What's New in McAfee VirusScan v4.0.2 for Windows 95 and Windows 98 Copyright (c) 1994-1998 by Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. Thank you for using McAfee VirusScan for Windows 95 and Windows 98. This What's New file contains important information regarding this release. Network Associates strongly recommends that you read the entire document. Network Associates welcomes your comments and suggestions. Please use the information provided in this file to contact Customer Care or technical support. ___________________ WHAT'S IN THIS FILE - New Features - Known Issues - Installation - Documentation - Frequently Asked Questions - Contacting Network Associates ____________ NEW FEATURES 1. A new Network Associates scanning engine is at the heart of VirusScan v4.0.2. Created and backed by the combined efforts of the McAfee Labs and Dr Solomon anti-virus research teams, this engine delivers outstanding virus detection and cleaning rates. The new engine also detects viruses in nearly all of the popular compressed file formats. 2. A new Emergency Disk wizard now guides you through the process of formatting a floppy disk, copying necessary files to it, and preparing the disk for use. To make your Emergency Disk bootable, be sure to select the Copy System Files checkbox in the Format dialog box when it appears. The Emergency Disk you create is now easier to use and more powerful than in previous VirusScan versions. When you run a scan operation from the Emergency Disk you create, you can choose the .DAT files to use for that operation from a simple menu arrangement. Choosing the .DAT files installed on your hard disk allows you to run more powerful scan operations. 3. A new VShield Properties dialog box groups the configuration options for VShield's long-standing System Scan module with those for its new E-mail Scan, Internet Filter, and Download Scan modules. For even quicker and easier setup, VShield includes a configuration wizard that enables the most common scanning options for an excellent balance between system performance and virus protection. Now you can set up VShield in one quick pass and get complete protection from viruses and malicious software at all potential points of entry. 4. Download Scan also examines other files you choose to download, while the Internet Filter module detects hostile Java applets and ActiveX controls. You can also configure Internet Filter to block access to specific undesirable sites. With this broad focus, VirusScan seals all points of entry for viruses and other malicious software. 5. New versions of VirusScan Command Line components give VirusScan for Windows 95 and Windows 98 powerful and up-to-date protection for command-line environments. 6. Specialized scanners help to protect your MAPI-based and cc:Mail corporate e-mail systems against virus threats. Use VShield to scan and clean your corporate e-mail systems in the background, in a continuous sweep. Supplement VShield's E-mail Scan protection with VirusScan's new on-demand E-mail Scan component, which lets you initiate a scan operation on MAPI-compliant Microsoft Exchange or Outlook mailboxes. VShield's Download Scan module, meanwhile, checks e-mail you receive via popular Internet mail applications. 