Dell C5765DN MFP Color Laser Printer User Manual
Page 85
Dell C5765dn Security Target
- 81 -
(2) FAU_SAR.1 Audit review
It is assured that all the information recorded in the audit log can be retrieved.
Security audit log data can be downloaded in the form of tab-delimited text by pressing the button
“store as a text file.” To download security audit log data, SSL/TLS communication needs to be
enabled before using Web browser.
(3) FAU_SAR.2 Restricted audit review
The person who retrieves the security audit log data is limited to the authenticated system
administrator. A system administrator can access the security audit log data only via Web browser
and the access from the control panel is inhibited. Therefore, a system administrator needs to log
in from Web browser to access the security audit log data.
(4) FAU_STG.1 Protected audit trail storage
There is no function to delete the security audit log data, and the security audit log data are
protected from untrusted alteration and modification.
(5) FAU_STG.4 Prevention of audit data loss
When security audit log data are full, the oldest stored audit record is overwritten with the new
data so that the new data is not lost but surely recorded.
Auditable events are stored with time stamps into NVRAM. When the number of stored events
reaches 50, the 50 logs on NVRAM is stored into one file (“audit log file”) within the internal
HDD. Up to 15,000 events can be stored. When the number of recorded events exceeds 15,000,
the oldest audit log file is overwritten and a new audit event is stored.
(6) FPT_STM.1 Reliable time stamps
The time stamp of TOE’s clock function is issued when the defined auditable event is recorded in
the audit log file.
By TSF_FMT, only a system administrator is enabled to change the clock setting.
7.1.7. Internal Network Data Protection (TSF_NET_PROT)
Internal Network Data Protection is provided by the following four protocols which are configured by
a system administrator using the system administrator mode:
(1) FTP_TRP.1 Trusted Path
The document data, security audit log data, and TOE setting data are protected by the encryption
communication protocol that ensures secure data communication between the TOE and IT
products (communication service via Web, communication service for printer driver,
communication service for fax driver, communication service for network utility, communication
service for other services which require trusted path). This trusted path is logically distinct from
other communication paths and provides assured identification of its endpoints and protection of