home *** CD-ROM | disk | FTP | other *** search
Text File | 1997-08-20 | 33.1 KB | 1,184 lines |
- What's New in VirusScan for Windows NT v3.0.3 (3008a)
- Copyright 1994-1997 by McAfee, Inc.
- All Rights Reserved.
-
-
- Thank you for using McAfee's VirusScan for Windows NT.
- This What's New file contains important information
- regarding the current version of this product. It is
- highly recommended that you read the entire document.
-
- McAfee welcomes your comments and suggestions. Please
- use the information provided in this file to contact us.
-
- **NOTE: Do not attempt to install the Intel version of
- VirusScan on a DEC Alpha system or vice-versa.
-
- ___________________
- WHAT'S IN THIS FILE
-
- - New Features
- - Known Issues
- - Installation
- - Documentation
- - Frequently Asked Questions
- - Additional Information
- - Contact McAfee
-
- ____________
- NEW FEATURES
-
- 1. VirusScan for Windows NT now includes ISeamless
- install scripting technology for completely
- customizable, silent installations.
-
- 2. Now is able to scan LHA/LZH compressed files.
-
- 3. Now supports Microsoft Windows NT Service Pack 3.
-
- 4. Now detects infections in files transferred with
- Microsoft Internet Information Server (IIS). This
- protects remote users accessing files via HTTP or FTP.
-
- 5. Compatible with Windows NT systems running with 3GB
- user memory frames.
-
- 6. For added security, the user ID and password recorded
- for use during silent installations are now stored
- within the SETUP.ISS file in a scrambled format. Please
- note that plain-text user ID's and passwords can be
- manually entered into the SETUP.ISS file with a text
- editor. The installation program is capable of using
- scrambled or plain-text.
-
- 7. Compatible with Compaq LS-120 (120 MB) floppy drives.
-
-
- * NEW VIRUSES DETECTED *
-
- This DAT file detects the following 198 new viruses.
- Locations that have experienced particular problems
- with specific viruses are also identified.
-
- ABC.A
- AL-DITH.1502
- ALEX.599
- ALFONS.1344
- ANDYC.565
- ANDYC.565 DROPPER
- ANGEL.A
- ANT.A:TW
- ANT.C:TW
- ANT.D:TW
- APPDER.G
- APPDER.H
- APPDER.I
- BADSECTOR.3422
- BADSECTOR.3428
- BAJAB.1024
- BANDUNG.AS
- BANDUNG.AT
- BANDUNG.AU
- BANDUNG.AW
- BANDUNG.AX
- BANDUNG.AY
- BANDUNG.AZ
- BANDUNG.BA
- BARBARO.A:IT
- BARROTES.1310.A
- BLACK.A
- BLIN.1457
- CAFE-AX.1516
- CAP.I
- CAP.K
- CAP.M
- CAP.X
- CAP.Y
- CEBU.B
- CHAOS.B
- CHILL.A
- COLORS.BL
- COLORS.BM
- COLORS.BN
- COLORS.BO
- CONCEPT.AL
- CONCEPT.AR
- CONCEPT.AW
- CONCEPT.AX
- CONCEPT.AY
- CONCEPT.AZ
- CONCEPT.BA
- CONCEPT.BB (US)
- CONCEPT.BC
- CONCEPT.BD
- CONCEPT.BE
- CONCEPT.BF
- CONCEPT.BG
- CONCEPT.BH
- DEMON.A
- DISHONOR.A:DE
- DODGY (UK, Europe)
- DPOP.1168
- DZT.G
- ELYTHNIA
- EPIDEMIC.B:TW
- EPIDEMIC.C:TW
- ERASER.F:TW
- FIRE.A:DE
- FITW_DISK
- FOG.1748
- FORMATS.A (TROJAN)
- FOUR.A
- FRIDAY.D:DE
