Release Notes for McAfee(R) Security for Mac Version 1.0 Copyright (C) 2009 McAfee, Inc. All Rights Reserved. ========================================================== - Beta Release Date: May, 2009. ========================================================== Thank you for using McAfee Security version 1.0 software. This file contains important information regarding this release. We recommend that you read the entire document. __________________________________________________________ WHAT'S IN THIS FILE - About this release - New features - System requirements and installation - Hardware and software requirements - Removing third-party anti-virus software and associated files - Uninstalling the existing Non-Windows Agent or McAfee Agent - Installing McAfee Security - Standard installation - Silent installation - Testing your installation - Uninstalling McAfee Security - Known issues - Known issues with McAfee Security - Documentation - Participating in the McAfee beta program - Contact information - Copyright and trademark attributions - License information __________________________________________________________ ABOUT THIS RELEASE McAfee Security 1.0 uses advanced heuristics and protects your Apple computer from viruses, Trojan horses, spyware, and other malware. It scans files, folders, applications, local or network mounted volumes to find a threat, vulnerability, or other potentially unwanted code and creates a detection report. Scanning can take place immediately, at a specified time, at regularly-scheduled intervals, or each time an item is accessed. IMPORTANT: - The beta version of McAfee Security software expires on August 31, 2009. - The ePolicy Orchestrator manageability feature is not supported for beta release. It will be available in the released product. NEW FEATURES - Enhanced graphical user interface. - A new dashboard displaying: - Information on the latest scanning and updating events - Date and time of the last DAT (virus signatures) update - On-access scanning and spyware scanning status - A “History” page displaying the name, type, and date/time of all the events - A shortcut icon on the menu bar enabling easy access to the McAfee Security software - Support for spyware scanning Additionally, McAfee Security 1.0 supports: - Quarantining detected items - A new detection report called “McAfee Alert” - Running multiple on-demand scans immediately - Enabling and disabling separate exclusions for on-access scan and on-demand scan - Extended set of primary and secondary actions __________________________________________________________ SYSTEM REQUIREMENTS AND INSTALLATION HARDWARE AND SOFTWARE REQUIREMENTS - Mac OS X Tiger (10.4.6 or later) or Mac OS X Leopard (10.5 or later) operating system - PowerPC or Intel-based Macintosh computer - 512 MB or higher RAM - Minimum 120 MB of free disk space (300 MB recommended) IMPORTANT: While installing McAfee Security v1.0 beta, all previous versions of the product installed on your computer are overwritten. REMOVING THIRD PARTY ANTI-VIRUS SOFTWARE AND ASSOCIATED FILES The McAfee Security installation process stops if you have previously installed Norton, VirusBarrier, or Sophos anti-virus software on your Mac OS X computer. After you uninstall Norton, VirusBarrier or Sophos, some files may remain on your computer, which causes problems when you try to install McAfee Security. To resolve this issue, remove the following files (if they exist) before you continue with installation. - Sophos (SAVI.framework) Path: /Library/Frameworks/SAVI.framework - Norton (NAVLibX) Path: /Library/Application Support/Norton Solutions Support/Norton Antivirus/Engine/NAVLibX - Norton (NAVLibX.bundle) Path: /Library/Application Support/Norton Solutions Support/Norton AntiVirus/Engine/NAVLibX.bundle - VirusBarrier (VirusBarrier.kext) Path: /Library/StartupItems/VirusBarrier/VirusBarrier.kext - Intego VirusBarrier x5 Path: /Applications/VirusBarrier X5.app NOTE: McAfee Security 1.0 does not co-exist with any third party anti-virus software. UNINSTALLING THE EXISTING NON-WINDOWS AGENT OR MCAFEE AGENT Before installing McAfee Security 1.0, uninstall the existing Non-Windows Agent or McAfee Agent from your computer. PREREQUISITE: You must have administrator rights to uninstall Non-Windows Agent or McAfee Agent from your computer. - To uninstall Non-Windows Agent: Type the following command in the Terminal window and press ‘return’: sudo /Library/NETAepoagt/cmduninst - To uninstall McAfee Agent: