                  Release Notes for
       McAfee(R) AntiSpyware Enterprise Module
                     Version 8.5
           Copyright (C) 2006 McAfee, Inc.
                 All Rights Reserved

==========================================================


Thank you for using AntiSpyware Enterprise Module
software. This file contains important information
regarding this release. We strongly recommend that
you read the entire document.


    IMPORTANT:

    McAfee does not support automatic upgrading of a
    pre-release version of the software. To upgrade
    to a later beta release, a release candidate, or
    a production release of the software, you must
    first uninstall the existing version of the
    software.


__________________________________________________________
WHAT'S IN THIS FILE

-   Introduction
-   Installation & System Requirements
-   Known Issues
   -   General
   -   Access Protection
   -   ePolicy Orchestrator(R)
       - AntiSpyware Enterprise Module Policies
       - Reports
       - Upgrading
   -   McAfee Installation Designer(TM)
-   Documentation
-   Participating in the McAfee Beta Program
-   Contact Information
-   Copyright & Trademark Attributions
-   License & Patent Information


__________________________________________________________
INTRODUCTION

The McAfee AntiSpyware Enterprise Module adds on to
the VirusScan Enterprise 8.5i product. The module
provides additional sets of anti-spyware access
protection rules and the ability to examine cookies
in the cookies folder, the registry, and files
running in memory. VirusScan Enterprise uses its
technology and these features to provide additional
protection against adware, spyware, and other
unwanted programs.

__________________________________________________________
INSTALLATION AND SYSTEM REQUIREMENTS

Please see the product documentation for complete
information on installation and system
requirements.


__________________________________________________________
KNOWN ISSUES

GENERAL

1.  This 8.5 version of the AntiSpyware Enterprise
    Module works only with VirusScan Enterprise
    8.5i. It does not work with other versions of
    VirusScan Enterprise.


ACCESS PROTECTION

1.  Access protection may report or block access to
    network applications if "Automatically detect
    settings" is enabled in Internet Options. The
    "Anti-spyware Standard Protection: Protect
    Internet Explorer favorites and settings" rule
    prevents attempts to write to the registry
    value:
   "REGISTRY\User\USERID\SOFTWARE\MICROSOFT\Windows\CURRENTVERSION\Internet
              Settings\Conncections\DefaultConnectionSettings

    This registry value is where proxy settings are
    stored.

    Review the Access Protection Log to determine
    which executable files are triggering access
    violations, then add exclusions for executables
    that you legitimately use.


ePOLICY ORCHESTRATOR(R)

AntiSpyware Enterprise Module Policies

1.  The AntiSpyware Enterprise Module is an add-on
    to VirusScan Enterprise. Consequently, after you
    install the VSEMAS85.NAP file in the ePolicy
    Orchestrator Repository you configure the
    modules policies from the VirusScan Enterprise
    8.5 policy pages.


Reports

1.  Where can I find anti-spyware scan results in
    ePolicy Orchestrator?

    Since the AntiSpyware Enterprise Module is an
    add-on to the VirusScan Enterprise product, scan
    results are reported in the "Reporting" console
    under "Reports|Anti-Virus|VirusScan8.5."

    The "Top Ten Unwanted Programs" report provides
    information about spyware and cookie
    detections.

2.  How can I filter report results to include or
    exclude cookie detections?

    Use the data filter feature with the "Top Ten
    Unwanted Programs" report to filter the report
    results. For example, to filter cookies in the
    report:
    Data Filter Tab: Detection
    Condition: Starting with or Not Starting With
    Term/Variable: Cookie


Upgrading

1.  When upgrading from VirusScan Enterprise 8.0i
    with the AntiSpyware Enterprise Module 8.0
    installed to VirusScan Enterprise 8.5i with the
    AntiSpyware Enterprise Module 8.5, the upgrade
    sequence is:

    Initial conditions:

   a.  ePolicy Orchestrator Agent version 3.6 or
       later deployed.

   b.  Client computer with VirusScan Enterprise
       version 8.0i and the AntiSpyware Enterprise
       Module version 8.0 installed.

   c.  ePolicy Orchestrator 3.5.0 or later version
       deployment task set to install VirusScan
       Enterprise version 8.5i and the AntiSpyware
       Enterprise Module version 8.5 on the client
       computer.


