Release Notes for McAfee VirusScan Enterprise 8.5i Extensions for ePolicy Orchestrator 4.0.

Thank you for using McAfee® VirusScan Enterprise® 8.5i extensions for ePolicy Orchestrator® 4.0. This document contains important information about this release. We strongly recommend that you read the entire document.

About this release

This release was developed for use with:

Make sure you have installed the correct version of the product(s) in this list before using this release.

Purpose

These release notes supplement the product Readme file in the release package and detail fixes included in the updates for VirusScan Enterprise 8.5i extension and VirusScan Enterprise Reports extension.

Improvements

Known issues

Known issues in this release of the software are described below:

  1. Issue: VirusScan Enterprise must be installed on the client system before the AntiSpyware Enterprise Module can be installed. When creating deployment tasks to deploy both VirusScan Enterprise and the AntiSpyware Enterprise Module to the same system, the products might be deployed in the incorrect order. If the AntiSpyware Enterprise Module is deployed and attempts to install before VirusScan Enterprise is installed, the AntiSpyware Enterprise Module installation fails.

    Workaround: The order in which you create the deployment tasks determines the order in which the products are deployed and installed. Create the VirusScan Enterprise deployment task before creating the AntiSpyware Enterprise Module deployment task to ensure they are deployed and installed in the correct order.
  2. Issue: If you are using ePolicy Orchestrator 4.0 to manage VirusScan Enterprise 8.0i or later, you must also use McAfee Agent version 3.6 or later (McAfee Agent previously known as ePolicy Orchestrator agent).
  3. Issue: This version of VirusScan Enterprise 8.5i interface was created specifically for ePolicy Orchestrator 4.0. It cannot be used with previous versions of ePolicy Orchestrator or any versions of McAfee ProtectionPilot®.

Resolved issues

Resolved issues in this release of the software are described below:

  1. Issue: The on-demand scan log file validation checked for invalid file characters, including the "<" and ">" characters.
    Resolution: The VirusScan 8.5i extension validation for the path name of the on-demand scanner log file now allows the "<" and ">" characters, which are needed for ePolicy Orchestrator macro variables.
  2. Issue: The registry value for cookie alerting was set incorrectly, based on the checkbox value.
    Resolution: The VirusScan 8.5i extension now properly inverts the value of the cookie alerting checkbox before displaying or saving it.
  3. Issue: Scanner exclusions that were entered in ePolicy Orchestrator with a preceding blank space did not show up correctly when they were enforced on the client.
    Resolution: The VirusScan 8.5i extension has been updated to strip any preceding blank spaces from exclusions when they are entered in ePolicy Orchestrator.
  4. Issue: The Access Protection include and exclude fields permitted a limited number of characters in the extension interface.
    Resolution: The VirusScan 8.5i extension updates the maximum limit of the include and exclude fields, to be consistent with the point-product interface.
  5. Issue: When logged on to ePolicy Orchestrator in non-English languages, the on-access scanner Exclusions dialog box appeared in English.
    Resolution: The VirusScan 8.5i extension has been corrected to display the Exclusions window in the appropriate language.

Previously resolved issues

Resolved issues from previous releases of the software are described below:

