{"product_id":10337,"v_id":10337,"product_name":"McAfee Policy Auditor 5.2, and ePolicy Orchestrator 4.5","certification_status":"Not Certified","certification_date":"2011-03-07T00:03:00Z","tech_type":"Enterprise Security Management","vendor_id":{"name":"McAfee, LLC","website":"www.mcafee.com"},"vendor_poc":"David Gerendas","vendor_phone":"949-860-3369","vendor_email":"David_Gerendas@McAfee.com","assigned_lab":{"cctl_name":"COACT, Inc. Labs"},"product_description":"<p>McAfee Policy Auditor 5.2 is an agent-based, purpose-built IT policy audit application that leverages the XCCDF and OVAL security standards to automate the processes required for internal and external IT audits.&nbsp; McAfee Policy Auditor evaluates the status of managed systems relative to audits that contain benchmarks. &nbsp;Benchmarks contain rules that describe the desired state of a managed system.&nbsp; Benchmarks are distributed with the TOE or imported into McAfee Benchmark Editor and, once activated, can be used by Policy Auditor. &nbsp;Benchmarks are written in the open-source XML standard formats Extensible Configuration Checklist Description Format (XCCDF) and the Open Vulnerability Assessment Language (OVAL). &nbsp;XCCDF describes what to check while OVAL specifies how to perform the check.</p>\r\n<p>ePO provides the user interface for the TOE via a GUI accessed from remote systems using web browsers.&nbsp; The ePO web dashboard represents policy compliance by benchmark. &nbsp;Custom reports can be fully automated, scheduled, or exported.&nbsp; ePO requires users to identify and authenticate themselves before access is granted to any data or management functions.&nbsp; Audit records are generated to record configuration changes made by users.&nbsp; The audit records may be reviewed via the GUI.</p>\r\n<p>Based upon per-user permissions, users may configure the systems to be audited for policy compliance (the &ldquo;managed systems&rdquo;) along with the benchmarks to be checked.&nbsp; The Policy Auditor Agent Plug-In executing on the managed systems performs the policy audit and returns the results to Policy Auditor.&nbsp; Policy Auditor allows you to conduct policy audits on various releases of the following operating systems:</p>\r\n<p style=\"padding-left: 30px;\">A)&nbsp; Microsoft Windows</p>\r\n<p style=\"padding-left: 30px;\">B)&nbsp;&nbsp;Macintosh OS X</p>\r\n<p style=\"padding-left: 30px;\">C)&nbsp; HP-UX</p>\r\n<p style=\"padding-left: 30px;\">D)&nbsp; Solaris</p>\r\n<p style=\"padding-left: 30px;\">E)&nbsp; Red Hat Linux</p>\r\n<p style=\"padding-left: 30px;\">F)&nbsp; AIX</p>\r\n<p>Users can review the results of the policy audits via ePO.&nbsp; Access to this information is again limited by per-user permissions.</p>\r\n<p>Communication between the distributed components of the TOE is protected from disclosure and modification by cryptographic functionality provided by the operational environment.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. &nbsp;The evaluation demonstrated that McAfee Corporation&rsquo;s McAfee Policy Auditor 5.2 and ePolicy Orchestrator 4.5 products meet the security requirements contained in the Security Target, version 2.0.2, dated February 2, 2011.</p>\r\n<p>The criteria against which McAfee Corporation&rsquo;s McAfee Policy Auditor 5.2 and ePolicy Orchestrator 4.5 products were judged is described in the Common Criteria for Information Technology Security Evaluation, Version 3.1. &nbsp;The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1. &nbsp;The COACT, Inc. CAFE Lab determined that the evaluation assurance level (EAL) for McAfee Corporation&rsquo;s McAfee Policy Auditor 5.2 and ePolicy Orchestrator 4.5 products are EAL 2 + ALC_FLR.2. The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target, version 2.0.2, dated February 2, 2011.</p>\r\n<p>A Validator on behalf of the CCEVS Validation Body monitored the evaluation carried out by the COACT, Inc. CAFE Lab. &nbsp;The evaluation was completed in December 2010. &nbsp;Results of the evaluation and associated validation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report.