Skip to content

Commit ea3ea0a

Browse files
author
Jenn Honkofsky
committed
Spell check
1 parent 639c453 commit ea3ea0a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

input/esm-edr.xml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ and so it is recommended that the intro text and associated table heading be upd
4646
<entry>
4747
<version>2.0</version>
4848
<date>2025-06-13</date>
49-
<subject>CC2022 conversion</subject>
49+
<subject>CC:2022 conversion</subject>
5050
</entry>
5151
</RevisionHistory>
5252

@@ -181,7 +181,7 @@ and so it is recommended that the intro text and associated table heading be upd
181181

182182
<section title="Use Cases" id="usecases"> Requirements in this PP-Module are designed to address
183183
the security problem for the following use cases. An EDR's functionality may be
184-
extended by addons, plugins, threat feeds, or other reputation services. These are out of
184+
extended by add-ons, plug-ins, threat feeds, or other reputation services. These are out of
185185
scope of this PP-Module. <usecases>
186186
<usecase title="Detection of Potential Unauthorized Activity" id="detect">
187187
<description>The detection of potentially unauthorized activity, software, or users is
@@ -225,7 +225,7 @@ and so it is recommended that the intro text and associated table heading be upd
225225
<cc-pp-config-with>
226226
<PP-cc-ref>Protection Profile for Application Software, Version 2.0</PP-cc-ref>
227227
<Mod-cc-ref>PP-Module for Enterprise-Management (EM), Version 2.0</Mod-cc-ref>
228-
<Mod-cc-ref>PP-Module for Host Agents (HA), Version 2.0</Mod-cc-ref>
228+
<Mod-cc-ref>PP-Module for Host Agent (HA), Version 2.0</Mod-cc-ref>
229229
</cc-pp-config-with>
230230
<!-- Package claims -->
231231

@@ -1339,7 +1339,7 @@ This section describes any modifications that the ST author must make to the Bas
13391339
commands sent to the Host Agent as being from the EDR. This is not to
13401340
protect the policies in transit as they are already protected by FPT_ITT.1.
13411341
If the TSF implements this function, any signature algorithms used should be consistent with any selections made in
1342-
FCS_COP.1/Sig Gen and FCS_COP.1/Sig Ver in the Protection Profile for Application Software, Version 2.0.</note>
1342+
FCS_COP.1/Sig Gen and FCS_COP.1/SigVer in the Protection Profile for Application Software, Version 2.0.</note>
13431343
<aactivity>
13441344
<TSS>The evaluator shall check to ensure that the TSS describes how all commands and policies are signed.<h:p/></TSS>
13451345
<Guidance>The evaluator shall review the operational guidance and ensure that the

0 commit comments

Comments
 (0)