7. VShield will start looking for viruses in new mail that you receive in your MAPI mailbox while you are logged in to your MAPI mail server. In this way, VShield provides you with continuous, real-time anti-virus protection for your MAPI-based e-mail, whichever profile you use. You can set VShield to clean any viruses it finds in your e-mail, or have VShield delete or move the infected files to a quarantine folder. To have VirusScan look for viruses in old mail or mail that you receive while offline, start a scan operation with VirusScan's on-demand E-Mail Scan component. 8. VirusScan's heuristic scanning technology evaluates the probability that a file or a macro might be infected by a new, unidentified virus. You can choose to use heuristic scanning to look for file-infecting viruses, macro viruses, or both. 9. A revamped VShield Security module allows you to protect individual property pages for any VShield module against unauthorized changes. Use it to keep others who use your computer from making changes, or configure VShield with those settings you want all users on your network to have, then distribute password-protected settings files to enforce a network-wide anti-virus security policy. 10. VirusScan includes new versions of its AutoUpdate and AutoUpgrade utilities with a host of new features. These include the ability to add multiple update and upgrade sites, the ability to "force" .DAT file updates in order to repair corrupted files, and the ability to generate separate log files, if necessary. The new AutoUpdate and AutoUpgrade versions also run scheduled update and upgrade operations "silently," without requiring any user intervention. 11. A rewritten VirusScan Scheduler replaces the AV Console component included with previous VirusScan versions. It now includes right-click functionality that allows you to create new tasks and view activity logs directly from the task list. An enhanced scheduling function allows you to run your tasks at a random interval within 60 minutes of the time you set for them. This feature allows you to avoid clogging network bandwidth with simultaneous update or upgrade requests, or cross- network scanning tasks. 12. VirusScan's Setup utility can now preserve the settings from previous VirusScan versions. This feature also works during regularly scheduled AutoUpgrade tasks-- the new VirusScan version will retain the settings from the old version, including the settings that point to the location of upgrade files. 13. VirusScan detects and cleans files infected with the Win95/CIH and Win95/Marburg viruses. These viruses infect Windows 95 and Windows 98 portable executable (PE) files. A portable executable file is a Windows resource file that other executable files can share --examples include dynamic linking library (.DLL) files. 