   From the client computer:

   a.  The ePolicy Orchestrator Agent gets the new
       deployment task and sets it up on queue, if
       scheduled to run at a specific time.

   b.  Deployment task is invoked and begins the
       VirusScan Enterprise 8.5i installation.

   c.  After VirusScan Enterprise 8.5i successfully
       installs, ePolicy Orchestrator Agent
       initiates an "Update now" task to check for
       any product updates:

       Default Repository = ePolicy Orchestrator
       3.5.0 or later version.

   d.  After the "Update" task completes, the
       installation of the AntiSpyware Enterprise
       Module version 8.5 begins.

   e.  When the deployment task completes, ePolicy
       Orchestrator Agent reports a new Anti-Virus
       product is installed on the next ASCI to
       ePolicy Orchestrator and updates client
       computer properties on the ePolicy
       Orchestrator console.

    Depending on the quality and type of network
    connection between the ePolicy Orchestrator
    server and the client computer, you can take the
    following steps to ensure that everything is
    installed as expected:

   -   From ePolicy Orchestrator Deployment Task
       Settings, select and enable the "Run this
       task at" option.

   -   From ePolicy Orchestrator Deployment Task
       Settings, select and enable the "Run missed
       task" option.


MCAFEE INSTALLATION DESIGNER(TM)

1.  By default, when you create an AntiSpyware
    Enterprise Module installation package with
    McAfee Installation Designer, then deploy that
    package via ePolicy Orchestrator, the
    installation is loud. To deploy the package
    silently, use command line arguments, such as
    /S, on the "Add Program" page while creating the
    package in the McAfee Installation Designer.


__________________________________________________________
DOCUMENTATION

Documentation is included on the product CD and/or
is available with a valid grant number from the
McAfee download site:

       https://secure.nai.com/us/forms/downloads/upgrades/login.asp

    NOTE:
    Unless otherwise noted, product documentation
    comes as Adobe Acrobat .PDF files. The product
    CD includes the latest version of Acrobat
    Reader, or you can download any version from the
    Adobe web site:

       http://www.adobe.com/products/acrobat/readstep2.html



STANDARD DOCUMENTATION

This product includes the following documentation
set:

-   Guide
    Introduction to the product and its features;
    detailed instructions for configuring the
    software; information on deployment, recurring
    tasks, and operating procedures.

-   Release Notes (this ReadMe file)

-   LICENSE Agreement
    The McAfee License Agreement booklet that
    includes all of the license types you can
    purchase for your product. The License Agreement
    presents general terms and conditions for use of
    the licensed product.



SUPPLEMENTAL DOCUMENTATION

-   VirusScan Enterprise 8.5i Installation Guide

-   VirusScan Enterprise 8.5i Product Guide

-   VirusScan Enterprise 8.5i Configuration Guide

-   VirusScan Enterprise 8.5i Release Notes
    (Readme)

-   ePolicy Orchestrator 3.5 or later version
    Product Guide

-   McAfee Installation Designer 8.5 Product Guide


__________________________________________________________
PARTICIPATING IN THE MCAFEE BETA PROGRAM

To download new beta software or to read about the
latest beta information, visit the McAfee beta web
site located at:
       http://www.mcafeesecurity.com/us/downloads/beta/mcafeebetahome.htm

To submit beta feedback on any McAfee product, send
e-mail to:
       mcafee_beta@mcafee.com

McAfee is devoted to providing solutions based on
your input.


__________________________________________________________
CONTACT INFORMATION

THREAT CENTER:  McAfee Avert(R) Labs
    Homepage
       http://www.mcafee.com/us/threat_center/default.asp

    Avert Labs Threat Library
       http://vil.nai.com/

    Avert Labs WebImmune & Submit a Sample (Logon
    credentials required)
       https://www.webimmune.net/default.asp

    Avert Labs DAT Notification Service
       http://vil.nai.com/vil/signup_DAT_notification.aspx

DOWNLOAD SITE
    Homepage
       http://www.mcafee.com/us/downloads/

   -   Product Upgrades (Valid grant number
       required)
   -   Security Updates (DATs, engine)
   -   HotFix and Patch Releases
       -   For Security Vulnerabilities (Available
           to the public)
       -   For Products (ServicePortal account and
           valid grant number required)
   -   Product Evaluation
   -   McAfee Beta Program

TECHNICAL SUPPORT
    Homepage
       http://www.mcafee.com/us/support

    KnowledgeBase Search
       http://knowledge.mcafee.com/

    McAfee Technical Support ServicePortal (Logon
    credentials required)
       https://mysupport.mcafee.com/eservice_enu/start.swe

