<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Common Criteria EAL4+ with AVA_VAN.5 /  Advanced methodical vulnerability analysis in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/common-criteria-eal4-with-ava-van-5-advanced-methodical/m-p/510759#M106259</link>
    <description>&lt;P&gt;Have you tried reaching out to your Palo SE? they may have access to this information&lt;/P&gt;</description>
    <pubDate>Thu, 04 Aug 2022 09:59:41 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2022-08-04T09:59:41Z</dc:date>
    <item>
      <title>Common Criteria EAL4+ with AVA_VAN.5 /  Advanced methodical vulnerability analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/common-criteria-eal4-with-ava-van-5-advanced-methodical/m-p/510470#M106208</link>
      <description>&lt;P&gt;&lt;STRONG&gt;#AVA_VAN.5 #CommonCriteria ##AdvancedMemethodicalVulnerabilityAnalysi&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I'd like to know if the newer firewalls with PAN-OS 10.X are &lt;STRONG&gt;AVA_VAN.5&lt;/STRONG&gt; certified regarding common criteria Advanced methodical&lt;BR /&gt;vulnerability analysis? Other vendors disclose&amp;nbsp; e.g. EAL4+ with AVA_VAN.5.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Found nothing at:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/legal-notices/trust-center/tech-certs" target="_blank"&gt;https://www.paloaltonetworks.com/legal-notices/trust-center/tech-certs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.commoncriteriaportal.org/products/#NS" target="_blank"&gt;https://www.commoncriteriaportal.org/products/#NS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf" target="_blank"&gt;https://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R4.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 16:56:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/common-criteria-eal4-with-ava-van-5-advanced-methodical/m-p/510470#M106208</guid>
      <dc:creator>MarkusMix</dc:creator>
      <dc:date>2022-08-01T16:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: Common Criteria EAL4+ with AVA_VAN.5 /  Advanced methodical vulnerability analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/common-criteria-eal4-with-ava-van-5-advanced-methodical/m-p/510759#M106259</link>
      <description>&lt;P&gt;Have you tried reaching out to your Palo SE? they may have access to this information&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2022 09:59:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/common-criteria-eal4-with-ava-van-5-advanced-methodical/m-p/510759#M106259</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2022-08-04T09:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Common Criteria EAL4+ with AVA_VAN.5 /  Advanced methodical vulnerability analysis</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/common-criteria-eal4-with-ava-van-5-advanced-methodical/m-p/517478#M107392</link>
      <description>&lt;P&gt;Yes but no feedback. I guess this is beyond the scope of pa. Too bad.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2022 16:01:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/common-criteria-eal4-with-ava-van-5-advanced-methodical/m-p/517478#M107392</guid>
      <dc:creator>MarkusMix</dc:creator>
      <dc:date>2022-10-11T16:01:04Z</dc:date>
    </item>
  </channel>
</rss>

