McAfee SAV85E User Guide - Page 5

About the Common Criteria - security

Page 5 highlights

1 Introduction This guide provides operational guidance and installation procedures for the VirusScan Enterprise 8.8 and ePolicy Orchestrator 4.5. This guide was written to provide the evidence required by the following assurance requirements of the Common Criteria (CC) Version 3.1, Part 3:  AGD_OPE.1  AGD_PRE.1 These assurance requirements call for documentation of installation procedures that provide assurance that the TOE is installed and configured in the evaluated configuration. This document serves as a supplement to the standard McAfee documentation set including the following:  McAfee VirusScan Enterprise 8.8 Product Guide  McAfee VirusScan Enterprise 8.8 Installation Guide  McAfee ePolicy Orchestrator 4.5 Installation Guide  McAfee ePolicy Orchestrator 4.5 Product Guide These documents should be read prior to configuring the product in accordance with the Common Criteria evaluated configuration. The documents listed above in conjunction with this supplement describe how to administer the TOE in a manner that meets the Common Criteria evaluated configuration. Any changes to or deviations from the information provided in this document will result in noncompliance between the product and the Common Criteria evaluated configuration. The audience for this document includes administrators who are authorized to install and configure TOE. Since administrators configure the TOE and set policies for use, there is no specific user guidance documentation. Contents  About the Common Criteria  Assumptions  Acronyms About the Common Criteria The Common Criteria for Information Technology Security Evaluation (or "Common Criteria") provides a methodology for evaluating security features of IT products. Product vendors pursue Common Criteria evaluation to meet assurance needs of customers and to seek third-party validation of security function claims. The Target of Evaluation (TOE) encompasses the evaluated security functionality of a product. Operational User Guidance and Preparative Procedures Supplement for Common Criteria 5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15

Operational User Guidance and Preparative Procedures Supplement for Common Criteria
5
1
Introduction
This guide provides operational guidance and installation procedures for the VirusScan Enterprise 8.8
and ePolicy Orchestrator 4.5.
This guide was written to provide the evidence required by the following assurance requirements of
the Common Criteria (CC) Version 3.1, Part 3:
AGD_OPE.1
AGD_PRE.1
These assurance requirements call for documentation of installation procedures that provide assurance
that the TOE is installed and configured in the evaluated configuration.
This document serves as a supplement to the standard McAfee documentation set including the
following:
McAfee VirusScan Enterprise 8.8 Product Guide
McAfee VirusScan Enterprise 8.8 Installation Guide
McAfee ePolicy Orchestrator 4.5 Installation Guide
McAfee ePolicy Orchestrator 4.5 Product Guide
These documents should be read prior to configuring the product in accordance with the Common
Criteria evaluated configuration. The documents listed above in conjunction with this supplement
describe how to administer the TOE in a manner that meets the Common Criteria evaluated
configuration. Any changes to or deviations from the information provided in this document will result
in noncompliance between the product and the Common Criteria evaluated configuration.
The audience for this document includes administrators who are authorized to install and configure
TOE. Since administrators configure the TOE and set policies for use, there is no specific user guidance
documentation.
Contents
About the Common Criteria
Assumptions
Acronyms
About the Common Criteria
The Common Criteria for Information Technology Security Evaluation (or “Common Criteria”) provides
a methodology for evaluating security features of IT products. Product vendors pursue Common
Criteria evaluation to meet assurance needs of customers and to seek third-party validation of security
function claims. The Target of Evaluation (TOE) encompasses the evaluated security functionality of a
product.