CUSTOMER SERVICE
   Web:       http://www.mcafee.com/us/support/index.html
              http://www.mcafee.com/us/about/contact/index.html

   Phone:     +1-888-VIRUS NO or +1-888-847-8766
              Monday-Friday, 8 a.m.-8 p.m., Central
              Time
              US, Canada, and Latin America
              toll-free

PROFESSIONAL SERVICES
   -   Enterprise:
       http://www.mcafee.com/us/enterprise/services/index.html

   -   Small & Medium Business:
       http://www.mcafee.com/us/smb/services/index.html


_____________________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

Copyright (C) 2006 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced,
transmitted, transcribed, stored in a retrieval
system, or translated into any language in any form
orbyany means without the written permission of
McAfee, Inc., or its suppliers or affiliate
companies.


TRADEMARKS

ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY
(AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN
(STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT,
EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE,
GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA),
INTRUSHIELD, INTRUSION PREVENTION THROUGH
INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE
AND DESIGN, MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS,
NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD,
NUTS & BOLTS, OIL CHANGE, PRIMESUPPORT, SPAMKILLER,
THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM,
VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA),
WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are
registered trademarks or trademarks of McAfee, Inc.
and/or its affiliates in the US and/or other
countries. The color red in connection with security
is distinctive of McAfee brand products. All other
registered and unregistered trademarks herein are
the sole property of their respective owners.


_____________________________________________________
LICENSE & PATENT INFORMATION
LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE
LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU
PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND
CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF
YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE
ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED
LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE
RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A
BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE
AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED
THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF
THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE
PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A
FULL REFUND.


