Kanguru Common Criteria Evaluated v1.21 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Lager Kanguru Common Criteria Evaluated v1.21 herunter. Kanguru Common Criteria Evaluated v1.21 User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken

Inhaltsverzeichnis

Seite 1 - User Guide

Secure. Anytime. Anywhere.TMCopyright 2014, All Rights ReservedEvaluated ProductUser GuideVersion 1.21

Seite 2 - Notices and Information

102.4 Software RequirementsThe device client software MUST be one of the following applications. This entire document applies to all of the applicati

Seite 3 - End User License Agreement

112.6 Requirements for administratorsWhen using the devices in an Enterprise configuration, there MUST be one or more competent individuals who are a

Seite 4 - Entire Agreement

122.8 Requirements for connectivityWhen using KRMC, you MUST ensure that all network connections used for the communication with the KRMC are under t

Seite 5 - Table of Contents

133. DocumentationThe delivery of the Guidance Documents will be secured through a secure site (Kanguru.com). The document will be available as a dow

Seite 6 - 1. Introduction

14ECG delivery to customersCustomers can download latest evaluated guide from Kanguru support site at:https://kanguru.zendesk.com/entries/88351486-Eva

Seite 7 - 1.2 How to use this document

154. Software InstallationThe evaluation covers a fresh installation of the management software and the initial configuration of the devices listed i

Seite 8 - Requirements and Assumptions

16Software Installation4.2 UKLAUKLA can be installed anywhere on your Windows system. You MUST place it in a directory that is writable by the user I

Seite 9 - 2.3 Hardware Requirements

174.3 KRMCPlease refer to “KRMC - Enterprise Edition - Install Guide v5.pdf” for instructions on installing KRMC and the prerequisite software (MS SQ

Seite 10 - 2.4 Software Requirements

184.4 KDMThe Defender 2000 and Elite200 flash devices come pre-loaded with firmware and KDM client software. For all drives, the delivery to the cust

Seite 11 - 2.7 Requirements for users

194.4.2 Verifying the KDM Client Edition Users can open the version.ini file in CD-ROM partition to verify whether their device is running a Cloud edi

Seite 12 - 2.10 Device reception

2Notices and InformationPlease be aware of the following points before using your Kanguru productCopyright © 2014 Kanguru Solutions. All rights reserv

Seite 13 - 3. Documentation

20Verifying the files loaded to your Defender deviceThe user MUST check the authenticity of the client software on their Defender drive to ensure that

Seite 14 - Documentation

214.4.3 Updating Your Defender DeviceFor the purposes of this section, the word “device” is taken to refer to either the Kanguru Defender 2000 or Kan

Seite 15 - 4. Software Installation

224.4.3.1 Updating Cloud/Standard Edition Devices To prevent you from accidentally updating your device to a non-Common Criteria certified client ver

Seite 16 - 4.2 UKLA

234.4.3.2 Updating KRMC Enterprise Edition Devices Enterprise edition Defender devices are managed by the Kanguru Remote Management Console (KRMC). U

Seite 17 - 4.3 KRMC

24Software Installation4.4.3.3 Updating No-Comms Edition Devices To prevent you from accidentally updating your device to a non-Common Criteria certi

Seite 18 - 4.4 KDM

255. Common Criteria Certified VersionsDefender Elite200’s with the following specifications have been certified by Common Criteria: • Client softwa

Seite 19 - Software Installation

266. Device Self TestAll devices feature an LED that indicates the state of the device as follows:• After the device has been powered on via USB the

Seite 20

277. Standalone Device SetupA standalone device is not managed by UKLA or KRMC. All setup responsibility solely lies with the user. The use of the de

Seite 21

289. Password Selection RecommendationThe following password policy MUST be enabled for all parts of the TOE where possible (not all parts or prerequ

Seite 22

2911. Verifying Your Files Using SHA256 ChecksumTo verify the integrity of the KDM updater that you downloaded, please use the HashMyFiles SHA256 Che

Seite 23

3End User License AgreementEnd User License AgreementThis legal document is an agreement between you, the end user (“Licensee”), and Kanguru Solutions

Seite 24

3011.1 SHA256 Checksum ValuesIf the checksum generated by the HashMyFile tool matches the checksum published below, then your files are genuine. Defe

Seite 25

31Defender 2000 Cloud Edition Client Application Files (KDM2000 v 1.2.1.8 -2)File name SHA256 Checksum valueKDM2000 cfe4236c88133c863693555a7f77eca09a

Seite 26 - 6. Device Self Test

32Defender 2000 No-Comms Edition Client Application Files (KDM2000 v 1.2.1.8 -6)File name SHA256 Checksum valueKDM2000 8f313a05556d7b80fd84d66ff41e741

Seite 27 - 8. Managed Devices

33Defender Elite200 Enterprise Edition Client Application Files (KDME200 v 2.0.0.0 -3)File name SHA256 Checksum valueKDMElite200 c03eed99ad8a2e7e86e0f

Seite 28 - Password Selection Policy

3412. Changelogv1.3 updated 5/30/2013• Updated CC certified client version of KDME to 2.7.1.9• Updated CC certified client version of KDM1000 to 1.

Seite 29

35v1.11 updated 7/17/2014• Consolidate all hash checking to a single chapter• Change the Hash tool used to Hashmyfiles.exe• Add SHA hashing for KRM

Seite 30 - 11.1 SHA256 Checksum Values

Secure. Anytime. Anywhere.TMLegal terms and conditions available at www.kanguru.com. Please review and agree before use. Thank you.Kanguru Solutions 1

Seite 31

4End User License AgreementLimitations of DamagesIn no event shall Licensor, or anyone else who has been involved in the creation, distribution, or de

Seite 32

5Table of ContentsTable of Contents 1. Introduction ... 61.1 Pu

Seite 33

61. Introduction1.1 Purpose of this documentThe Kanguru Defender Family of encrypted storage devices is designed to provide secure and reliable port

Seite 34 - 12. Changelog

71.2 How to use this documentThe key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “O

Seite 35 - Changelog

82. Requirements and Assumptions2.1 What is a CC compliant system?A system can be considered to be “CC compliant” if it matches an evaluated and cer

Seite 36 - Secure. Anytime. Anywhere

92.2 Identifying Your Defender DeviceThere are currently two Defender models that are certified for Common Criteria: 2000 and Elite200. You can visua

Kommentare zu diesen Handbüchern

Keine Kommentare