Depending on the logistics and size of your network, you may need more than one Scan Engine to scan the network. The Scan Engine performs identification, interrogation, and vulnerability assessment of remote computer systems. </li>\r\n<li>The API Service provides an interface for Enterprise Manager to store data into and retrieve data from the Foundstone Database. This interaction uses SOAP over SSL. </li>\r\n<li>The Data Sync Service enables Vulnerability Manager to import asset information from McAfee&rsquo;s ePolicy Orchestrator (ePO) enterprise management system or an LDAP directory such as Microsoft Active Directory. This integration permits Vulnerability Manager to learn about assets through a mechanism other than discovery scans.</li>\r\n<li>The Foundstone Database is the data repository for the Vulnerability Manager system. It uses Microsoft SQL Server to store everything from scan settings and results to user accounts and Scan Engine settings. It contains all of the information needed to track organizations and workgroups, manage users and groups, run scans, and generate reports. </li>\r\n<li>The Report Server is responsible for generating reports requested by authorized users. It retrieves scan results from the Foundstone Database, prepares the report, and saves it for future review. &nbsp;All communication between distributed components uses a trusted channel to protect the integrity and confidentiality of the data during transit. The TOE depends on cryptographic and protocol functionality provided by the IT environment for these secure channels.</li>\r\n</ol>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that McAfee Corporation&rsquo;s Vulnerability Manager Version 6.8 Security Target, Version 2.4, January 11, 2011 meets the security requirements contained in the Security Target.</p>\r\n<p>The criteria against which McAfee Corporation&rsquo;s Vulnerability Manager Version 6.8 Security Target Version 2.4, January 11, 2011 was judged is described in the Common Criteria for Information Technology Security Evaluation, Version 3.1. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1. The COACT, Inc. CAFE Lab determined that the evaluation assurance level (EAL) for the McAfee Corporation&rsquo;s Vulnerability Manager Version 6.8 Security Target Version 2.4, January 11, 2011 is EAL 2 augmented with ALC_FLR.2. The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.</p>\r\n<p>A Validator on behalf of the CCEVS Validation Body monitored the evaluation carried out by the COACT, Inc. CAFE Lab. The evaluation was completed in December 2010. Results of the evaluation and associated validation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report.</p>","environmental_strengths":"<p>The TOE&rsquo;s Security Functions are:</p>\r\n<p class=\"Default\"><strong>Scanning </strong></p>\r\n<p class=\"Default\">The TOE scans designated systems to detect known vulnerabilities on those systems. Results of the scans are stored in the database (the DBMS is in the IT Environment), and reports based upon completed scans may be retrieved via the GUI interface of the Enterprise Manager.</p>\r\n<p class=\"NormalBold\"><strong>Identification and Authentication (I&amp;A) </strong></p>\r\n<p class=\"Default\">The TOE requires users to identify and authenticate themselves before accessing the TOE software or before viewing any TSF data or configuring any portion of the TOE. No action can be initiated before proper identification and authentication. Each TOE user has security attributes associated with their user account that defines the functionality the user is allowed to perform.</p>\r\n<p class=\"Default\">When interacting with the TOE via the Enterprise Manager GUI, I&amp;A is performed by the TOE. On all three component systems, I&amp;A for local login to the operating system (i.e., via a local console) is performed by Windows (IT Environment).</p>\r\n<p class=\"Default\"><strong>Management </strong></p>\r\n<p class=\"Default\">The TOE&rsquo;s Management Security Function provides administrator support functionality that enables a human user to configure and manage TOE components.&nbsp; Management of the TOE may be performed via the Enterprise Manager. All user types may use the Enterprise Manager.</p>\r\n<p class=\"Default\">The TOE provides the following management functions:</p>\r\n<ol>\r\n<li>User management, </li>\r\n<li>Root organization management, </li>\r\n<li>Workgroup management, </li>\r\n<li>Scan Engine management, </li>\r\n<li>Asset management, </li>\r\n<li>Scan management, </li>\r\n<li>Report management, </li>\r\n<li>Known vulnerability management. </li>\r\n</ol>\r\n<p class=\"Default\"><strong>Audit </strong></p>\r\n<p class=\"Default\">The TOE&rsquo;s Audit Security Function provides auditing of management actions performed by administrators.</p>\r\n<p class=\"Default\"><strong>&nbsp;Asset Data Import </strong></p>\r\n<p class=\"Default\">The TOE may be configured to import data about assets from LDAP servers or McAfee ePO. The value of this functionality is that the information about the assets may be more accurate or complete than the information obtained from scans.</p>","features":[]}