- FRIDAY.E:DE
- GINGER (Australia)
- GINGER-PEANUT
- GINGER.2774
- GLITTER.1462
- GOLDSECRET.A (Internet)
- GOLDSECRET.B (INTENDED) (Internet)
- HELPER.F
- HELPER.G
- HELPER.H
- HLL.CMP.16052
- HLLO.20621
- HLLP.21037
- HLLT.5850 (Internet)
- HLLT.5850C (Internet)
- HYBRID.G
- HYBRID.H
- ILLITERATE.A
- IMPOSTER.E
- INCARNAT.A
- ISLAND.3551
- IVP.1075
- IVP.1755
- KOH-INSTALL
- KOMPU.E
- KOMPU.F
- LAMOT.744
- LILITH
- LUCIFER.A
- LUNCH.E
- MALARIA.A:TW
- MDMA.V
- MDMA.W
- MDMA.X
- MDMA.Y
- MONDAY.A:TW
- MORPHINE.3500
- MSHARK.889
- MUCK.G
- MUCK.H
- MULTIANI
- MVCK1.B
- MVCK1:KIT
- NAZI.8600
- NJ-WMDLK1.G
- NOP.G
- NOP.M:DE
- NPAD.CE
- NPAD.CF
- NPAD.CG
- NPAD.CH
- NPAD.CI
- NPAD.CJ
- NPAD.CK
- NPAD.CL
- NPAD.CM
- NPAD.CN (Canada)
- NPAD.CO
- NPAD.CP
- NPAD.CQ
- NPAD.CR
- NPAD.CS
- NUCLEAR.O
- NUCLEAR.P
- NUCLEAR.Q
- NUCLEAR.R
- NUKER.A
- OMINOUS.1846
- PAYCHECK.E
- PEACEKEEPER.A
- PEACEKEEPER.B
- PERCENT.A:TW
- RAPI.AL2
- RAZER.A
- REHENES.A (Word6/7)
- RELLIK.A:TW
- SCHUMANN.B:DE
- SETMD.A
- SHIN
- SHOWOFF.BT
- SHOWOFF.BU
- SHOWOFF.BV
- SHOWOFF.BW
- SKIMPOP.1455
- SOCKS.A
- SOPRON.937
- SPOOKY.B:DE
- SPOOKY.C:DE
- STOOPID.353
- SWAPPER.746 (Germany)
- SWLABS.E
- SWLABS.F
- SWLABS.G (US Military)
- TALON.B
- TALON.C
- TALON.D
- TALON.J
- TARGET.B:DE
- TEMPLE.C
- TMC-LEVEL42
- TODAYBOO
- TWOLINES.Q
- TWOLINES.Q1
- VAMPIRE.D:TW
- VAMPIRE.D1:TW
- VAMPIRE.E:TW
- VAMPIRE.F:TW
- VANITAS.2048 (Internet)
- VICOD.532
- VIKING32 (TROJAN)
- VOLCANO.A:IT (INTENDED)
- WAZZU.CF (Canada)
- WAZZU.CJ
- WAZZU.CK
- WIN NUKE (TROJAN)
- WPC_ALAEH.2279 (Phillipines)
- XM/EMPEROR.B:TW
- XM/LAROUX.F
- XM/LAROUX.G
- XM/YOHIMBE.B
- XUTE.1056
- XUTE2.1062
- XUXA.1656
- ZAHAK.960
- ZERO.A:DE
- ZMB.A:DE (Germany)
- ZOOLOG.A (Russia)
-
-
- * NEW VIRUSES CLEANED *
-
- This DAT file cleans the following 174 new viruses.
- Locations that have experienced particular problems
- with specific viruses are also identified.
-
- AL-DITH.1502
- ALEX.599
- ALFONS.1344
- ANDYC.565
- ANDYC.565 DROPPER
- ANGEL.A
- ANT.A:TW
- ANT.C:TW
- ANT.D:TW
- APPDER.G
- APPDER.H
- APPDER.I
- BADSECTOR.3422
- BADSECTOR.3428
- BAJAB.1024
- BANDUNG.AS
- BANDUNG.AT
- BANDUNG.AU
- BANDUNG.AW
- BANDUNG.AX
- BANDUNG.AY
- BANDUNG.AZ
- BANDUNG.BA
- BARBARO.A:IT
- BARROTES.1310.A
- BLACK.A
- CAFE-AX.1516
- CAP.I
- CAP.K
- CAP.M
- CAP.X
- CAP.Y
- CEBU.B
- CHAOS.B
- CHILL.A
- COLORS.BL
- COLORS.BM
- COLORS.BN
- COLORS.BO
- CONCEPT.AW
- CONCEPT.AX
- CONCEPT.AY
- CONCEPT.AZ
- CONCEPT.BA
- CONCEPT.BB (US)
- CONCEPT.BC
- CONCEPT.BD
- CONCEPT.BE
- CONCEPT.BF
- CONCEPT.BG
- CONCEPT.BH
- DEMON.A
- DISHONOR.A:DE
- DODGY (UK, Europe)
- DPOP.1168
- DZT.G
- ELYTHNIA
- EPIDEMIC.B:TW
- EPIDEMIC.C:TW
- FIRE.A:DE
- FITW_DISK
- FORMATS.A (TROJAN)
- FOUR.A
- FRIDAY.D:DE
- FRIDAY.E:DE
- GINGER (Australia)
- GINGER-PEANUT
- GINGER.2774
- GOLDSECRET.A (Internet)
- GOLDSECRET.B (INTENDED) (Internet)
- HELPER.F