Type the following command in the Terminal window and press ‘return’: sudo /Library/McAfee/cma/uninstall.sh NOTE: To open the Terminal window, double-click the Terminal application located under /Application/Utilities or click the Terminal icon in the dock. If you do not uninstall Non-Windows Agent or McAfee Agent before installing McAfee Security, an alert appears at the initial stage of the installation process prompting you to uninstall them. INSTALLING MCAFEE SECURITY McAfee Security can be installed through a standard (graphical interface) installation or a command-line (silent) installation. STANDARD INSTALLATION PREREQUISITES: - You must have administrator rights to install McAfee Security. - Installing McAfee Agent 4.0 is mandatory to install McAfee Security 1.0. 1. Double-click "McAfee Security.mpkg". The "Welcome to the McAfee Security Installer" page appears. 2. Follow the on-screen instructions to install the software. NOTE: The McAfee Security installer installs the McAfee Security application under /Applications. SILENT INSTALLATION 1. Locate the "McAfee Security.mpkg" file in the DMG file downloaded from the McAfee website, then save it to a temporary location. 2. Open the Terminal window and change the working folder to the one where you saved the "McAfee Security.mpkg" file. NOTE: To open the Terminal window, double-click the Terminal application located under /Application/Utilities or click the Terminal icon in the dock. 3. Type the following command and press "return": sudo installer -pkg McAfeeSecurity.mpkg –target / 4. Type your password when prompted. A message appears when the installation is complete. TESTING YOUR INSTALLATION You can test McAfee Security by using the European Institute of Computer Anti-Virus Research (EICAR) standard anti-virus test file. This file is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus software. To test your installation: 1. Go to the EICAR.ORG website http://www.eicar.org and download the antivirus test file "Eicar.zip". 2. Run the on-demand scanner on the downloaded ZIP file. McAfee Security will report finding the EICAR test file. If the test is successful, you are ready to start using the McAfee Security software. UNINSTALLING MCAFEE SECURITY McAfee Security can be uninstalled through the command-line option. To uninstall McAfee Security: 1. In the Terminal window, change the directory to /usr/local/McAfee, then type the following command and press "return". ./uninstallMSC 2. When prompted, type your password and press "return". When the uninstallation process completes, the Terminal displays a message stating that McAfee Security 1.0 beta version is uninstalled from your computer. __________________________________________________________ KNOWN ISSUES 1. McAfee Security 1.0 beta version is not compatible with Mac OS X Leopard on 512MB G4 (PowerPC/iMac) computers. 2. Apple remote desktop application crashes when McAfee Security is installed through Apple Remote Desktop. 3. Backup/restore operations may take a longer time or fail if on-access scanner is enabled or if an item is detected. 4. Time Machine backup/restore fails if the backup/restore includes the Quarantine folder with quarantined items. 5. McAfee Security does not work when migrated to another computer using Apple Migration Assistant. 6. VShieldScanManager and VShieldScanners stops responding while disk cloning. 7. On-demand scan does not function if your account is in Microsoft Active Directory. 8. During installation, you cannot create a custom quarantine folder on a FileVault-enabled user home directory. 9. Product user interface does not refresh automatically. 10. Archive scanning must be enabled for both the on-access and on-demand scanners to scan Apple Mails correctly. 11. After installing McAfee Security on Mac OS X Tiger 10.4.6 or later, you must log off, then log on for the McAfee Security shortcut icon to appear and to display the McAfee Alert screen upon detections. 12. If multiple users are logged on to the computer, the McAfee Security shortcut icon and McAfee Alert screen may not appear for all users after McAfee Security is installed. 13. Two McAfee Security shortcut icons appear on a computer with PowerPC G5 – Leopard operating system. 14. The "Reset" button under Anti-malware Preferences, resets all on-access scan, on-demand scan, and exclusion settings. 15. Adding the startup disk to the exclusion list excludes the entire hard disk drive from being scanned. 