  1. Issue: The VirusScan 8.5i extension did not validate the email scanner quarantine folder correctly.
    Resolution: The VirusScan 8.5i extension has been fixed to validate the email scanner quarantine folder correctly.
  2. Issue: When the Access Protection rules are saved, the VirusScan 8.5i extension adds extra "\" characters to the Include and Exclude process lists.
    Resolution: The VirusScan 8.5i extension has been changed so it does not add the extra "\" characters.
  3. Issue: Changes to the way overflow content is handled in Microsoft Internet Explorer 7 redefined the way the height property of the page was interpreted. This caused some scroll bars in the VirusScan 8.5i extension to not appear.
    Resolution: The VirusScan 8.5i extension now sets the correct height property for Internet Explorer 7. This allows for scroll bars to appear when needed, similar to Internet Explorer 6.
  4. Issue: The ExtraDATNames column is missing from the product registration in the VirusScan Reports extension. This prevents using the field in VirusScan reports.
    Resolution: The VirusScan Reports extension was updated to allow the user to add ExtraDAT information to reports.
  5. Issue: Internet Explorer has a bug where drop-down menus do not follow the correct rules for appearing behind other parts of the user interface. As a workaround, ePolicy Orchestrator hides drop-down menus so that they don't appear unexpectedly, which affected Access Protection registry rule creation.
    Resolution: The VirusScan 8.5i extension has been updated to display the registry rule interface, and make registry hive drop-down menu explicitly visible.
  6. Issue: When reading task exclusions for the on-demand scanner, the VirusScan 8.5i extension added the escape character to exclusion paths, causing exclusions to have extra "\" characters in the path.
    Resolution: The VirusScan 8.5i extension has been updated to no longer add escape characters.
  7. Issue: The on-demand scanner task has an internal ordering for the scan item types. However, the order that the scan item types were placed in the user interface was different than the internal ordering. This caused the Registered Files item to be swapped with the Running Processes item.
    Resolution: The order of the Registered Files and the Running Processes scan items have been changed in the user interface so that they are now consistent with the internal ordering.
  8. Issue: When the VirusScan 8.5i extension sets a user interface policy, the password is not cleared when the "No Password" option is selected. This caused previously set passwords to be rewritten into the policy. When the policy is later applied on the client, parts of the client user interface cannot be modified.
    Resolution: The VirusScan 8.5i extension now always clears the password when the "No Password" option is selected.
  9. Issue: On-demand scanner task exclusions are present for a task even after attempts to remove them. Also, if an on-demand scanner task has no exclusions, the number of exclusions is not saved properly.
    Resolution: The VirusScan 8.5i extension on-demand scanner task exclusions can now be removed, and the number of exclusions is always saved correctly.
  10. Issue: When creating an exclusion by file age, the user interface allows up to 3 digits only, and accepts the value "0".
    Resolution: The VirusScan 8.5i extension user interface has been expanded to allow four digits to be typed, and no longer accepts the value "0".
  11. Issue: When configuring buffer overflow protection process exclusions, the user interface accepted wildcards in the exclusion.
    Resolution: Validation has been added to the VirusScan 8.5i extension to prevent wildcards from being entered for buffer overflow protection exclusions.
  12. Issue: The ePolicy Orchestrator 4.0 console hung when it tried to display exclusions in the VirusScan Enterprise 8.5i on-access scanner exclusions policy.
    Resolution: The VirusScan 8.5i extension on-access scanner exclusion list was modified to a list box in the ePolicy Orchestrator 4.0 on-access scanner exclusions policy.
  13. Issue: On-access scanner exclusions options On Read or On Write are not available in the ePolicy Orchestrator 4.0 extensions policy.
    Resolution: The VirusScan 8.5i extension on-access scanner exclusion dialog box has been modified to include the On Read and On Write options.
  14. Issue: Files without a specified file type extension are handled differently than files with a specified file type extension. This applies to any instance where file types can be specified. There are two scenarios:

    • When importing rules from ePolicy Orchestrator 3.6 to ePolicy Orchestrator 4.0, entries for files without a specified file type extension are displayed with ":::" in place of the extension. In ePolicy Orchestrator 3.6, although files without specified file type extensions are stored with ":::", they are listed under "All files with no extensions."
    • When specifying a file that does not have a file type extension, type ":::" in the file type field.


    Resolution: The VirusScan 8.5i extension has been updated in the following fashion:

    • When importing rules from ePolicy Orchestrator 3.6 to ePolicy Orchestrator 4.0, entries for files with no specified file type are listed under "All files with no extensions."
    • When specifying a file that does not have a file type extension, the file type field can be left blank.

  15. Issue: On-access scanner exclusion of Protected by Windows File Protection is saved incorrectly.
    Resolution: The VirusScan 8.5i extension has been corrected to display the exclusion of Protected by Windows File Protection and to save it correctly.

Installation instructions

Installation prerequisites

  • You must have administrative permissions to add/modify product extensions.

Installation steps

  1. Log on to ePolicy Orchestrator 4.0.
  2. From the top menu, click "Configuration."
  3. From the menu bar, click "Extensions."
  4. At the lower left of the screen, click "Install Extension."
  5. Click "Browse" and locate the .zip file for the extension update.
  6. Click "OK" to begin the extension update.

Once the extensions are updated, the version can be verified in the ePolicy Orchestrator Extensions list (see About this release for version information).