</p>","environmental_strengths":"<p>The TOE&rsquo;s Security Functions are:</p>\r\n<p><strong>Policy Audits</strong></p>\r\n<p class=\"Default\">The TOE evaluates the status of managed systems relative to audits that contain benchmarks. &nbsp;Benchmarks contain rules that describe the desired state of a managed system.&nbsp; Benchmarks are received through or imported into McAfee Benchmark Editor and, once activated, can be used by Policy Auditor. &nbsp;Benchmarks are written in the open-source XML standard formats Extensible Configuration Checklist Description Format (XCCDF) and the Open Vulnerability Assessment Language (OVAL). XCCDF describes what to check while OVAL specifies how to perform the check.&nbsp;</p>\r\n<p class=\"NormalBold\"><strong>&nbsp;Identification and Authentication (I&amp;A) </strong></p>\r\n<p>Users must log in to ePO with a valid user name and password supplied via a GUI before any access is granted by the TOE to TOE functions or data.&nbsp; When the credentials are presented by the user, ePO determines if the user name is defined and enabled.&nbsp; If not, the login process is terminated and the login GUI is redisplayed.</p>\r\n<p>The supplied password is passed to Windows for validation.&nbsp; If it is successful, the TOE grants access to additional TOE functionality.&nbsp; If the validation is not successful, the login GUI is redisplayed.&nbsp; Note that all the Windows I&amp;A protection mechanisms (e.g., account lock after multiple consecutive login failures) that may be configured still apply since Windows applies those constraints when performing the validation.</p>\r\n<p>Upon successful login, the Global Administrator status and the union of all the permissions from the permission sets from the user account configuration are bound to the session.&nbsp; Those attributes remain fixed for the duration of the session (until the user logs off).&nbsp; If the attributes for a logged in user are changed, those changes will not be bound to a session until the next login by the user.&nbsp;</p>\r\n<p class=\"Default\"><strong>Management </strong></p>\r\n<p>The TOE&rsquo;s Management Security Function provides administrator support functionality that enables a user to configure and manage TOE components.&nbsp; Management of the TOE may be performed via the ePO GUI.&nbsp; Management permissions are defined per-user.</p>\r\n<p>The TOE provides functionality to manage the following:</p>\r\n<p style=\"padding-left: 30px;\">A) &nbsp;ePO User Accounts,</p>\r\n<p style=\"padding-left: 30px;\">B)&nbsp; Permission Sets,</p>\r\n<p style=\"padding-left: 30px;\">C)&nbsp; Audit Log,</p>\r\n<p style=\"padding-left: 30px;\">D)&nbsp; Event Log,</p>\r\n<p style=\"padding-left: 30px;\">E)&nbsp; Notifications,</p>\r\n<p style=\"padding-left: 30px;\">F)&nbsp; Event Filtering,</p>\r\n<p style=\"padding-left: 30px;\">G)&nbsp; System Tree,</p>\r\n<p style=\"padding-left: 30px;\">H)&nbsp; Tags,</p>\r\n<p style=\"padding-left: 30px;\">I)&nbsp; Product Policies,</p>\r\n<p style=\"padding-left: 30px;\">J)&nbsp; Queries,</p>\r\n<p style=\"padding-left: 30px;\">K)&nbsp; Dashboards,</p>\r\n<p style=\"padding-left: 30px;\">L)&nbsp; Benchmarks,</p>\r\n<p style=\"padding-left: 30px;\">M)&nbsp; Policy Auditor,</p>\r\n<p style=\"padding-left: 30px;\">N)&nbsp;&nbsp;Policy Audits, and</p>\r\n<p style=\"padding-left: 30px;\">O)&nbsp;&nbsp;Waivers</p>\r\n<p class=\"NormalBold\"><strong>Audit </strong></p>\r\n<p>The Audit Log maintains a record of ePO user actions. &nbsp;The auditable events are specified in the Audit Events and Details table in the FAU_GEN.1 section of the Security Target.</p>\r\n<p>The Audit Log entries display in a sortable table. For added flexibility, you can also filter the log so that it only displays failed actions, or only entries that are within a certain age.