- HELPER.G
- HELPER.H
- HLL.CMP.16052
- HLLO.20621
- HLLP.21037
- HLLT.5850 (Internet)
- HLLT.5850C (Internet)
- HYBRID.G
- HYBRID.H
- ILLITERATE.A
- IMPOSTER.E
- INCARNAT.A
- IVP.1075
- IVP.1755
- KOH-INSTALL
- KOMPU.E
- KOMPU.F
- LAMOT.744
- LILITH
- LUCIFER.A
- LUNCH.E
- MALARIA.A:TW
- MDMA.V
- MDMA.W
- MDMA.X
- MDMA.Y
- MONDAY.A:TW
- MSHARK.889
- MUCK.G
- MUCK.H
- MULTIANI
- MVCK1.B
- MVCK1:KIT
- NAZI.8600
- NJ-WMDLK1.G
- NOP.M:DE
- NPAD.CE
- NPAD.CF
- NPAD.CG
- NPAD.CH
- NPAD.CI
- NPAD.CJ
- NPAD.CK
- NPAD.CL
- NPAD.CM
- NPAD.CN (Canada)
- NPAD.CO
- NPAD.CP
- NPAD.CQ
- NPAD.CR
- NPAD.CS
- NUCLEAR.O
- NUCLEAR.P
- NUCLEAR.Q
- NUCLEAR.R
- NUKER.A
- PAYCHECK.E
- PERCENT.A:TW
- RAPI.AL2
- RAZER.A
- RELLIK.A:TW
- SCHUMANN.B:DE
- SETMD.A
- SHIN
- SHOWOFF.BT
- SHOWOFF.BU
- SHOWOFF.BV
- SHOWOFF.BW
- SKIMPOP.1455
- SOCKS.A
- SOPRON.937
- SPOOKY.B:DE
- SPOOKY.C:DE
- STOOPID.353
- SWAPPER.746 (Germany)
- SWLABS.E
- SWLABS.F
- SWLABS.G (US Military)
- TALON.J
- TARGET.B:DE
- TMC-LEVEL42
- TODAYBOO
- TWOLINES.Q
- TWOLINES.Q1
- VAMPIRE.D:TW
- VAMPIRE.D1:TW
- VAMPIRE.E:TW
- VAMPIRE.F:TW
- VANITAS.2048 (Internet)
- VICOD.532
- VOLCANO.A:IT (INTENDED)
- WAZZU.CF (Canada)
- WAZZU.CJ
- WAZZU.CK
- WPC_ALAEH.2279 (Phillipines)
- XM/EMPEROR.B:TW
- XM/LAROUX.F
- XM/LAROUX.G
- XM/YOHIMBE.B
- XUTE.1056
- XUTE2.1062
- XUXA.1656
- ZMB.A:DE (Germany)
- ZOOLOG.A (Russia)
-
- ____________
- KNOWN ISSUES
-
- 1. The new 3000 series DATs contained in VirusScan for
- Windows NT v3.0.3 are not backward compatible with
- the VirusScan v2.x series. The 3000 series DATs should
- not be used with VirusScan v2.x products.
-
- 2. Reported problem with Microsoft Windows NT 4.0 Service
- Pack 2 and anti-virus software. After installing
- Service Pack 2, you may receive a STOP 0x0000000A error
- message when you try to access your CD-ROM drive or
- floppy disk drive while anti-virus software is running.
-
- Solution: Apply the fix that is now available through
- Microsoft. For more information regarding this issue,
- please contact Microsoft Technical Support.
-
- 3. When using Windows NT 4.0 and Microsoft Internet
- Information Server with VirusScan, you must install
- Microsoft Service Pack 2 with the Kernel Hot Fix or
- Service Pack 3 to avoid the following error message:
- STOP 0x0000000A.
-
- 4. When using Windows NT 4.0 and Microsoft Distributed
- File System with VirusScan for Windows NT, you must
- install Microsoft Service Pack 3, or the following
- error message may occur: STOP 0x00000035.
-
- 5. When using Microsoft Services for Macintosh with
- VirusScan for Windows NT, you must install Microsoft
- Service Pack 3 for Windows NT 4.0 (Servicepack 5 for
- Windows NT 3.51) plus the SFM Hotfix, which is
- available through Microsoft. Without these patches
- installed, you may experience a STOP 0x0000000A error.
- Please contact Microsoft Technical Support.