LICENSE ATTRIBUTIONS

This product includes or may include:
*Software developed by the OpenSSL Project for use
in the OpenSSL Toolkit (http://www.openssl.org/).
*Cryptographic software written by Eric A. Young
and software written by Tim J. Hudson. *Some
software programs that are licensed (or sublicensed)
to the user under the GNU General Public License
(GPL) or other similar Free Software licenses which,
among other rights, permit the user to copy, modify
and redistribute certain programs, or portions
thereof, and have access to the source code. The GPL
requires that for any software covered under the
GPL, which is distributed to someone in an
executable binary format, that the source code also
be made available to those users. For any such
software covered under the GPL, the source code is
made available on this CD. If any Free Software
licenses require that McAfee provide rights to use,
copy or modify a software program that are broader
than the rights granted in this agreement, then such
rights shall take precedence over the rights and
restrictions herein. *Software originally written
by Henry Spencer, Copyright 1992, 1993, 1994, 1997
Henry Spencer. *Software originally written by
Robert Nordier, Copyright (C) 1996-7 Robert Nordier.
*Software written by Douglas W. Sauder. *Software
developed by the Apache Software Foundation
(http://www.apache.org/). A copy of the license
agreement for this software can be found at
www.apache.org/licenses/LICENSE-2.0.txt.
*International Components for Unicode ("ICU")
Copyright (C)1995-2002 International Business
Machines Corporation and others. *Software
developed by CrystalClear Software, Inc., Copyright
(C)2000 CrystalClear Software, Inc. *FEAD(R)
Optimizer(R) technology, Copyright Netopsystems AG,
Berlin, Germany. *Outside In(R) Viewer Technology
(C)1992-2001 Stellent Chicago, Inc. and/or Outside
In(R) HTML Export, (C) 2001 Stellent Chicago, Inc.
*Software copyrighted by Thai Open Source Software
Center Ltd. and Clark Cooper, (C) 1998, 1999, 2000.
*Software copyrighted by Expat maintainers.
*Software copyrighted by The Regents of the
University of California, (C) 1996, 1989, 1998-2000.
*Software copyrighted by Gunnar Ritter. *Software
copyrighted by Sun Microsystems, Inc., 4150 Network
Circle, Santa Clara, California 95054, U.S.A., (C)
2003. *Software copyrighted by Gisle Aas. (C)
1995-2003. *Software copyrighted by Michael A.
Chase, (C) 1999-2000. *Software copyrighted by Neil
Winton, (C)1995-1996. *Software copyrighted by RSA
Data Security, Inc., (C) 1990-1992. *Software
copyrighted by Sean M. Burke, (C) 1999, 2000.
*Software copyrighted by Martijn Koster, (C) 1995.
*Software copyrighted by Brad Appleton, (C)
1996-1999.  *Software copyrighted by Michael G.
Schwern, (C)2001. *Software copyrighted by Graham
Barr, (C) 1998. *Software copyrighted by Larry Wall
and Clark Cooper, (C) 1998-2000. *Software
copyrighted by Frodo Looijaard, (C) 1997. *Software
copyrighted by the Python Software Foundation,
Copyright (C) 2001, 2002, 2003. A copy of the
license agreement for this software can be found at
www.python.org. *Software copyrighted by Beman
Dawes, (C) 1994-1999, 2002. *Software written by
Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek (C)
1997-2000 University of Notre Dame. *Software
copyrighted by Simone Bordet & Marco Cravero, (C)
2002. *Software copyrighted by Stephen Purcell, (C)
2001. *Software developed by the Indiana University
Extreme! Lab (http://www.extreme.indiana.edu/).
*Software copyrighted by International Business
Machines Corporation and others, (C) 1995-2003.
*Software developed by the University of
California, Berkeley and its contributors.
*Software developed by Ralf S. Engelschall
<rse@engelschall.com> for use in the mod_ssl project
(http:// www.modssl.org/). *Software copyrighted by
Kevlin Henney, (C) 2000-2002. *Software copyrighted
by Peter Dimov and Multi Media Ltd. (C) 2001, 2002.
*Software copyrighted by David Abrahams, (C) 2001,
2002. See http://www.boost.org/libs/bind/bind.html
for documentation. *Software copyrighted by Steve
Cleary, Beman Dawes, Howard Hinnant & John Maddock,
(C) 2000. *Software copyrighted by Boost.org, (C)
1999-2002. *Software copyrighted by Nicolai M.
Josuttis, (C) 1999. *Software copyrighted by Jeremy
Siek, (C) 1999-2001. *Software copyrighted by
Daryle Walker, (C) 2001. *Software copyrighted by
Chuck Allison and Jeremy Siek, (C) 2001, 2002.
*Software copyrighted by Samuel Krempp, (C) 2001.
See http://www.boost.org for updates, documentation,
and revision history. *Software copyrighted by Doug
Gregor (gregod@cs.rpi.edu), (C) 2001, 2002.
*Software copyrighted by Cadenza New Zealand Ltd.,
(C) 2000. *Software copyrighted by Jens Maurer,
(C)2000, 2001. *Software copyrighted by Jaakko
Jrvi (jaakko.jarvi@cs.utu.fi), (C)1999, 2000.
*Software copyrighted by Ronald Garcia, (C) 2002.
*Software copyrighted by David Abrahams, Jeremy
Siek, and Daryle Walker, (C)1999-2001. *Software
copyrighted by Stephen Cleary (shammah@voyager.net),
(C)2000. *Software copyrighted by Housemarque Oy
<http://www.housemarque.com>, (C) 2001. *Software
copyrighted by Paul Moore, (C) 1999. *Software
copyrighted by Dr. John Maddock, (C) 1998-2002.
*Software copyrighted by Greg Colvin and Beman
Dawes, (C) 1998, 1999. *Software copyrighted by
Peter Dimov, (C) 2001, 2002. *Software copyrighted
by Jeremy Siek and John R. Bandela, (C) 2001.
*Software copyrighted by Joerg Walter and Mathias
Koch, (C) 2000-2002. *Software copyrighted by
Carnegie Mellon University (C) 1989, 1991, 1992.
*Software copyrighted by Cambridge Broadband Ltd.,
(C) 2001-2003. *Software copyrighted by Sparta,
Inc., (C) 2003-2004. *Software copyrighted by
Cisco, Inc and Information Network Center of Beijing
University of Posts and Telecommunications, (C)
2004. *Software copyrighted by Simon Josefsson, (C)
2003. *Software copyrighted by Thomas Jacob, (C)
2003-2004. *Software copyrighted by Advanced
Software Engineering Limited, (C) 2004. *Software
copyrighted by Todd C. Miller, (C) 1998. *Software
copyrighted by The Regents of the University of
California, (C) 1990, 1993, with code derived from
software contributed to Berkeley by Chris Torek.

PATENTS
Protected by U.S. Patents 6,496,875 and 6,668,289.

DBN-004-EN

V3.1.4


