{"product_id":10486,"v_id":10486,"product_name":"McAfee Endpoint Encryption 6.2 with ePolicy Orchestrator 4.6","certification_status":"Not Certified","certification_date":"2012-09-10T00:09:00Z","tech_type":"Sensitive Data Protection","vendor_id":{"name":"McAfee, LLC","website":"www.mcafee.com"},"vendor_poc":"Dwight Colby","vendor_phone":"651-628-1571","vendor_email":"dwight_colby@mcafee.com","assigned_lab":{"cctl_name":"COACT, Inc. Labs"},"product_description":"<p>McAfee Endpoint Encryption for PC is a Personal Computer (PC) security system that provides data at rest protection, preventing the data stored on a PC from being read or used by an unauthorized person.&nbsp; It combines single sign-on user access control with transparent full disk encryption of HDD/SSD storage media to offer effective security for PCs running the Microsoft Windows operating system.</p>\r\n<p>Integration with McAfee ePolicy Orchestrator (ePO) eases agent deployment, management, and reporting.&nbsp;</p>\r\n<p>Communication between the Endpoint and ePO is secured using McAfee Agent.</p>\r\n<p>ePO provides the management user interface for the TOE via a GUI accessed from remote systems using web browsers.&nbsp; User and Machine policies can be created, edited and deployed from ePO.&nbsp; Manual recovery allows users who have lost or compromised their logon credentials to regain secure access to their Endpoint PC.&nbsp;</p>\r\n<p>ePO requires users to identify and authenticate themselves before access is granted to any data or management functions.&nbsp;</p>\r\n<p>Audit records from both ePO and the Endpoints managed by it may be reviewed via the ePO GUI using fully customizable reports of which there are many built into the product.</p>\r\n<p>McAfee Endpoint Encryption for PC prevents the data stored on a PC&rsquo;s HDD/SSD storage media from being read or used by an unauthorized person.&nbsp; Non-removable and eSATA hard drives can be encrypted.&nbsp; USB, FireWire or PCMCIA connected media cannot be encrypted.&nbsp;</p>\r\n<p>By necessity, the boot record and certain non-security relevant configuration data must remain in plaintext, but everything else on the storage media is encrypted.&nbsp; In simple terms, the McAfee Endpoint Encryption client software takes control of a user&rsquo;s storage media away from the operating system.&nbsp; The McAfee Endpoint Encryption client software encrypts data written to the storage media, and decrypts data read from it.&nbsp; If the storage media is read directly, one would find only encrypted data, even in the Windows swap file and temporary file areas.&nbsp;</p>\r\n<p>ePO provides the functionality to securely deploy, configure and manage the McAfee Endpoint Encryption Client usage policies.&nbsp; A policy is a set of rules that determine how the McAfee Endpoint Encryption Client software functions on the user&rsquo;s computer.</p>\r\n<p>In order to operate in compliance with this Security Target, the TOE Endpoint must be installed and operated in a certain manner.&nbsp; This is referred to as its Common Criteria mode of operation, or CC mode for short.&nbsp; CC mode is defined as follows:</p>\r\n<ul>\r\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Endpoint is installed in FIPS mode according to the TOE administration documentation</li>\r\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ePO and McAfee Agent are both installed in FIPS mode according to the TOE administration documentation</li>\r\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Invalidate user&rsquo;s password after ten or less successive unsuccessful logon attempts</li>\r\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Encryption of all hard disks</li>\r\n<li>&middot;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Users forced to logon with Preboot Authentication</li>\r\n</ul>\r\n<p>The client software is installed on the client system.&nbsp; After the installation, the system synchronizes with ePO and acquires the user data, token data, and Pre-Boot graphics.&nbsp; When this is complete, the user authenticates and logs on through the Pre-Boot environment, which loads the operating system, and uses the system as normal.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and procedures.&nbsp; The evaluation demonstrated that the McAfee Endpoint Encryption for PC 6.2 with McAfee ePolicy Orchestrator 4.6 meets the security requirements contained in the Security Target.</p>\r\n<p>The criteria against which the McAfee Endpoint Encryption for PC 6.2 with McAfee ePolicy Orchestrator 4.6 was judged is described in the Common Criteria for Information Technology Security Evaluation, Version 3.1.&nbsp; The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1.&nbsp; The COACT, Inc.&nbsp; CAFE Lab determined that the evaluation assurance level (EAL) for the McAfee Endpoint Encryption for PC 6.2 with McAfee ePolicy Orchestrator 4.6 is EAL2+ ALC_FLR.3</p>\r\n<p>The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.</p>\r\n<p>A team of Validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by the COACT, Inc.&nbsp; CAFE Lab.&nbsp; The evaluation was completed in August 2012.&nbsp; Results of the evaluation and associated validation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report.