14. The new scanning engine also includes improved detection and cleaning capability for the W97M/Class, W97M/Groov, and XM/COMPAT.A viruses, along with a new strain of the XF/PAIX virus. * NEW VIRUSES DETECTED * **** IMPORTANT NOTE **** Because the previous VirusScan scanning engine and the new Network Associates scanning engine identify and classify viruses in different ways, the .DAT files included with this VirusScan release do not include a list of viruses cleaned. Future releases will incorporate this information, once McAfee Labs adopts a standard virus naming convention. With this release, the new scanning engine and the included 4002 .DAT files detect a total of 24,707 viruses and variants, Trojan horse files, and other malicious software. Of this number these 311 viruses are new: A97M/LOADED A97M/MDLC AARDWOLF.448 ABBA.9849.C ACG.BOG2 ACG.BOG2.DR ACID.603 ACY.790 ALAR.MP.4873 ALAR.MP.6047 ALAR.MP.6047DR ALE.1911 AMORPH.OW.367 ANGARSK.238 ANNI.237 ANNI.253 ANNIV.507 ANTI-FORTRAN.GR ATOM.580 ATOM.GR BAP.MP.1536.A BAP.MP.1536.C BIRGIT.310 BLACK ADDER.1015 BMBB.GR BMF.533 BOOJUM.GR BUZZ.GR BV/BATARJ BV/FINEKILL.96 BV/MF.351 BW.1096 BW.1105 BW.1328 BW.1343 BW.MAYBERRY.EXAMP.472 BYTE WARRIOR.1214 CAE.1739 CARRIERS CARRIERS.DR CEZAR.C CHA-CHA.GR CHINA.882 CLUSTER.CAV.277.B CPP.GR CRP.500 CRP.GR DARK AVENGER.1801E.DR DEAD.306 DEMENTIA.GR2 DIE DIW.GR DMSETUP.J DNA.1206.B EATRICH.GR ENMITY.GR ERASE.669 ERIN.GR ESTONIA.GR ETERNITY.601 ETERNITY.601DR ETERNITY.GR EUMEL.GR FINDME.235DR FK.OW.658 FOO.GR FRIEND.CMP.329 FRIEND.CMP.357 GENERATOR.WWPE NON GENERATOR.ZOMBIE NON GLITCH.374 GRADE.956 GRNCATERPILLAR.1588 GRODNO.399 HAIL.673 HANKO.4167 HAPPY HARDCORE.2123 HCARRY.OW.850 HLL.CMP.7200 HLL.CMP.8210 HLL.CMP.GODSQUAD HLL.OW.4601 HLL.OW.6726 HLL.OW.6726.UNP HLL.OW.7451 HLL.OW.7451.UNP HLLP.16196A HLLP.16196B HLLP.7299 HLLP.7299.UNP HLLP.9652 HLLT.3779B HLLT.4109B HLLT.4631 HLLT.5326 HLLT.5326.UNP HLLT.KRILE.5055 IAM.GR IMF.OW.754 INNOX.GR ISLY.624 JAK.211 JAK.254 JAK.OW.120 JAK.OW.144 JAK.OW.196 JDC.1165 JIB.CMP.600 KAMPI.4181 KELA.B.3265 KELLIE.521 KEYB.342 KEYPRESS.1003 KHIZHNJAK.549 KNAVE.534 KORV.3214 KOTHS.2462 KOV.1721 KURELUQUE.GR KVH.530 LAMERMAN.MP LEVEL3.4872 LG.GR LLP.791 LUPUS.532 MABUHAY.GR MANDRA.GR MARIANO.CMP MDRG.544 MEDITATION.1196 MESSEV.GR MIKE.CAV.282 MORGOTH.GR MPC.1045 MPC.614 MPC7.GR5 MPCB.397C MUNYA.1870 MWIN.A MWIN.B MWIN.C MWIN.D NECROPOLIS.OW NPOX.568 NRLG.1027 NRLG.GR NUTCRACKER.2722DR OC.OW OCEAN.GR ODESSA.GR1 ODESSA.OW OLIVIA.2316DR ONE-HALF.3579DR ONE-HALF.MP.3579 ONE-HALF.MP.3591 ONE-HALF.MP.DR.3544 ORCE.OW PARINT.2858 PARINT.GR3 POFU.MP.3800 POFU.MP.3800DR QRES.665 QRES.GR1 QUILT.654 QUIT.GR RAPE.2887B README.1077 README.1077DR RENEG.OW.1842 SISTERS.2181 SKANK.GR SLUG.880 SPANSKA.4270 SPHINX.2578 SPHINX.DR.2578 SPIC SPOOKY.GR STEP.1000 SVCA.1689G TARGET.645 TIGER.790 TIMID.497C TINY.179 TINY.195 TRIVIAL.B.OW TRIVIAL.N.OW TRIVIAL.OW.57 TSUNAMI.2961 TVED.TEST.DR.B UNDERCUT.1147 VANQ.688 VANQ.688DR VICE.629 W32/BORGES.CMP W97M/ASTIA W97M/BREAK W97M/BRENDA W97M/CARRIER.B