16. On Mac OS X Tiger operating system, sorting quarantined items by path or date and time is disabled. 17. McAfee Alert screen and VirusScan.log displays multiple "detected items found" messages for a single detection. This occurs when multiple processes access the same infected file. __________________________________________________________ DOCUMENTATION The beta release of this product includes the following documentation set: - McAfee Security Release Notes — This file describes the product features, last-minute additions or changes to the documentation, any known behavior or other issues with the product release, and describes the installation process. This ReadMe is available in the Documentation folder of the product package. - License — The McAfee License Agreement (.PDF) booklet that includes all of the license types you can purchase for your product. The License Agreement gives general terms and conditions for the use of the licensed product. Read it carefully. If you install the product, you agree to the license terms. This McAfee Software License agreement is available in the Documentation folder of the product package. __________________________________________________________ PARTICIPATING IN THE MCAFEE BETA PROGRAM To download new beta software or to read about the latest beta information, visit the McAfee beta web site located at: http://www.mcafeesecurity.com/us/downloads/beta/mcafeebetahome.htm To submit beta feedback on any McAfee product, send e-mail to: mcafee_beta@mcafee.com McAfee is committed to providing solutions based on your input. __________________________________________________________ CONTACT INFORMATION THREAT CENTER: McAfee Avert(R) Labs Homepage http://www.mcafee.com/us/threat_center/default.asp Avert Labs Threat Library http://vil.nai.com/ Avert Labs WebImmune & Submit a Sample (Logon credentials required) https://www.webimmune.net/default.asp Avert Labs DAT Notification Service http://vil.nai.com/vil/signup_DAT_notification.aspx DOWNLOAD SITE Homepage http://www.mcafee.com/us/downloads/ - Product upgrades (Valid grant number required) - Security updates (DATs, engine) - Hotfix and patch releases - For security vulnerabilities (Available to the public) - For products (ServicePortal account and valid grant number required) - Product evaluation - McAfee beta program MCAFEE BETA PROGRAM Download site: http://www.mcafeesecurity.com/us/downloads/beta/mcafeebetahome.htm E-mail to submit beta feedback: mcafee_beta@mcafee.com TECHNICAL SUPPORT Homepage http://www.mcafee.com/us/support KnowledgeBase Search http://knowledge.mcafee.com/ McAfee Technical Support ServicePortal (Logon credentials required) https://mysupport.mcafee.com/eservice_enu/start.swe CUSTOMER SERVICE Web: http://www.mcafee.com/us/support/index.html http://www.mcafee.com/us/about/contact/index.html Phone: +1-888-VIRUS NO or +1-888-847-8766 Monday-Friday, 8am-8pm, Central Time US, Canada, and Latin-America toll-free PROFESSIONAL SERVICES Enterprise: http://www.mcafee.com/us/enterprise/services/index.html Small & Medium Business: http://www.mcafee.com/us/smb/services/index.html __________________________________________________________ COPYRIGHT AND TRADEMARK ATTRIBUTIONS Copyright (C) 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARKS ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN, MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE, PRIMESUPPORT, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM,VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. _____________________________________________________ LICENSE INFORMATION LICENSE AGREEMENT NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. LICENSE ATTRIBUTIONS This product includes or may include: * Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). * Cryptographic software written by Eric A. Young and software written by Tim J. Hudson. * Some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL, which is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee provide rights to use, copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the rights and restrictions herein. * Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. * Software originally written by Robert Nordier, Copyright (C) 1996-7 Robert Nordier. * Software written by Douglas W. Sauder. * Software developed by the Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at www.apache.org/licenses/LICENSE-2.0.txt. * International Components for Unicode ("ICU") Copyright (C) 1995-2002 International