beautypg.com

Kanguru Common Criteria Evaluated v1.21 User Manual

Page 5

background image

5

Table of Contents

Table of Contents

1. Introduction ........................................................................................6

1.1 Purpose of this document .................................................................................6

1.2 How to use this document ................................................................................7

2. Requirements and Assumptions .......................................................8

2.1 What is a CC compliant system? ......................................................................8

2.2 Identifying Your Defender Device ....................................................................9

2.3 Hardware Requirements ...................................................................................9

2.4 Software Requirements .....................................................................................10

2.5 Requirements for the system’s environment ....................................................10

2.6 Requirements for administrators ......................................................................11

2.7 Requirements for users .....................................................................................11

2.8 Requirements for connectivity ..........................................................................12

2.9 Excluded functionality ......................................................................................12

2.10 Device reception .............................................................................................12

3. Documentation ...................................................................................13
4. Software Installation ..........................................................................15

4.1 Obtaining copies of UKLA and KRMC ...........................................................15

4.2 UKLA ...............................................................................................................16

4.3 KRMC ..............................................................................................................17

4.4 KDM .................................................................................................................18

4.4.1 Verifying the KDM Software Version ......................................................18

4.4.2 Verifying the KDM Client Edition ..........................................................19

4.4.3 Updating Your Defender Device .............................................................21

4.4.3.1 Updating Cloud/Standard Edition Devices ................................22

4.4.3.2 Updating KRMC Enterprise Edition Devices ............................23

4.4.3.3 Updating No-Comms Edition Devices .......................................24

5. Common Criteria Certified Versions ...............................................25

5.1 Firmware verification Process ..........................................................................25

5.2 Client Software Verification Process ................................................................25

6. Device Self Test ...................................................................................26
7. Standalone Device Setup ...................................................................27
8. Managed Devices ................................................................................27
9. Password Selection Recommendation ..............................................28
10. Defender Elite200 Write Protect Switch ..........................................28
11. Verifying Your Files Using SHA256 Checksum ..............................29

11.1 SHA256 Checksum Values .............................................................................30

12. Changelog ...........................................................................................34