</p>","environmental_strengths":"<p>The TOE&rsquo;s Security Functions are:</p>\r\n<p><strong>Cryptographic Operations</strong></p>\r\n<p>When the TOE Endpoint is activated, it generates a number of cryptographic keys using its key generation algorithm that incorporates an SP 800-90 random bit generator.&nbsp; The TOE Endpoint generates a System key (AES-256) that it uses to encrypt the TOE Data and a System Recovery Key (AES-256) used for administrative recovery.&nbsp;</p>\r\n<p>For uninitialized user accounts, the system key is stored encrypted with a hash of the default password.&nbsp; This is changed as soon as the user logs on for the first time.</p>\r\n<p>In addition, for users that have certificates from Active Directory and an associated smart card containing the matching private key, the TOE Endpoint also generates an RSA key pair (2048 bits) for each system user for which the client has not yet received initialized user token data.</p>\r\n<p>The System Key is only stored persistently in its encrypted form.&nbsp; It is stored in the Pre-Boot File System encrypted by the User Public Key, one copy for each user.&nbsp; It is also stored wrapped with the System Recovery key.&nbsp; The User Secret Key is stored encrypted in the TOE Endpoint and during the logon process is decrypted by the user&rsquo;s token to enable it to be used to secure the hard disk during normal operation of the TOE Endpoint.&nbsp;</p>\r\n<p>The link between ePO and the TOE Endpoint is secured by McAfee Agent.&nbsp; This uses TLS to establish a shared secret and then uses this as an AES-256 key to encrypt subsequent session-based traffic between the ePO server and the TOE Endpoint.</p>\r\n<p>The System Key and System Recovery Key are encrypted by the Key Server Public Key (a 2048 bit RSA key) and sent to ePO after they are generated where they are stored in the Key Server for archiving purposes.&nbsp; The User Public Key of each system user is also sent to ePO after generation, as is the User Private Key, encrypted by the user&rsquo;s token (password or smartcard).</p>\r\n<p>The Key Server is an ePO component that stores a copy of the System Key from each activated Endpoint.&nbsp; The Key Server data is stored in an SQL Server.&nbsp; The Key Server is only used for out of bound emergency recovery of an Endpoint or the forensic decryption of Endpoint storage.</p>\r\n<p>The TOE Endpoint uses AES-256 and the System Key to secure the TOE Endpoint storage media.&nbsp; All data written to the storage media is encrypted and all data read from the storage media is decrypted.</p>\r\n<p><strong>Identification and Authentication</strong></p>\r\n<p>Both ePO and the TOE Endpoint provide identity based access control.</p>\r\n<p>An ePO Administrator must logon successfully before being granted access to the ePO functionality.&nbsp; Authentication is provided in one of three ways, the specific mechanism used is determined when the user account is created.&nbsp; The available authentication types are ePO authentication (ePO user name and password), Windows authentication and certificate based authentication.&nbsp; The ePO administrator logs on to ePO as appropriate to their configured authentication type, by default, using a username and password.&nbsp; No access to ePO functionality is available before the administrator has been successfully identified and authenticated.</p>\r\n<p>The TOE Endpoint provides token-based user authentication, for instance using PKI certificate smartcards, stored value smartcards or password-only tokens.&nbsp; No access to the encrypted data on the storage media is available before the user has been successfully identified and authenticated.</p>\r\n<p>With password-only tokens, the administrator can define and edit user policies with ePO and deploy these to Endpoint systems via policy updates.&nbsp; This allows the administrator to administer ePO connected endpoints.&nbsp; In this way, user accounts can be enabled or disabled, new accounts created, user password policies set (maximum and/or minimum password length and enforced password content defining the number of Alpha, Numeric, Alphanumeric, and Symbols characters required to form a password) or user passwords reset.</p>\r\n<p>For physical tokens, it may be possible to change the token&rsquo;s PIN either locally in the Endpoint Pre-boot environment or using proprietary middleware.&nbsp; They are not managed by ePO.</p>\r\n<p>For all authentication methods, there is obscured feedback, consisting of a &lsquo;*&rsquo; for each character typed for all passwords, to protect the authentication data from accidental disclosure during the logon process.</p>\r\n<p><strong>Audit</strong></p>\r\n<p>The audit log maintains a record of TOE Administrator (ePO user) actions and a set of events relating to the TOE User.</p>\r\n<p>The audit log is accessed from ePO.&nbsp; Administrator actions can be reviewed from the <strong>Menu --&gt; User Management --&gt; Audit Log</strong>.&nbsp; TOE Endpoint events are generated on the TOE Endpoint and then sent to ePO by the McAfee Agent periodically according to a defined schedule.&nbsp; Such User audit events can be reviewed from <strong>Menu --&gt; Reporting --&gt; Queries &amp; Reports</strong> and running the <strong>EE: Product Client Events</strong> report.</p>\r\n<p>Each entry of the Administrator audit log is associated with an identified Administrator.