License attributions

This product includes or may include:

Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). | Cryptographic software written by Eric A. Young and software written by Tim J. Hudson | Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL, which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein. * Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. | Software originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier. | Software written by Douglas W. Sauder. | Software developed by the Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at www.apache.org/licenses/LICENSE-2.0.txt. | International Components for Unicode ("ICU") Copyright © 1995-2002 International Business Machines Corporation and others. | Software developed by CrystalClear Software, Inc., Copyright © 2000 CrystalClear Software, Inc. | FEAD® Optimizer® technology, Copyright Netopsystems AG, Berlin, Germany. | Outside In® Viewer Technology © 1992-2001 Stellent Chicago, Inc. and/or Outside In® HTML Export, © 2001 Stellent Chicago, Inc. | Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper, © 1998, 1999, 2000. | Software copyrighted by Expat maintainers. | Software copyrighted by The Regents of the University of California, © 1996, 1989, 1998-2000. | Software copyrighted by Gunnar Ritter. | Software copyrighted by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A., © 2003. | Software copyrighted by Gisle Aas. © 1995-2003. | Software copyrighted by Michael A. Chase, © 1999-2000. * Software copyrighted by Neil Winton, © 1995-1996. | Software copyrighted by RSA Data Security, Inc., © 1990-1992. | Software copyrighted by Sean M. Burke, © 1999, 2000. | Software copyrighted by Martijn Koster, © 1995. | Software copyrighted by Brad Appleton, © 1996-1999. | Software copyrighted by Michael G. Schwern, © 2001. | Software copyrighted by Graham Barr, © 1998. | Software copyrighted by Larry Wall and Clark Cooper, © 1998-2000. | Software copyrighted by Frodo Looijaard, © 1997. | Software copyrighted by the Python Software Foundation, Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org. | Software copyrighted by Beman Dawes, © 1994-1999, 2002. | Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000 University of Notre Dame. | Software copyrighted by Simone Bordet & Marco Cravero, © 2002. | Software copyrighted by Stephen Purcell, © 2001. | Software developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/). | Software copyrighted by International Business Machines Corporation and others, © 1995-2003. | Software developed by the University of California, Berkeley and its contributors. | Software developed by Ralf S. Engelschall <rse@engelschall.com> for use in the mod_ssl project (http:// www.modssl.org/). | Software copyrighted by Kevlin Henney, © 2000-2002. | Software copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002. | Software copyrighted by David Abrahams, © 2001, 2002. See http://www.boost.org/libs/bind/bind.html for documentation. | Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, © 2000. | Software copyrighted by Boost.org, © 1999-2002. | Software copyrighted by Nicolai M. Josuttis, ©1999. | Software copyrighted by Jeremy Siek, © 1999-2001. | Software copyrighted by Daryle Walker, © 2001. | Software copyrighted by Chuck Allison and Jeremy Siek, © 2001, 2002. | Software copyrighted by Samuel Krempp, © 2001. See http://www.boost.org for updates, documentation, and revision history. | Software copyrighted by Doug Gregor (gregod@cs.rpi.edu), © 2001, 2002. | Software copyrighted by Cadenza New Zealand Ltd., © 2000. | Software copyrighted by Jens Maurer, © 2000, 2001. | Software copyrighted by Jaakko Järvi (jaakko.jarvi@cs.utu.fi), © 1999, 2000. | Software copyrighted by Ronald Garcia, © 2002. | Software copyrighted by David Abrahams, Jeremy Siek, and Daryle Walker, © 1999-2001. | Software copyrighted by Stephen Cleary (shammah@voyager.net), © 2000. | Software copyrighted by Housemarque Oy <http://www.housemarque.com>, © 2001. | Software copyrighted by Paul Moore, © 1999. | Software copyrighted by Dr. John Maddock, © 1998-2002. | Software copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999. | Software copyrighted by Peter Dimov, © 2001, 2002. | Software copyrighted by Jeremy Siek and John R. Bandela, © 2001. | Software copyrighted by Joerg Walter and Mathias Koch, © 2000-2002. | Software copyrighted by Carnegie Mellon University © 1989, 1991, 1992. | Software copyrighted by Cambridge Broadband Ltd., © 2001-2003. | Software copyrighted by Sparta, Inc., © 2003-2004. | Software copyrighted by Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications, © 2004. | Software copyrighted by Simon Josefsson, © 2003. | Software copyrighted by Thomas Jacob, © 2003-2004. | Software copyrighted by Advanced Software Engineering Limited, © 2004. | Software copyrighted by Todd C. Miller, © 1998. | Software copyrighted by The Regents of the University of California, © 1990, 1993, with code derived from software contributed to Berkeley by Chris Torek.


COPYRIGHT

COPYRIGHT

Copyright © 2009 McAfee, Inc. All Rights Reserved.

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.

TRADEMARK ATTRIBUTIONS

TRADEMARK ATTRIBUTIONS

AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.

LICENSE AGREEMENT

LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.