&nbsp; The Audit Log displays seven columns:</p>\r\n<p style=\"padding-left: 30px;\">A)&nbsp; Action &mdash; The name of the action the ePO user attempted.</p>\r\n<p style=\"padding-left: 30px;\">B)&nbsp;&nbsp;Completion Time &mdash; The time the action finished.</p>\r\n<p style=\"padding-left: 30px;\">C) &nbsp;Details &mdash; More information about the action.</p>\r\n<p style=\"padding-left: 30px;\">D)&nbsp; Priority &mdash; Importance of the action.</p>\r\n<p style=\"padding-left: 30px;\">E)&nbsp; Start Time &mdash; The time the action was initiated.</p>\r\n<p style=\"padding-left: 30px;\">F)&nbsp; Success &mdash; Specifies whether the action was successfully completed.</p>\r\n<p style=\"padding-left: 30px;\">G)&nbsp; User Name &mdash; User name of the logged-on user account that was used to take the action.</p>\r\n<p class=\"Default\">Audit Log entries can be queried by a Global Administrator or users with the &ldquo;View Audit Log&rdquo; permission. &nbsp;The Audit Log entries are automatically purged based upon a Global Administrator-configured age.&nbsp; Other than automatic purging, no mechanisms are provided for users to modify or delete entries.&nbsp; The audit log entries are stored in the database; if space is exhausted, new entries are discarded.</p>\r\n<p class=\"NormalBold\"><strong>System Information Import</strong></p>\r\n<p>ePO offers integration with both Active Directory and NT domains as a source for systems, and even (in the case of Active Directory) as a source for the structure of the System Tree.</p>\r\n<p>If your network runs Active Directory, you can use Active Directory synchronization to create, populate, and maintain part or all of the System Tree with Active Directory synchronization.&nbsp; Once defined, the System Tree is updated with any new systems (and subcontainers) in your Active Directory.</p>\r\n<p>There are two types of Active Directory synchronization (systems only and systems and structure). Which one you use depends on the level of integration you want with Active Directory.</p>\r\n<p>With each type, you control the synchronization by selecting whether to:</p>\r\n<p style=\"padding-left: 30px;\">A)&nbsp; Deploy agents automatically to systems new to ePolicy Orchestrator.</p>\r\n<p style=\"padding-left: 30px;\">B)&nbsp; Delete systems from ePolicy Orchestrator (and remove their agents) when they are deleted from Active Directory.</p>\r\n<p style=\"padding-left: 30px;\">C)&nbsp; Prevent adding systems to the group if they exist elsewhere in the System Tree.</p>\r\n<p style=\"padding-left: 30px;\">D)&nbsp; Exclude certain Active Directory containers from the synchronization. These containers and their systems are ignored during synchronization.</p>\r\n<p>ePO may also use your NT domains as a source for populating your System Tree. When you synchronize a group to an NT domain, all systems from the domain are put in the group as a flat list. &nbsp;You can manage those systems in a single group, or you can create subgroups for more granular organizational needs.</p>\r\n<p>When systems are imported, their placement in the System Tree may be automatically determined by criteria-based sorting of two forms;&nbsp; a) IP address sorting may be used if IP address organization coincides with your management needs for the System Tree, or b)&nbsp; Tag based sorting may be used to sort systems based on tags associated with them.</p>\r\n<p>The server has three modes for criteria-based sorting:</p>\r\n<p style=\"padding-left: 30px;\">A)&nbsp; Disable System Tree sorting</p>\r\n<p style=\"padding-left: 30px;\">B)&nbsp; Sort systems on each agent-server communication &mdash; Systems are sorted again at each agent-server communication. &nbsp;When you change sorting criteria on groups, systems move to the new group at their next agent-server communication.</p>\r\n<p style=\"padding-left: 30px;\">C)&nbsp; Sort systems once &mdash; Systems are sorted at the next agent-server communication and marked to never be sorted again.</p>\r\n<p>&nbsp;</p>","features":[]}