Security Target
Page 37
...time and date of the trusted channel functions. Deleting entire audit logs. 1. Adding and deleting administrator roles. 2. a) Minimal: Failures of a role; and Copyright (c) 2010 RICOH COMPANY, LTD. a) Minimal 1. Adding and deleting administrator roles. a) Minimal: modifications to the time; c) Basic: All attempted uses of TOE 6. Auditable events of the ... of a role. d) Basic: Identification of the initiator and target of the user associated with trusted IT products (Outcome: Success/Failure, Communication IP address) 1. b) Detailed: providing a timestamp.
...time and date of the trusted channel functions. Deleting entire audit logs. 1. Adding and deleting administrator roles. 2. a) Minimal: Failures of a role; and Copyright (c) 2010 RICOH COMPANY, LTD. a) Minimal 1. Adding and deleting administrator roles. a) Minimal: modifications to the time; c) Basic: All attempted uses of TOE 6. Auditable events of the ... of a role. d) Basic: Identification of the initiator and target of the user associated with trusted IT products (Outcome: Success/Failure, Communication IP address) 1. b) Detailed: providing a timestamp.
Security Target
Page 38
... audit event type, based on the auditable event definitions of the functional components included in the PP/ST, [assignment: communication IP address, IDs of persons whose authentication information is created/changed/deleted, Locking out users, release of user Lockout, method of Lockout release...TSF shall provide the audit records in case of possible audit data loss. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. FAU_STG.1.1 The TSF shall protect the stored audit records in the audit trail. Dependencies: FAU_GEN.1 ...
... audit event type, based on the auditable event definitions of the functional components included in the PP/ST, [assignment: communication IP address, IDs of persons whose authentication information is created/changed/deleted, Locking out users, release of user Lockout, method of Lockout release...TSF shall provide the audit records in case of possible audit data loss. Dependencies: [FCS_CKM.2 Cryptographic key distribution, or Copyright (c) 2010 RICOH COMPANY, LTD. All Rights Reserved. FAU_STG.1.1 The TSF shall protect the stored audit records in the audit trail. Dependencies: FAU_GEN.1 ...
Security Target
Page 65
Communication IP address - -: No applicable expanded audit information Copyright (c) 2010 RICOH COMPANY, LTD. Page 65 of 81 recorded when any kind of event - Outcome Expanded audit information Locked out user Locked out user who is to ...
Communication IP address - -: No applicable expanded audit information Copyright (c) 2010 RICOH COMPANY, LTD. Page 65 of 81 recorded when any kind of event - Outcome Expanded audit information Locked out user Locked out user who is to ...
Security Target
Page 77
...MFPs are used in this ST Terms D-BOX FTP server HDD Ic Hdd Ic Key IP-Fax MFP Responsible manager of MFP MFP Control Software MFP Control Data LAN-Fax Transmission... data to assign MFP administrators and supervisors. (Or the person who is held. Copyright (c) 2010 RICOH COMPANY, LTD. A server for using Server Message Block Protocol. Refers to a client computer and ...be read from a client computer via a network or USB Ports. All Rights Reserved. Includes e-mail address, user certificates, and a specified value for a set of parameters that controls the operation of an IT...
...MFPs are used in this ST Terms D-BOX FTP server HDD Ic Hdd Ic Key IP-Fax MFP Responsible manager of MFP MFP Control Software MFP Control Data LAN-Fax Transmission... data to assign MFP administrators and supervisors. (Or the person who is held. Copyright (c) 2010 RICOH COMPANY, LTD. A server for using Server Message Block Protocol. Refers to a client computer and ...be read from a client computer via a network or USB Ports. All Rights Reserved. Includes e-mail address, user certificates, and a specified value for a set of parameters that controls the operation of an IT...