-
- 6. If you have manually uninstalled a previous installation
- of VirusScan for Windows NT, and have not rebooted, a
- silent installation of VirusScan v3.0.3 will fail.
-
- 7. When using an ISeamless Install Script, and running
- setup in standard or silent mode without any parameters,
- setup requires that the custom installation file
- produced by ISeamless be named admin.sis or oem.sis.
-
- 8. If you are upgrading from VirusScan 2.5.3 or 3.0.0 to
- the current version, there are some situations that can
- cause an NT STOP error message. The problem is related
- to the device drivers in the previous product and is
- not related to VirusScan NT 3.0.3. McAfee recommends
- uninstalling previous versions of VirusScan and
- rebooting before installing this release.
-
- 9. When installing using the default Windows NT SYSTEM
- account, some product functionality is not available.
- This includes: alert forwarding to other NT servers,
- sending alerts to printers, scheduled AutoUpdates
- from NT file shares, remote event logging, and sched-
- uled scans of network drives.
-
- 10. When specifying a local user account for VirusScan NT
- service account during installation, please be sure to
- add ".\" before the user name.
-
- 11. When performing a silent install that is upgrading a
- previous version of VirusScan NT, the destination
- directory must be the same as the previous install.
- If it is not the same, the silent install will fail.
-
- 12. Automatic uninstallation of VirusScan sometimes does
- not remove all registry items and files associated
- with VirusScan. See the INSTALLATION section of this
- file for information on manually uninstalling.
-
- 13. On-access scanning of write-protected floppies infected
- with a boot-sector virus may return multiple notific-
- ation messages.
-
- 14. On-access exclusions only apply to local drives.
-
- 15. A McAfee Task Manager session cannot be ended while
- VirusScan is actively scanning. When VirusScan is
- active, the McAfee Task Manager Stop button in the
- Sessions window is greyed out. Attempting to end the
- McAfee Task Manager session from a DOS box will result
- in an error message. You must close the scanning session
- or complete the scan before stopping the McAfee Task
- Manager session.
-
- 16. Alert forwarding through a chain of servers may fail.
-
- ____________
- INSTALLATION
-
- * INSTALLING THE PRODUCT *
-
- To install VirusScan for Windows NT, run SETUP.EXE and
- follow the prompts.
-
- Note: It is not necessary to uninstall VirusScan for
- Windows NT before upgrading to a newer version.
- If, however, VirusScan NT is uninstalled before
- applying the upgrade, you must reboot the system
- and then install the upgraded version.
-
- If you would like to perform a "silent" installation
- of VirusScan NT, you will need to record a setup.iss file,
- then run setup.exe with the -s switch to utilize that file.
-
- Network Administrators can customize the silent
- installation by following the steps below.
-
- 1. Check in the Windows directory to ensure that a
- file named SETUP.ISS does not already exist. If it
- does, rename it, back it up, or delete it.
-
- 2. To record a setup.iss file, run SETUP.EXE with the
- -r switch, (i.e. SETUP.EXE -r).
-
- 3. Select the components you would like to be installed
- during the silent installation. All responses will
- be recorded.
-
- 4. Finish the installation, and locate the file SETUP.ISS
- in the Windows directory.
-
- 5. Locate the section [SdSetupType-0] in the SETUP.ISS
- file and go to the line:
-
- Result=x
-
- where x is equal to
- 301 (Typical installation)
- 302 (Compact installation)
- 303 (Custom installation)
-
- 6. Add 100 to the above value, so that the Result
- variable is equal to 401, 402, or 403. Modifying
- this file will allow the installation to copy the
- VirusScan files to the drive where the operating
- system resides instead of defaulting to the C:
- drive.
-
- 7. Copy the new SETUP.ISS from the Windows directory
- to the location of the installation files.
-
- 8. Run SETUP.EXE with the -s switch (i.e. SETUP.EXE -s).
-
- NOTE: If you do not specify a "recorded" answer for
- all dialog boxes during the initial installation, the
- silent installation will fail.
