⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 patch4.txt

📁 基于低成本传感器的捷联惯导对准方案研究
💻 TXT
📖 第 1 页 / 共 3 页
字号:
 Release Notes for McAfee(R) VirusScan(R) Enterprise
                    Version 8.5i
                       Patch 4
           Copyright (C) 2007 McAfee, Inc.
                 All Rights Reserved


==========================================================

Patch Release:    October 16 2007

This release was developed and tested with:

- VirusScan Enterprise:8.5i
- DAT Version:         5126, September 24 2007
- Engine Version:      5.2.00

Make sure you have installed these versions, or
better, before using this release.

==========================================================


Thank you for using VirusScan(R) Enterprise
software. This file contains important information
regarding this release. We strongly recommend that
you read the entire document.


The attached files are provided as is, and with no
warranty either expressed or implied as to their
suitability for any particular use or purpose.
McAfee, Inc. assumes no liability for damages
incurred either directly or indirectly as a result
of the use of these files, including but not limited
to the loss or damage of data or systems, loss of
business or revenue, or incidental damages arising
from their use. Patch files should be applied only
on the advice of McAfee Technical Support, and only
when you are actually experiencing the issue being
addressed by the Patch. Patch files should not be
proactively applied in order to prevent potential
product issues. You are responsible for reading and
following all instructions for preparation,
configuration, and installation of Patch files.
Patch files are not a substitute or replacement for
product Service Packs which may be released by
McAfee, Inc. It is a violation of your software
license agreement to distribute or share these files
with any other person or entity without written
permission from McAfee, Inc. Further, posting of
McAfee Patch files to publicly available Internet
sites is prohibited. McAfee, Inc. reserves the right
to refuse distribution of Patch files to any company
or person guilty of unlawful distribution of McAfee
software products. Questions or issues with McAfee
Patch files should be directed to McAfee Technical
Support.



__________________________________________________________
WHAT'S IN THIS FILE

-   About This Release
   -   Purpose
   -   Patch 4 Resolved Issues
   -   Patch 3 Resolved Issues
   -   Patch 2 Resolved Issues
   -   Patch 1 Resolved Issues
   -   Known Issues
   -   Files Included With This Release
-   Installation
   -   Installation Requirements
   -   Installation Steps
   -   Installation Steps via ePolicy Orchestrator
   -   HotFix/Patch Reporting
   -   Verifying the Installation
   -   Removing the Patch
-   Contact Information
-   Copyright & Trademark Attributions
-   License Information


__________________________________________________________
ABOUT THIS RELEASE


PURPOSE

This release contains updated binaries in a single
Microsoft Patch installer to address all items
listed in "Resolved Issues" below.

For the most update-to-date copy of this Readme
information, refer to McAfee Support KnowledgeBase
article 613984.

__________________________________________________________
RESOLVED ISSUES

The resolved issues are divided into subsections per
patch, showing when each fix was added to the
compilation.

PATCH 4 RESOLVED ISSUES

1.  ISSUE:
    A crash can occur on some systems when the
    On-Demand Scan Task includes the "Memory for
    rootkits" scan item.

    RESOLUTION:
    The root kit detection driver has been updated
    to better handle different processor
    architectures.

2.  ISSUE:
    When a Quarantine Restore Task is run from
    ePolicy Orchestrator without specifying a
    restore item, the Scan32.exe process runs a full
    scan and does not exit properly, leaving the
    process orphaned.

    RESOLUTION:
    The VirusScan plug-in has been updated to check
    if a restore item is specified. If not, the
    restore task does not run.

3.  ISSUE:
    The VirusScan On-Demand Scanner has no option to
    disable cookie detection alerts in the user
    interface or registry.

    RESOLUTION:
    Alerts for On-Demand Scan cookie detections can
    now be disabled by setting the DWORD
    "bCookieAlerts" registry entry to 0.

    HKLM\SOFTWARE\McAfee\VSCore\Alert Client\VSE

4.  ISSUE:
    When a user is browsing the Internet, the
    On-Access Scanner sometimes logs entries "Not
    scanned (The file is encrypted)" on temporary
    files that are locked for use by the browser.

    RESOLUTION:
    The reporting for these types of detections can
    now be disabled by setting the registry DWORD
    value "DoNotReportSkippedFiles" to 1.

    HKLM\SOFTWARE\McAfee\VSCore\On Access
    Scanner\McShield\Configuration

    NOTE:
    If you previously installed VSE85HF328421, the
    registry entry "DoNotReportSkippedFiles" is
    already set to 1.

5.  ISSUE:
    In environments where the Lotus Notes data
    folder is in a non-standard location, the
    VirusScan Scanner for Lotus Notes installer
    might crash during installation of VirusScan.

    RESOLUTION:
    The VirusScan Scanner for Lotus Notes
    installation files have been updated so that the
    search behavior for notes.ini is more resilient
    to custom Lotus Notes client locations.

6.  ISSUE:
    A crash can occur, where the VirusScan Scanner
    for Lotus Notes failed to initialize properly if
    the first scanned attachment of a session was
    stored in a non-standard attachment format.

    RESOLUTION:
    The VirusScan Scanner for Lotus Notes library
    was changed so that the initialization code
    occurs before the attachment prefixed file name
    handling occurs.

7.  ISSUE:
    With Self Protection enabled, the ability to
    unblock a connection from a remote computer is
    grayed out, even though the logged-on user has
    administrator privileges.

    RESOLUTION:
    VirusScan Statistics has been updated to check
    the credentials of the logged-on user, rather
    then the access level of our services, to
    determine if the "Unblock All Connections Now"
    button should be available.

