Supplement for Common Criteria
Operational User Guidance and Preparative
Procedures
McAfee
McAfee
®
VirusScan
®
ePolicy Orchestrat or
®
Enterprise 8.8
®
4.5 Software
COPYRIGHT
Copyright © 2011 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any
means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
AVERT, EPO, EPOLICY ORCHESTRATOR, FOUNDSTONE, GROUPSHIELD, INTRUSHIEL D, LINU XSHIELD, MAX (MCAFEE SECURITYALLIANCE EXCHANGE),
MCAFEE, NETSHIELD, PORTALSHIELD, PREVENTSYS, SECURITYALLIANCE, SITEADVISOR, TOTAL PROTECTION, VIRUSSCAN, WEBSHIELD are registered
trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of
McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFOR M A TION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS
AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE . I F YOU DO NOT KNOW WHICH T Y PE OF LI C E NSE YOU HAVE ACQUIR ED, PLEASE CONSULT THE SALES AND OTHER
RELATED LICENSE GRANT OR PURCHASE ORDER DOCU MENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT Y OU HAVE RECEIVED SEPARATELY AS PART OF THE
PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD , OR A FILE AVAIL ABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWAR E PAC K AGE). IF YOU DO NOT
AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF
PURCHASE FOR A FULL REFUND.
Prepared For:
Prepared By:
McAfee, Inc.
2821 Mission College Blvd.
Santa Clara, CA 95054
www.mcafee.com
Apex Assurance Group, LLC
530 Lytton Avenue, Ste. 200
Palo Alto, CA 94301
www.apexassurance.com
2 Operational User Guidanc e a nd Preparative Procedures Supplement for Comm on Criteria
Contents
1 Introduction 5
About the Common Criteria ................................................................................................. 5
Assumptions ..................................................................................................................... 6
Authorized Administrators ............................................................................................ 6
Physical Access ........................................................................................................... 6
Acronyms ......................................................................................................................... 6
2 Installation Gui delines and Preparative Proced ur e s 7
Overview .......................................................................................................................... 7
Downloading the TOE ......................................................................................................... 7
Evaluated Configuration...................................................................................................... 8
Functionality Not Included in the Evaluatio n .................................................................... 9
Verify Software ................................................................................................................. 9
Updating System Software ......................................................................................... 10
Install Database Capacity Monitor Ex te nsio n ....................................................................... 10
Step 1: Adjust or Review Database space requirements ................................................. 11
Step 2: Create a Server Task to generate the Event ...................................................... 11
Step 3: Setting up the automatic response ................................................................... 12
3 Guidance for Administrators 15
Software Version Inspection .............................................................................................. 15
Required Password Length ................................................................................................ 15
Operational User Guidance and Preparative Procedures Su pp lem e nt for Common Criteria 3
4 Operational User Guidanc e a nd Preparative Procedures Supplement for Comm on Criteria
1 Introduction
This guide provides operational guidance and installation procedu r e s for the VirusSca n Enterprise 8.8
and ePolicy Orchestrator 4.5.
This guide was written to provide the evidence requi r ed by the following assurance r equirements of
the Common Criteria (CC) Version 3.1, Part 3:
AGD_OPE.1
AGD_PRE.1
These assurance requirements call for documentation of installation procedures that provide assurance
that the TOE is installed and configured in the evaluated configuration.
This document serves as a supplement to the standard McAf ee doc umentation set including the
following:
McAfee VirusScan En terpr ise 8.8 Product Guide
McAfee VirusScan En terpr ise 8.8 Installation Guide
McAfee ePolicy O r c hestrator 4.5 Ins ta llation Guide
McAfee ePolicy O r c hestrator 4.5 Product Guide
These documents should be read prior t o c onfiguring the product in accordance with the Common
Criteria evaluated configuration. The documents listed above in conjunction with this s upplement
describe how to adm inister the TOE in a m an ner that meets the Common Criteria eva luated
configuration. Any changes to or deviations from the information provided in this document will re s ult
in noncomplianc e b e tween the product a nd the Common Criter ia e valuated configuration.
The audience f or this document includes administrators who are authorized to install and configu r e
TOE. Since administrators config ure the TOE and set policie s for use, there is n o s p ecific user guidanc e
documentation.
Contents
About the Common Criteria
Assumptions
Acronyms
About the Common Criteria
The Common Cr iter ia for Information T echnology Security Evaluation (or “Common Criteria”) provides
a methodology for evaluating security features of IT products. Product v e ndors pursue Comm on
Criteria evaluation to meet assurance needs of custome r s and to seek third-par ty validation of sec urity
function claims. The Target of Evaluation (TOE) en compasses the evaluate d security func tionality of a
product.
Operational User Guidanc e a nd Preparative Procedures Supplement for Comm on Criteria 5