-
-
- * PRIMARY PROGRAM FILES FOR VIRUSSCAN NT *
-
- Files located in the Install directory:
- =======================================
-
- 1. Installed for the Alert Manager/Console/Server:
-
- README.1ST = McAfee information
- PACKING.LST = Packing list
- VALIDATE.EXE = McAfee file validation
- program
- UPDATE.MSG = Update message file
- SHIELD.HLP = On-access scanner help
- SHIELD.CNT = On-access context-sensitive
- help
- MCCONSOL.HLP = Console help
- VIRUSCAN.HLP = On-demand scanner help
- VIRUSCAN.CNT = On-demand context-sensitive
- help
- NAMES.DAT = Virus names definition data
- SCAN.DAT = Virus scan definition data
- CLEAN.DAT = Virus clean definition data
- MCALYZE.DAT = Virus definition data
- strings
-
- SAMPLE.CMD = Sample alert file
- MCUPDATE.EXE = Update module
- AMGRCNFG.EXE = Alert manager configuration
- program
- FTPGET.CMD = Automatic updating script
- DEISL1.ISU = Uninstall file
- MCSCAN32.DLL = Library files
- MCSRVSHL.EXE = Uninstall application
- MCSERVIC.DLL = Install/uninstall library
- file
- SHUTIL.DLL = Library files
- SVCPWD.EXE = Service account
- configuration program
-
- MODEMS.TXT = Modem initialization
- VIRUSSCAN ACTIVITY LOG.TXT = VirusScan activity log
- RESELLER.TXT = McAfee authorized resellers
- SCAN ACTIVITY LOG.TXT = Scan activity log
- SCANLOG.TXT = Scan log
- WHATSNEW.TXT = What's New document
-
- 2. Installed for Alert Manager:
-
- WCMDR.EXE = Uninstall program
- WCMDR.INI = Uninstall initialization
- file
- DEFAULT.VSC = On-demand scanner default
- configuration settings
- AMGRSRVC.EXE = Alert manager service
- program
- MCALSNMP.DLL = Alert manager SNMP
- POWERP32.DLL = Alert manager support
- module
- VIRNOTFY.EXE = Notification utility
-
- 3. Installed for the Console:
-
- MCCONSOL.EXE = Console manager
- SHSTAT.EXE = Shield status monitor
- program
- SCNSTAT.EXE = Scan status monitor
- program
- SCNCFG32.EXE = Console configuration
- module
- VIRLIST.EXE = Virus list
- SHCFG32.EXE = Console configuration
- module
- MCKRNL32.DLL = Library files
- MCUTIL32.DLL = Library files
- MCALYZE.DLL = Library files
-
- 4. Installed for the Workstation:
-
- SCAN32.EXE = On-demand scanner
- TASKMRG.EXE = Task managing service
- MCCOD32.DLL = Library files
-
-
- Files located in %SYSTEMROOT%\SYSTEM32:
- =======================================
-
- 1. Installed for the Console/Server/Alert Manager:
-
- CTL3D32.DLL = 32-bit 3D Windows
- controls library (*)
-
- (*) File will be installed upon installation of
- VirusScan if the file does not already exist,
- or if an older version is found.
-
-
- Files located in %SYSTEMROOT%\SYSTEM32\DRIVERS:
- ===============================================
-
- 1. Installed for the Workstation:
-
- MCFILTER.SYS = System files
- MCFSREC.SYS = System files
- MCKRNL.SYS = System files
- MCSCAN.SYS = System files
- MCUTIL.SYS = System files
- MCSHIELD.SYS = System files
-
-
- * TESTING YOUR INSTALLATION *
-
- The Eicar Standard AntiVirus Test File is a combined effort
- by anti-virus vendors throughout the world to come up with
- one standard by which customers can verify their anti-virus
- installation.
- To test your installation, copy the following line
- into its own file and name it EICAR.COM.
-
- X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
-
- When done, you will have a 69- or 70-byte file.
-
- When VirusScan for Windows NT is applied to this file,
- Scan will report finding the EICAR-STANDARD-AV-TEST-FILE
- virus.
-
- It is important to know that THIS IS NOT A VIRUS. However,
- users often have the need to test that their installations
- function correctly. The anti-virus industry, through the
- European Institute for Computer Antivirus Research, has
- adopted this standard to facilitate this need.
-
- Please delete the file when installation testing is
- completed so unsuspecting users are not unnecessarily
- alarmed.
-
-
- * MANUALLY UNINSTALLING THE PRODUCT *
-
- 1. Stop the McAfee TaskManager service and the AlertManager
- service in Control Panel/Services.
-
- 2. Stop the VirusScan console if running.
-
- 3. Using the NT Taskmanager, end the SHSTAT process.
-
- 4. If you use SNMP, stop the SNMP service in
- Control Panel/Services.
-
- 5. Delete the VirusScan installation directory (the
- directory that contains the VirusScan executables).
-
- 6. Delete the following device driver files from
- %SYSTEMROOT%\SYSTEM32\DRIVERS:
- MCFSREC.SYS
- MCSCAN.SYS
- MCUTIL.SYS
- MCKRNL.SYS
- MCFILTER.SYS
- MCSHIELD.SYS
-
- 7. If VirusScan was set to load at startup, remove
- the following registry key:
- HKLM\software\microsoft\windows\CurrentVersion\Run\
- Shstatexe
-
- 8. Remove VirusScan installation registry keys:
- HKLM\software\mcafee\alertmanager
- HKLM\software\mcafee\mcalsnmp
- HKLM\software\mcafee\virusscan
-
- 9. Remove VirusScan device driver and service registry
- keys:
- HKLM\system\CurrentControlSet\Services\Alertmanager
- HKLM\system\CurrentControlSet\Services\McFilter
- HKLM\system\CurrentControlSet\Services\McFsrec
- HKLM\system\CurrentControlSet\Services\McKrnl
- HKLM\system\CurrentControlSet\Services\McScan
- HKLM\system\CurrentControlSet\Services\McUtil
- HKLM\system\CurrentControlSet\Services\McShield
- HKLM\system\CurrentControlSet\Services\McTaskManager
-
- 10. If the context-sensitive scanning option was installed,
- remove the following registry keys:
- HKLM\software\classes\comfile\shell\virusscan
- HKLM\software\classes\directory\shell\virusscan
- HKLM\software\classes\drive\shell\virusscan
- HKLM\software\classes\exefile\shell\virusscan
- HKLM\software\classes\word.document.6\shell\virusscan
- HKLM\software\classes\word.document.8\shell\virusscan
- HKLM\software\classes\word.template\shell\virusscan
-
- 11. To remove the Scan for Viruses right-click option,
- remove the following registry keys:
- HKCR\comfile\shell\VirusScan
- HKCR\Directory\shell\VirusScan
- HKCR\Drive\shell\VirusScan
- HKCR\exefile\shell\VirusScan
- HKCR\Excel.Addin\shell\VirusScan
- HKCR\Excel.Chart.5\shell\VirusScan
- HKCR\Excel.Macrosheet\shell\VirusScan
- HKCR\Excel.Sheet.5\shell\VirusScan
- HKCR\Excel.Template\shell\VirusScan
- HKCR\Excel.Workspace\shell\VirusScan
- HKCR\Excel.XLL\shell\VirusScan
- HKCR\exefile\shell\VirusScan
- HKCR\WinZip\shell\VirusScan
- HKCR\Word.Document.6\shell\VirusScan
- HKCR\Word.Template\shell\VirusScan
-
- 12. To remove SNMP extension agent, remove the following
- registry key:
- HKLM\system\CurrentControlSet\services\SNMP\parameters\
- ExtensionAgent\McAlSNMP
-
- 13. Since entries in HkeyClassesRoot are not derived
- from a hive, it is unneccessary to delete these keys
- manually. When you reboot, VirusScan-specific keys
- under HkeyClassesRoot will be removed.
-
- 14. Reboot the system.
-
- _____________
- DOCUMENTATION
-
- For more information, refer to the VirusScan's User's
- Guide, included on the CD-ROM versions of this program
- or available from McAfee's BBS and FTP site. This file
- is in Adobe Acrobat Portable Document Format (.PDF)
- and can be viewed using Adobe Acrobat Reader. This form
- of electronic documentation includes hypertext links
- and easy navigation to assist you in finding answers
- to questions about your McAfee product.
-
- Adobe Acrobat Reader is available on CD-ROM in the
- ACROREAD subdirectory. Adobe Acrobat Reader also can be
- downloaded from the World Wide Web at:
-
- http://www.adobe.com/Acrobat/readstep.html
-
- VirusScan documentation can be downloaded from McAfee's
- BBS or the World Wide Web at:
-
- http://www.McAfee.com
-
- For more information on viruses and virus prevention,
- see the McAfee Virus Information Library, MCAFEE.HLP,
- included on the CD-ROM version of this product or
- available from McAfee's BBS or FTP site.
-
- Documentation feedback is welcome. Send e-mail to
- documentation@cc.mcafee.com.
-
- __________________________
- FREQUENTLY ASKED QUESTIONS
-
- Regularly updated lists of frequently asked questions
- about McAfee products also are available on McAfee's
- BBS, website, and CompuServe and AOL forums.
-
-
- Q: How do I enable Centralized Alerting and Reporting?
-
- A: McAfee's VirusScan now supports Centralized Alerting
- and Reporting to a remote Windows NT server running
- NetShield for Windows NT v2.5.3 or later.
-
- Centralized Alerting and Reporting and be configured
- by an administrator through the anti-virus console.
- To set up this option on your server, check the Enable
- Centralized Alerting checkbox on the Tools/Alerts menu.
- Set up a directory for Centralized Alerting and point
- your workstations to this directory.
