McAfee SAV85E, VirusScan Enterprise 8.8, ePolicy Orchestrator 4.5 Supplement Manual

Supplement for Common Criteria
Operational User Guidance and Preparative Procedures
McAfee McAfee
®
VirusScan
®
ePolicy Orchestrat or
®
®
4.5 Software
COPYRIGHT
Copyright © 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any
means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIEL D, LINU XSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFOR M A TION License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE . I F YOU DO NOT KNOW WHICH T Y PE OF LI C E NSE YOU HAVE ACQUIR ED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCU MENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT Y OU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD , OR A FILE AVAIL ABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWAR E PAC K AGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Prepared For:
Prepared By:
McAfee, Inc. 2821 Mission College Blvd. Santa Clara, CA 95054
www.mcafee.com
Apex Assurance Group, LLC 530 Lytton Avenue, Ste. 200 Palo Alto, CA 94301
www.apexassurance.com
2 Operational User Guidanc e a nd Preparative Procedures Supplement for Comm on Criteria
Contents
1 Introduction 5
About the Common Criteria ................................................................................................. 5
Assumptions ..................................................................................................................... 6
Authorized Administrators ............................................................................................ 6
Physical Access ........................................................................................................... 6
Acronyms ......................................................................................................................... 6
2 Installation Gui delines and Preparative Proced ur e s 7
Overview .......................................................................................................................... 7
Downloading the TOE ......................................................................................................... 7
Evaluated Configuration...................................................................................................... 8
Functionality Not Included in the Evaluatio n .................................................................... 9
Verify Software ................................................................................................................. 9
Updating System Software ......................................................................................... 10
Install Database Capacity Monitor Ex te nsio n ....................................................................... 10
Step 1: Adjust or Review Database space requirements ................................................. 11
Step 2: Create a Server Task to generate the Event ...................................................... 11
Step 3: Setting up the automatic response ................................................................... 12
3 Guidance for Administrators 15
Software Version Inspection .............................................................................................. 15
Required Password Length ................................................................................................ 15
Operational User Guidance and Preparative Procedures Su pp lem e nt for Common Criteria 3
4 Operational User Guidanc e a nd Preparative Procedures Supplement for Comm on Criteria
1 Introduction
This guide provides operational guidance and installation procedu r e s for the VirusSca n Enterprise 8.8 and ePolicy Orchestrator 4.5.
This guide was written to provide the evidence requi r ed by the following assurance r equirements of the Common Criteria (CC) Version 3.1, Part 3:
AGD_OPE.1 AGD_PRE.1
These assurance requirements call for documentation of installation procedures that provide assurance that the TOE is installed and configured in the evaluated configuration.
This document serves as a supplement to the standard McAf ee doc umentation set including the following:
McAfee VirusScan En terpr ise 8.8 Product Guide McAfee VirusScan En terpr ise 8.8 Installation Guide McAfee ePolicy O r c hestrator 4.5 Ins ta llation Guide McAfee ePolicy O r c hestrator 4.5 Product Guide
These documents should be read prior t o c onfiguring the product in accordance with the Common Criteria evaluated configuration. The documents listed above in conjunction with this s upplement describe how to adm inister the TOE in a m an ner that meets the Common Criteria eva luated configuration. Any changes to or deviations from the information provided in this document will re s ult in noncomplianc e b e tween the product a nd the Common Criter ia e valuated configuration.
The audience f or this document includes administrators who are authorized to install and configu r e TOE. Since administrators config ure the TOE and set policie s for use, there is n o s p ecific user guidanc e documentation.
Contents
About the Common Criteria Assumptions Acronyms
About the Common Criteria
The Common Cr iter ia for Information T echnology Security Evaluation (or “Common Criteria”) provides a methodology for evaluating security features of IT products. Product v e ndors pursue Comm on Criteria evaluation to meet assurance needs of custome r s and to seek third-par ty validation of sec urity function claims. The Target of Evaluation (TOE) en compasses the evaluate d security func tionality of a product.
Operational User Guidanc e a nd Preparative Procedures Supplement for Comm on Criteria 5
Loading...
+ 10 hidden pages