
McAfee Email Gateway
Security Target
Page 8 of 61
browser access to email traffic that policy has defined as sensitive: Pull – where MEG stores the emails
in an encrypted form; and Push – where MEG sends the email to the recipient’s mail server in an
encrypted form.
1.2.6 Action and Remediation
The TOE can be configured to take specific action upon identification of a Virus/Malware/Spyware when
scanning traffic. Actions can eliminate the identified file entirely, attempt to clean the file from the
payload, or provide only a notification that a potential Virus/Malware/Spyware has been identified.
1.3 Document Conventions
The CC defines four operations on security functional and assurance requirements. The conventions
below define the conventions used in this ST to identify these operations.
Assignment: indicated with italicised text
Selection:
indicated with underlined text
Refinement: additions indicated with bold text
deletions indicated with strike-through bold text
Iteration: indicated with typical CC requirement naming followed by
the iteration number in
parenthesis, e.g. (1), (2), (3).
Extension: Extended components are identified by appending _EXT to the component
name.
1.4 Document Terminology
Please refer to CC Part 1 Section 4 for definitions of commonly used CC terms.
1.4.1 ST Specific Terminology
Administrator A user of the TOE appliance in one of the predefined or user configured
administrative roles. The predefined roles are Super Administrator, Email
Administrator and Reports Administrator. These predefined roles can be modified.
The ST refers only to the “Administrator”, as the linkage of functions to roles is
configurable.
Appliance Within the context of this ST, the term “appliance” is synonymous with the TOE;
the combination of hardware and software that is described within the TOE
Boundary.
Blacklist A list of e-mail addresses or domains that may be created, which the anti-spam
module will always treat as spam. When the program detects an incoming
message from an address or domain on the blacklist, it immediately assigns a very
high score to that message.
Compliance A process that uses rules to detect undesirable content, such as offensive words,
Komentarze do niniejszej Instrukcji