-
- To set up this option on your VirusScan client, add the
- following two lines to the AlertOptions section in
- VirusScan NT's DEFAULT.VSC, and/or your custom settings
- file:
-
- szNetworkAlertPath=<directory name>
- bNetworkAlert=1
-
- Note: Administrators will need to configure the .VSC
- file for complete Centralized Alerting & Reporting.
-
- Where the <directory name> is the path (can use UNC
- format where supported)to the remote NT directory.
- From this directory, NetShield can broadcast or
- compile the alerts and reports according to its
- established configuration.
-
- NOTE: The client must have write access to this
- <directory> location and the directory must contain
- the NetShield-supplied CENTALRT.TXT file.
-
- The alert file sent to the server is an .alr text
- file. Upon receipt of the alert file, NetShield NT
- sends an alert message to an administrator and/or
- appropriate personnel.
-
-
- Q: How can I scan mapped Novell drives with scheduled
- on-demand scans?
-
- A: If you want to scan any Novell-server drives
- (mapped or via UNC) from scheduled tasks, you must
- create the same account/password on the Novell server
- as configured under McAfee services on the Windows NT
- system.
-
-
- Q: As an administrator, how can I scan private
- directories that are accessible only to
- individual users?
-
- A: The on-access scanner will detect infected files
- as they are copied into the users' personal
- directories.
-
- On-demand (scheduled) scans are launched by the
- McTaskManager Service. If you specify a user name
- and password for the Service, then the scheduled
- scan will only scan directories for which the user
- name has privileges. If no user name was specified,
- then the Service has SYSTEM privileges.
-
- To perform an on-demand, or scheduled, scan of
- private directories, the McTaskManager Service must
- have access to these private areas. Following are
- two ways to address this issue:
-
- Solution A:
-
- 1. Create a custom user name to be used by the Service.
- 2. Give this user name privileges to access the private
- spaces.
-
- Considerations with Solution A:
- The administrator will need to know the user names
- and passwords.
-
- Solution B:
- 1. Do not associate a user name to the Service.
- 2. Give SYSTEM privileges to access the private spaces.
-
- Considerations with Solution B:
- Someone could create or use a Service to access your
- information.
-
- McAfee recommends Solution B as a more secure solution.
-
-
- Q: VirusScan will not perform an on-demand (scheduled)
- scan of some networked devices. Why?
-
- A: It is possible that the user name you are using for
- the Taskmanager Service does not have sufficient
- rights to scan the devices in question. To verify
- whether this is the issue, log in to each device using
- the user name and password used by the Taskmanager
- Service. Confirm that this user name has rights on
- the device by manually running an on-demand scan. If
- you can scan the device while you're logged in, then
- the Service should also be able to do it as a scheduled
- scan.
-
-
- Q: When performing an on-demand (scheduled) scan of a
- networked device, the system locks up. How can I
- solve this problem?
-
- A: Log on to the device in question and manually run
- an on-demand scan with the Compressed Files option
- turned off. If the scanner locks up, note where it
- locks. Attempt to determine which file VirusScan
- locks on and send the information to McAfee. If the
- scan succeeds, select the Compressed Files option
- and scan the device again. If it locks this time,
- chances are you have a ZIP file that is corrupted
- or large, and it takes time to scan. If scanning
- works in both scenarios, then give the Taskmanager
- Service the same user name and password currently
- logged in as and try a scheduled scan again. If
- this now works, then the old user name didn't have
- sufficient rights to scan the device in question.
-
- Q: Can I update VirusScan's data files to detect
- new viruses?
-
- A: Yes. If you have Internet access, you can download
- updated VirusScan data files from the McAfee Web
- Site, BBS, or other online resources. To download
- from the McAfee Web Site, follow these steps:
-
- 1. Go to the McAfee Web Site (http://www.mcafee.com).
-
- 2. Select Update DAT File in the left hand column
- or frame.
-
- 3. Scroll down, and click Update Your DAT Files to
- update your virus definition files.
-
- 4. Data file updates are stored in a compressed form
- to reduce transmission time. Unzip the files into
- a temporary directory, then copy the files to the
- appropriate directory, replacing your old files.
-
- 5. Before performing any scans, shut down your
- computer, wait a few seconds, and turn it on again.
-
- If you need additional assistance with downloading,
- contact McAfee Download Support at (408) 988-3832.
-
- ______________________
- ADDITIONAL INFORMATION
-
- 1. VirusScan NT includes an external utility,
- VIRNOTFY.EXE, that will notify you in the event that
- McAfee's AlertManager service is not installed. To use
- this utility, open the VirusScan Console, and select
- Tools/Alerts. Add the path and utility to the Program
- To Execute line.