Business Machines Corporation and others. * Software developed by CrystalClear Software, Inc., Copyright (C) 2000 CrystalClear Software, Inc. * FEAD(R) Optimizer(R) technology, Copyright Netopsystems AG, Berlin, Germany. * Outside In(R) Viewer Technology (C) 1992-2001 Stellent Chicago, Inc. and/or Outside In(R) HTML Export, (C) 2001 Stellent Chicago, Inc. * Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper, (C) 1998, 1999, 2000. * Software copyrighted by Expat maintainers. * Software copyrighted by The Regents of the University of California, (C) 1996, 1989, 1998-2000. * Software copyrighted by Gunnar Ritter. * Software copyrighted by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A., (C) 2003. * Software copyrighted by Gisle Aas. (C) 1995-2003. * Software copyrighted by Michael A. Chase, (C) 1999-2000. * Software copyrighted by Neil Winton, (C) 1995-1996. * Software copyrighted by RSA Data Security, Inc., (C) 1990-1992. * Software copyrighted by Sean M. Burke, (C) 1999, 2000. * Software copyrighted by Martijn Koster, (C) 1995. * Software copyrighted by Brad Appleton, (C) 1996-1999. * Software copyrighted by Michael G. Schwern, (C) 2001. * Software copyrighted by Graham Barr, (C) 1998. * Software copyrighted by Larry Wall and Clark Cooper, (C) 1998-2000. * Software copyrighted by Frodo Looijaard, (C) 1997. * Software copyrighted by the Python Software Foundation, Copyright (C) 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org. * Software copyrighted by Beman Dawes, (C) 1994-1999, 2002. * Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek (C) 1997-2000 University of Notre Dame. * Software copyrighted by Simone Bordet & Marco Cravero, (C) 2002. * Software copyrighted by Stephen Purcell, (C) 2001. * Software developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/). * Software copyrighted by International Business Machines Corporation and others, (C) 1995-2003. * Software developed by the University of California, Berkeley and its contributors. * Software developed by Ralf S. Engelschall for use in the mod_ssl project (http:// www.modssl.org/). * Software copyrighted by Kevlin Henney, (C) 2000-2002. * Software copyrighted by Peter Dimov and Multi Media Ltd. (C) 2001, 2002. * Software copyrighted by David Abrahams, (C) 2001, 2002. See http://www.boost.org/libs/bind/bind.html for documentation. * Software copyrighted by Steve Cleary, Beman Dawes, Howard Hinnant & John Maddock, (C) 2000. * Software copyrighted by Boost.org, (C) 1999-2002. * Software copyrighted by Nicolai M. Josuttis, (C) 1999. * Software copyrighted by Jeremy Siek, (C) 1999-2001. * Software copyrighted by Daryle Walker, (C) 2001. * Software copyrighted by Chuck Allison and Jeremy Siek, (C) 2001, 2002. * Software copyrighted by Samuel Krempp, (C) 2001. See http://www.boost.org for updates, documentation, and revision history. * Software copyrighted by Doug Gregor (gregod@cs.rpi.edu), (C) 2001, 2002. * Software copyrighted by Cadenza New Zealand Ltd., (C) 2000. * Software copyrighted by Jens Maurer, (C) 2000, 2001. * Software copyrighted by Jaakko Järvi (jaakko.jarvi@cs.utu.fi), (C) 1999, 2000. * Software copyrighted by Ronald Garcia, (C) 2002. * Software copyrighted by David Abrahams, Jeremy Siek, and Daryle Walker, (C) 1999-2001. * Software copyrighted by Stephen Cleary (shammah@voyager.net), (C) 2000. * Software copyrighted by Housemarque Oy , (C) 2001. * Software copyrighted by Paul Moore, (C) 1999. * Software copyrighted by Dr. John Maddock, (C) 1998-2002. * Software copyrighted by Greg Colvin and Beman Dawes, (C) 1998, 1999. * Software copyrighted by Peter Dimov, (C) 2001, 2002. * Software copyrighted by Jeremy Siek and John R. Bandela, (C) 2001. * Software copyrighted by Joerg Walter and Mathias Koch, (C) 2000-2002. * Software copyrighted by Carnegie Mellon University (C) 1989, 1991, 1992. * Software copyrighted by Cambridge Broadband Ltd., (C) 2001-2003. * Software copyrighted by Sparta, Inc., (C) 2003-2004. * Software copyrighted by Cisco, Inc and Information Network Center of Beijing University of Posts and Telecommunications, (C) 2004. * Software copyrighted by Simon Josefsson, (C) 2003. * Software copyrighted by Thomas Jacob, (C) 2003-2004. * Software copyrighted by Advanced Software Engineering Limited, (C) 2004. * Software copyrighted by Todd C. Miller, (C) 1998. * Software copyrighted by The Regents of the University of California, (C) 1990, 1993, with code derived from software contributed to Berkeley by Chris Torek. V3.1.4