8.  ISSUE:
    Installation of this Patch enables the option
    "Enable on-access scanning at system startup" if
    it was previously disabled.

    RESOLUTION:
    The Patch installer has been corrected to
    properly preserve the setting.

9.  ISSUE:
    The Patch installer returns a success code, even
    if the Patch failed to install.

    RESOLUTION:
    The Patch installer has been corrected so that
    it only returns a success code if it is actually
    successful.

10. ISSUE:
    Installing the Patch on a system that had only
    one Unwanted Programs exclusion causes that
    exclusion to fail.

    RESOLUTION:
    The installer now corrects a problem where the
    DetectionExclusions registry value was being
    changed from REG_MULTI_SZ to REG_SZ if only one
    value existed.

11. ISSUE:
    On Windows Vista, the administrator cannot
    disable the On-Access Scanner via the VirusScan
    system tray icon.

    RESOLUTION:
    VirusScan Statistics has been updated to check
    the user's logged on credentials, rather then
    the service handle that was used to determine
    access to the McShield service in older
    operating systems.

12. ISSUE:
    A failed reinstallation of VirusScan or a failed
    Patch installation can delete the license,
    resulting in an inoperable product.

    RESOLUTION:
    The Patch installer has been updated to no
    longer cause this state in the event of a failed
    installation.

13. ISSUE:
    An incorrect rule file was packaged with the
    VirusScan NAP file included with Patch 3. This
    caused some of the Access Protection rule
    categories to not appear.

    RESOLUTION:
    A new VirusScan NAP file was created with a
    corrected rule file.

14. ISSUE:
    When Host IPS is installed with VirusScan
    Enterprise, and IPS is disabled, the interface
    for VirusScan Buffer Overflow Protection remains
    grayed out, even though it is active.

    RESOLUTION:
    The Buffer Overflow console plug-in was updated
    to check for the registry flag that is set by
    Host IPS, to tell VirusScan Enterprise that IPS
    is disabled.

15. ISSUE:
    When Self Protection is enabled on a remote
    machine and a user attempts open a remote
    console connection to that machine, the user
    receives an access denied message, and the
    remote console is not opened.

    RESOLUTION:
    The VirusScan Console was updated to make the
    connection to the remote console more robust.


PATCH 3 RESOLVED ISSUES

1.  ISSUE:
    A D1 bugcheck (blue screen) can occur with
    VirusScan Enterprise 8.5i when installed on
    heavily loaded servers.

    RESOLUTION:
    The Access Protection driver has been updated to
    resolve the issue.

2.  ISSUE:
    A D1 bugcheck (blue screen) can occur with
    VirusScan Enterprise 8.5i when installed on a
    Microsoft Exchange server.

    RESOLUTION:
    The Access Protection driver has been updated to
    resolve the issue.

3.  ISSUE:
    An 8E bugcheck (blue screen) was reported by
    customers and in Microsoft抯 Online Crash
    Analysis (OCA), showing a crash in an
    instruction that could not ordinarily fail.

    RESOLUTION:
    The Link Driver was revised to bring it into
    compliance with guidelines specified in Intel抯
    Core2 Errata AI33, to prevent such unusual
    behavior on affected processors.

4.  ISSUE:
    A 7E bugcheck (blue screen) can occur with
    certain low resource conditions.

    RESOLUTION:
    The Link Driver has been updated to better
    handle scenarios where the system is low on
    resources.

5.  ISSUE:
    On 64-bit systems, VirusScan Statistics causes
    an issue where the user cannot open more then
    one Microsoft Virtual PC image. Virtual PC
    reports insufficient memory.

    RESOLUTION:
    VirusScan Statistics has been updated to resolve
    a memory utilization problem on 64-bit systems.

6.  ISSUE:
    When integrated with the Checkpoint SecureClient
    software, VirusScan Enterprise uses incorrect
    registry values for DAT and Engine version
    information.

    RESOLUTION:
    The binaries for Checkpoint integration have
    been updated to use appropriate registry data.

7.  ISSUE:
    With Access Protections rules set to Maximum
    Security, during the installation, VirusScan
    Enterprise Checkpoint integration fails to query
    the On-Access Scanner service state.

    RESOLUTION:
    The binaries for Checkpoint integration have
    been updated to no longer request a certain
    level of access to the service, which would be
    denied by the higher level of Access Protection
    security.

8.  ISSUE:
    Custom VirusScan Enterprise 8.5i policies are
    lost after upgrading from ePolicy Orchestrator
    3.5 to 3.6.x.

    RESOLUTION:
    The VirusScan NAP file has been updated to
    include additional xml code for mapping policies
    between ePolicy Orchestrator 3.5 and 3.6.x.

    NOTE:
    To migrate the policies correctly, follow the
    instructions under "Installation Steps."


PATCH 2 RESOLVED ISSUES

1.  ISSUE:
    When an AutoUpdate task copies new DAT files
    into the engine folder, VirusScan services and
    Microsoft Outlook can spike CPU utilization in
    excess of one minute.

    RESOLUTION:
    The McTaskManager service has been enhanced so
    that it no longer issues multiple reload
    notifications to the scanners after a DAT
    update.

    NOTE:
    Users who saw a smaller spike after the original
    fix (HF320829) should see more improvement with
    this fix.

2.  ISSUE:
    The Quarantine path cannot be changed for the
    On-Access Scanner via ePolicy Orchestrator or
    Protection Pilot. A registry value was not being
    updated correctly.

    RESOLUTION:
    VirusScan抯 Management Plug-In has been updated

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -