Compatibility Questionnaire: ThreatGuard (ThreatGuard Traveler) — Archive
Important: The OVAL Compatibility Program was moved to "archive" status in December 2009, and replaced with the "OVAL Adoption Program." Under the OVAL Adoption Program product validation is performed by an external organization, allowing the OVAL Team to focus on educating vendors on best practices regarding the use and implementation OVAL and on how OVAL can continue to evolve as needed by the community.
Refer to the OVAL Adoption Program section for addition information and to review all products and services listed.
Organizational Information
Name of Your Organization:
Web Site:
Product Information
Product/Service Name:
Compatible Categories:
OVAL Definition Consumer
OVAL Results Producer
OVAL-ID Output and Searchable
Product/Service Home Page:
Product Accessibility
Schema Currency Indication
Schema Currency Update Approach
Platform and Definition Type Support
Red Hat: We support Vulnerability class definitions. All subtests currently in use (except "ukn" tests) are supported as well.
Solaris: We support Vulnerability class definitions. All subtests currently in use (except "ukn" tests) are supported as well.
Windows: We support Vulnerability class definitions. All subtests required to assess the "software" section of the criteria block are supported, except the following: ukn, wat, wet, wmt.
Approach for Correction of Errors
Compatibility Documentation
From APPENDIX D of the ThreatGuard User's Manual
About OVAL
Open Vulnerability and Assessment Language (OVAL) is an international, information security community baseline standard for how to check for the presence of vulnerabilities and configuration issues on computer systems. OVAL standardizes the three main steps of the process: collecting system characteristics and configuration information from systems for testing; testing the systems for the presence of specific vulnerabilities, configuration issues, and/or patches; and presenting the results of the tests.
For more information on the OVAL project, please reference "http://oval.mitre.org/about/". Details about OVAL-Compatibility and OVAL-ID Compatibility can be found at "http://oval.mitre.org/compatible/index.html".
Documentation of Finding Elements Using OVAL
From APPENDIX D of the ThreatGuard User's Manual
Finding Vulnerabilities by OVAL ID
The ThreatGuard Navigator allows you to search for vulnerabilities by OVAL ID. The bottom, left-hand corner of the main window has a Search pane as shown at the top of Figure D1. Adjust the search parameter to "OVAL ID", type in the OVAL ID of interest and click the Search button. The Search Results window (also shown in Figure D1) is displayed, holding the title, description, and solution for the vulnerability, as well as all related hosts.
Documentation of Finding Results Information from Elements
From APPENDIX D of the ThreatGuard User's Manual:
Finding OVAL References in GUI Elements
As a universal vulnerability assessor, ThreatGuard includes many different types of vulnerability references. While most high-profile vulnerabilities can be cross-referenced to multiple sources, many fail to be covered by all. The ThreatGuard Vulnerability Test Development Team makes every attempt to include all public industry references such that the user can view them with the Vulnerability Details window (Figure D2). This window is launched by double-clicking on any vulnerability in the Navigator GUI, including the Search Results window of Figure D1.
Figure D2
Documentation Indexing of OVAL-Related Material
OVAL Definition Consumer
Configuration and Software Usage Explanation
From APPENDIX D of the ThreatGuard User's Manual:
OVAL Software and Configuration Analysis
The OVAL definition schema contains two sections of test criteria to assess a vulnerability. The
<software> section describes how to identify vulnerable software. The <configuration> section accounts for ways to disable the software, rendering it harmless. It is ThreatGuard's mission to report vulnerable software regardless of configuration. Since configuration changes can quickly introduce major security risks, ThreatGuard recommends keeping software either patched or uninstalled.OVAL Definition Information Process Explanation
Our current process has the end-user email new definitions and subordinate subtests to ThreatGuard. We install and test the definitions and distribute them as soon as they check-out. The user can expedite this process by providing additional information that ThreatGuard adds (such as Risk Level, Solution, Title, and additional references). In parallel to the distribution, ThreatGuard also feeds the definitions to MITRE such that the entire OVAL community can grow and assist each other.
ThreatGuard plans to provide an interface that allows the end-user to upload a validated definition file for immediate use. ThreatGuard's value-added steps would not be applied in such cases, but this is a feature that supports the spirit and intent of the OVAL project.
OVAL-ID Output and Searchable
Finding Elements Using OVAL-ID
From APPENDIX D of the ThreatGuard User's Manual
Finding Vulnerabilities by OVAL ID
The ThreatGuard Navigator allows you to search for vulnerabilities by OVAL ID. The bottom, left-hand corner of the main window has a Search pane as shown at the top of Figure D1. Adjust the search parameter to "OVAL ID", type in the OVAL ID of interest and click the Search button. The Search Results window (also shown in Figure D1) is displayed, holding the title, description, and solution for the vulnerability, as well as all related hosts.
Finding OVAL-ID Using Elements in Reports
From APPENDIX D of the ThreatGuard User's Manual:
Finding OVAL References in Reports
Figure D3 provides an example of how ThreatGuard reports embed OVAL IDs. This excerpt from the Individual Vulnerability Occurrences Report provides details of a specific vulnerability. The References section lists the related OVAL ID as well as references to other sources such as CVE, Security Focus, the US-CERT, and vendor references. Similarly, the Host Risk Manager and Security Evaluation Reports include the same vulnerability information shown in D3.
Figure D3
Questions for Signature
Statement of Compatibility
Have an authorized individual sign and date the following Compatibility Statement (required):
"As an authorized representative of my organization I agree that we will abide by all of the mandatory Compatibility Requirements as well as all of the additional mandatory Compatibility Requirements that are appropriate for our specific type of capability."
Name: | Robert L. Hollis | |
Title: | Director of Product Development |
Statement of Accuracy
Have an authorized individual sign and date the following accuracy Statement (recommended):
"As an authorized representative of my organization and to the best of my knowledge, there are no errors in the correctness of our capability's use of OVAL schema and logic."
Name: | Robert L. Hollis | |
Title: | Director of Product Development |
Statement on Follow-on Testing Activity Support
Have an authorized individual sign and date the following statement about your organizations willingness to support correctness testing of other capabilities, which will be managed by the Reviewing Authority and kept to reasonable levels of effort for all involved. (required):
"As an authorized representative of my organization, we agree to support the Reviewing Authority in follow-on testing activities, where appropriate types of files will be exchanged with other organizations attempting to prove the correctness of their capabilities."
Name: | Robert L. Hollis | |
Title: | Director of Product Development |
Page Last Updated: December 17, 2009