
Distributed repositories
• Free disk space — 100 MB on the drive where the repository is stored.
• Memory — 256 MB minimum.
Common Criteria considerations
This page is intended for use by government agencies that are required to use only National
Information Assurance Partnership (NIAP) Common Criteria validated security products. It
describes functional modifications that meet specific Common Criteria requirements, and provides
advice on best practices for satisfying those requirements.
Server access
Physical access to the server must be restricted to authorized personnel that have been
adequately trained to manage the system.
The server must be located in a physically secure facility with access limited to authorized
personnel.
Functionality on multiple platforms
The combination of ePolicy Orchestrator and Policy Auditor 5.2 functions identically on all
platforms where ePolicy Orchestrator operates.
Encryption
All packages created and distributed by McAfee are signed with a key pair using the DSA (Digital
Signature Algorithm) signature verification system, and are encrypted using 168-bit 3DES
encryption. A key is used to encrypt or decrypt sensitive data.
The ePolicy Orchestrator repository list (SiteList.xml) file contains the names of all the repositories
you are managing. The repository list includes the location and encrypted network credentials
that managed systems use to select the repository and retrieve updates. The server sends the
repository list to the agent during agent-server communication.
The Security Keys page in ePolicy Orchestrator allows you to manage encryption for repositories
and for agent-server communications.
Applications running under the ePolicy Orchestrator environment use a Secure Socket Layer
(SSL) sublayer under regular HTTP application layering. HTTPS encrypts and decrypts user page
requests as well as the pages that are returned by the web server. The use of HTTPS protects
against eavesdropping and man-in-the-middle attacks.
HTTPS and SSL support the use of X.509 digital certificates from the server so that a user can
authenticate the sender.
Passwords
When a new ePolicy Orchestrator user is created, the Add New User interface allows for use of
NT authentication, which has previously been set at the network level, or a new ePolicy
Orchestrator authentication credential can be created.
Administrators who must adhere to the requirements of the National Information Assurance
Partnership (NIAP) Common Criteria Validation Scheme (CCEVS) are directed to assign passwords
System Requirements
Distributed repositories
15McAfee Policy Auditor 5.2.0 Installation Guide
Comentarios a estos manuales