&nbsp; With the User audit log, if an action is performed by an identified user, then the audit log entry is associated with that identified user.&nbsp; However, some audit events result from system actions rather than user actions and these are associated with the system that they relate to.</p>\r\n<p>Audit records are only available from ePO and so are only available to Administrators.&nbsp; In order to view the audit logs, an Administrator must have first successfully logon to ePO using his logon credentials.</p>\r\n<p class=\"Default\"><strong>Management</strong></p>\r\n<p class=\"Default\">The TOE supports two types of operator.&nbsp; Within the context of the TOE, ePO operators are administrators and TOE Endpoint operators are referred to as users.</p>\r\n<p class=\"Default\">All aspects of the TOE Endpoint systems can be managed from ePO.&nbsp; User details are downloaded from Active Directory, and user and machine configurations are deployed to TOE Endpoints as User Policies and System Policies respectively.&nbsp; User policies determine the user password policy, as well as whether a user account is enabled or not on a system.&nbsp; Similarly, system policies determine the storage media encryption policy and where and when users are forced to logon (Preboot, Windows, both or neither).</p>\r\n<p class=\"Default\">Audit events are periodically uploaded from TOE Endpoints to ePO so that there is a central store of audit data that an administrator can use to aggregate audit data into reports to aid the management of a managed network of Endpoint Encryption for PC client machines.&nbsp;</p>\r\n<p class=\"Default\">Users may also change their own password if they are permitted to as part of their user policy.</p>\r\n<p class=\"Default\">To ensure that the Endpoint remains synchronized with ePO policies, McAfee Agent is used to periodically upload events from the Endpoint to ePO and also to download policy updates from ePO and enforce them on the Endpoint.</p>\r\n<p><strong>Protection of the TSF</strong></p>\r\n<p>The TOE Endpoint has a number of related functions that help to maintain its integrity under certain circumstances, such as hardware failure, or communications link failure.</p>\r\n<p>When installed in CC mode as required to meet the requirements of the Security Target, the TSF runs a suite of tests during initial start-up, and in the case of the random number generator test, continuously to demonstrate the correct operation of the security assumptions provided by the abstract machine that underlies the TSF.&nbsp; The TOE Endpoint performs RSA, AES and SHA-256 known answer tests at startup and also performs an integrity test on the executable code of the TOE cryptographic algorithm components.&nbsp; In addition, the TOE Endpoint continuously monitors the output of the Random Bit Generator to ensure that the mechanism is operating correctly.</p>\r\n<p>An administrator may disable a user account, preventing that user from logging on to a machine within the network of protected TOE Endpoint machines.</p>\r\n<p>By default, and when operating in CC mode, a user account is disabled after ten successive logon failures.</p>\r\n<p>After a user account has been disabled or the user has forgotten their logon password when they try to logon, the TSF enters a maintenance mode where the ability to recover the normal functionality of the TOE Endpoint is provided either online via a secure administration session, or offline using the offline recovery procedure.</p>\r\n<p>The online recovery mechanism allows an ePO authorized administrator to modify user security attributes to allow a user to recover access to the TOE Endpoint machine.&nbsp; However this mechanism requires synchronization between the ePO Server Database and the TOE Endpoint and Windows needs to be running for this to be possible.&nbsp; Online recovery is not possible from the pre-boot environment.</p>\r\n<p>There are two types of offline recovery: Administrator offline recovery and self recovery.&nbsp; Both types of offline recovery are options that can be enabled or disabled on a user by user and machine by machine basis.</p>\r\n<p>Administrator offline recovery allows a TOE Endpoint user to pass a TOE Endpoint recovery code request to the ePO administrator. &nbsp;The ePO administrator can then provide a recovery response code to allow the TOE Endpoint user to regain access to the TOE Endpoint.</p>\r\n<p>Self-recovery allows the user to reset a forgotten password by answering a set of security questions.&nbsp; The full list of security questions is set by the administrator using ePO.&nbsp; (Note: Endpoint Encryption contains a generic set of questions by default that may be used or replaced with a set chosen by the authorized administrator).</p>\r\n<p>A user account may be revoked from ePO by an authorized administrator.&nbsp; This change is deployed to an Endpoint via a policy update and so requires the Endpoint machine to be connected to the ePO server via a network connection.&nbsp; Once the updated policy is enforced, the user with the revoked account will no longer be able to logon to the Endpoint.</p>\r\n<p>The TSF ensures that normal operation continues when the link to ePO is lost, by maintaining a local copy of its policies in the Preboot File System.&nbsp;</p>","features":[]}