McAfee PASCDE-AB-IA Product Guide - Page 7

Appendix A: Implementing the Security Content Automation Protocol

Page 7 highlights

Contents Appendix A: Implementing the Security Content Automation Protocol 87 Statement of FDCC compliance 87 Statement of SCAP implementation 88 Statement of CVE implementation 88 Statement of CCE implementation 89 Statement of CPE implementation 89 Statement of CVSS implementation 90 Statement of XCCDF implementation 90 Statement of OVAL implementation 90 Appendix B: Common Criteria requirements 92 McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6 7

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

Appendix A: Implementing the Security Content Automation Protocol
.................
87
Statement of FDCC compliance
.............................................................
87
Statement of SCAP implementation
..........................................................
88
Statement of CVE implementation
...........................................................
88
Statement of CCE implementation
...........................................................
89
Statement of CPE implementation
...........................................................
89
Statement of CVSS implementation
..........................................................
90
Statement of XCCDF implementation
.........................................................
90
Statement of OVAL implementation
..........................................................
90
Appendix B: Common Criteria requirements
.............................................
92
7
McAfee Policy Auditor 6.0 software Product Guide for ePolicy Orchestrator 4.6
Contents