5
Table of Contents
Table of Contents
1. Introduction ........................................................................................ 6
1.1 Purpose of this document .................................................................................6
1.2 How to use this document ................................................................................7
2. Requirements and Assumptions .......................................................8
2.1 What is a CC compliant system? ......................................................................8
2.2 Identifying Your Defender Device ....................................................................9
2.3 Hardware Requirements ...................................................................................9
2.4 Software Requirements .....................................................................................10
2.5 Requirements for the system’s environment ....................................................10
2.6 Requirements for administrators ......................................................................11
2.7 Requirements for users .....................................................................................11
2.8 Requirements for connectivity ..........................................................................12
2.9 Excluded functionality ...................................................................................... 12
2.10 Device reception .............................................................................................12
3. Documentation ...................................................................................13
4. Software Installation .......................................................................... 15
4.1 Obtaining copies of UKLA and KRMC ...........................................................15
4.2 UKLA ...............................................................................................................16
4.3 KRMC ..............................................................................................................17
4.4 KDM .................................................................................................................18
4.4.1 Verifying the KDM Software Version ......................................................18
4.4.2 Verifying the KDM Client Edition ..........................................................19
4.4.3 Updating Your Defender Device .............................................................21
4.4.3.1 Updating Cloud/Standard Edition Devices ................................22
4.4.3.2 Updating KRMC Enterprise Edition Devices ............................23
4.4.3.3 Updating No-Comms Edition Devices .......................................24
5. Common Criteria Certified Versions ...............................................25
5.1 Firmware verification Process ..........................................................................25
5.2 Client Software Verification Process ................................................................25
6. Device Self Test ................................................................................... 26
7. Standalone Device Setup ...................................................................27
8. Managed Devices ................................................................................27
9. Password Selection Recommendation ..............................................28
10. Defender Elite200 Write Protect Switch ..........................................28
11. Verifying Your Files Using SHA256 Checksum ..............................29
11.1 SHA256 Checksum Values .............................................................................30
12. Changelog ...........................................................................................34