-
- 2. SVCPWD.EXE is a utility for setting and/or changing
- usernames and passwords used in the McAfee services.
-
- SVCPWD requests one command-line parameter which is a
- filename (i.e computers.txt). Use SVCPWD/? to get
- additional command-line information. This file (i.e.
- computers.txt) should contain a list of all the
- computers that you want to modify the service accounts
- (username and password)for.
-
- Example:
-
- \\COMPUTER1
- \\COMPUTER2
- \\SERVER
-
- Start the SVCPWD utility by entering the file as
- command-line (i.e. SVCPWD computers.txt). This utility
- contacts all the computers via the network and changes
- the username and password originally given to McAfee-
- services. The username and password are changed to the
- value that the user is asked to set upon starting the
- utility. All service accounts need to be set to user
- "LocalSystem". If a domain\username is entered, then
- the SVCPWD utility will require a password for the
- domain\username.
-
- When this is completed, the utility contacts all the
- computers and changes the settings.
-
- Note 1: The domain\username that is used by the services
- needs to be an administrative account.
-
- Note 2: The person running this utility must have an
- administrative account for all the computers
- that require such changes.
-
- Note 3: Do not run this utility during an on-demand
- scan.
-
-
- ______________
- CONTACT McAFEE
-
- * FOR QUESTIONS, ORDERS, PROBLEMS, OR COMMENTS *
-
- Contact McAfee's Customer Care department:
-
- 1. Corporate-licensed customers, call (408) 988-3832
- Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time
-
- Retail-licensed customers, call (972) 278-6100
- Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time
-
- 2. Fax (408) 970-9727
- 24-hour, Group III fax
-
- 3. Fax-back automated response system (408) 988-3034
- 24-hour fax
-
- Send correspondence to any of the following McAfee
- locations.
-
- McAfee Corporate Headquarters
- 2805 Bowers Avenue
- Santa Clara, CA 95051-0963
-
- McAfee East Coast Office
- Jerral Center West
- 766 Shrewsbury Avenue
- Tinton Falls, NJ 07724-3298
-
- McAfee Central Office
- 4099 McEwen
- Suites 500 and 700
- Dallas, TX 75244
-
- McAfee Canada
- 139 Main Street
- Suite 201
- Unionville, Ontario
- Canada L3R2G6
-
- McAfee Europe B.V.
- Gatwickstraat 25
- 1043 DL Amsterdam
- The Netherlands
-
- McAfee (UK) Ltd.
- Hayley House, London Road
- Bracknell, Berkshire RG12 2TH
- United Kingdom
-
- McAfee France S.A.
- 50 rue de Londres
- 75008 Paris
- France
-
- McAfee Deutschland GmbH
- Industriestrasse 1
- D-82110 Germering
- Germany
-
- Or, you can receive online assistance through any of the
- following resources:
-
- 1. Bulletin Board System: (408) 988-4004
- 24-hour US Robotics HST DS
-
- 2. Internet e-mail: support@mcafee.com
-
- 3. Internet FTP: ftp.mcafee.com
-
- 4. World Wide Web: http://www.mcafee.com
-
- 5. America Online: keyword MCAFEE
-
- 6. CompuServe: GO MCAFEE
-
- 7. The Microsoft Network: GO MCAFEE
-
- Before contacting McAfee, please make note of the following
- information. When sending correspondence, please include
- the same details.
-
- - Program name and version number
- - Type and brand of your computer, hard drive, and any
- peripherals
- - Operating system type and version
- - Network name, operating system, and version
- - Contents of your AUTOEXEC.BAT, CONFIG.SYS, and
- system LOGIN script
- - Microsoft service pack, where applicable
- - Network card installed, where applicable
- - Modem manufacturer, model, and baud, where
- applicable
- - Relevant browsers/applications and version number,
- where applicable
- - Problem
- - Specific scenario where problem occurs
- - Conditions required to reproduce problem
- - Statement of whether problem is reproducible on demand
- - Your contact information: voice, fax, and e-mail
-
- Other general feedback is also appreciated.
-
-
- * FOR ON-SITE TRAINING INFORMATION *
-
- Contact McAfee Customer Service at (800) 338-8754.
-
-
- * FOR PRODUCT UPGRADES *
-
- To make it easier for you to receive and use McAfee's
- products, we have established a Reseller program to
- provide service, sales, and support for our products
- worldwide. For a listing of McAfee agents near you, click
- Contact McAfee under the Information section on the
- McAfee website.
-
-
-
-