W97M/CASC W97M/CHACK W97M/CLASS.I W97M/CLASS.O W97M/CLASS.S W97M/COLA W97M/COLDAPE.A W97M/CONCEPT.CM W97M/DREAMS.B W97M/GIT W97M/IIS.B W97M/INEXIST W97M/JEDI.B W97M/KOMPU.O W97M/LAZY.B W97M/LENA W97M/MDMA W97M/MINIMAL.E W97M/MINIMAL.P W97M/MINIMAL.R W97M/MINIMAL.S W97M/MINIMAL.W W97M/MINIMAL.Z W97M/NICEDAY.Z W97M/NIGHTSHADE.D W97M/NOTTICE.J W97M/OUTBREAK.A W97M/OUTBREAK.B W97M/PROTECED W97M/SIG W97M/SIN W97M/SMAC.A W97M/SMAC.B W97M/SOS W97M/STEROID.GEN W97M/SWLABS.T W97M/TWNO.AC W97M/VERM W97M/VMPCK1.AX W97M/VMPCK1.AZ W97M/VMPCK1.V W97M/WAZZU.FE W97M/WAZZU.FF W97M/WAZZU.FI WARMAKER.MP.5747 WEREWOLF.1361C WEREWOLF.DR1361C WHITE NOISE.DR WHITE NOISE.GR WIN95/EVIL.A WIN95/EVIL.B WIN95/FONO.DR WIN95/HAZLO WM/ABER WM/ALLIANCE.I WM/BODY WM/CIAO WM/DIVINA.U WM/FERIAS WM/FRIES WM/HAWK WM/IVANA.D WM/KANN.B WM/KOMPU.M WM/KOMPU.N WM/LUPITA WM/MATEY WM/MINIMAL.AC WM/NICEDAY.Y WM/NJ-DLK1.P WM/NOP.Z WM/ODYSSEUS WM/ODYSSEUS.KIT WM/SPY.B WM/SWLABS.T WM/VERM WM/VIVI WM/WAZZU.FJ WM/WAZZU.FM WM/WHY.DR X97M/CAULI X97M/EXTRAS.J X97M/EXTRAS.L X97M/LAROUX.AU.GEN X97M/LAROUX.FB X97M/LAROUX.FG X97M/LAROUX.FO.GEN X97M/LAROUX.FP.GEN X97M/LAROUX.FS X97M/LAROUX.FU X97M/LAROUX.Q X97M/VCX X97M/VCX.C XANY.143B XANY.191B XANY.316 XANY.336 XANY.979 XANY.GR12 XANY.GR9 XBM.2401 XM/LAROUX.FG XM/LAROUX.FJ XM/LAROUX.FP.GEN XM/RIOTS XM/SOLDIER XRCV.ANNA.737 XRES.632 XRES.980 YITZ.OW.367 YOWLER.A YOWLER.DR ZMANIA.CMP The INTERNET.DAT component of the 4002 .DAT files included with this release enables VirusScan to detect these 130 hostile Java classes: ALLTARGETS.CLASS ANIMATIONSOURCE.CLASS ANIMATIONSOURCEAPPLET.CLASS APPLETKILLER.CLASS APPSTATUS.CLASS ARCTEST.CLASS ASSASSIN.CLASS ATTACKER.CLASS ATTACKTH.CLASS AUDIOKILLER.CLASS BANKINSPECT.CLASS BARAPPLET.CLASS BEGINNER.CLASS BLINK.CLASS BLUESCREEN.CLASS BUMCHANGE.CLASS CALCULAT.CLASS CHANGEBANK.CLASS CHART.CLASS CHATOUREXPRESS.CLASS CLIENT.CLASS CONSUME.CLASS CRASHCOM405.CLASS DELETEFILE.CLASS DGCLOCK.CLASS DISKHOG.CLASS DOMYWORK.CLASS DOUBLETROUBLE.CLASS DUPE.CLASS DYNAPPLET.CLASS EI.CLASS ERRORMES.CLASS EXAMPLE0.CLASS EXECTEST.CLASS EXITTEST.CLASS FILEINFO.CLASS FIXJAVA.CLASS FORGER.CLASS FRACTION.CLASS FTPUSERSAPPLET.CLASS GEN.CLASS GENFRACTION.CLASS GETAPPLETCL.CLASS GRAPH.CLASS HIJACKER.CLASS HOSECOM404.CLASS HOSEMOCH.CLASS HOSTILETHREADS.CLASS HUGOBANE1.CLASS HUGOBANE3.CLASS HUGOBANE5.CLASS IMAGEBANK.CLASS INSPECTCLIENT3.CLASS INSPECTSERVERTHREAD.CLASS IRRITANT.CLASS JAVAMAIL.CLASS JFSAPPLET.CLASS JLPR.CLASS JMUSH.CLASS LETTERBOARD.CLASS LETTERBUTTON.CLASS LIFEGAME.CLASS LOADLIBRARY.CLASS LOGIN.CLASS LOGINSER.CLASS MANDELTEST.CLASS MOUSECHASE.CLASS MOUSECHASEEXCEPTION.CLASS MUTATOR.CLASS MYTIMER.CLASS NERVOUSI.CLASS NETSCOPE.CLASS NEWLOADER.CLASS NOISYBEAR.CLASS OWNNET.CLASS PENPAL.CLASS PORT25.CLASS PUBLICEN.CLASS READFILE.CLASS REPLACEPROPERTIESFILE.CLASS REPORT.CLASS REPORTSERVERSOCKET.CLASS RM.CLASS SCANALYZER.CLASS SCAPEGOAT.CLASS SEETHEWEB.CLASS SELLDRUGS.CLASS SENDMAILAPPLET.CLASS SENDTEST.CLASS SEXY.CLASS SHORTCUT.CLASS SHOWBASICREADS.CLASS SILENTTH.CLASS SIMPLETEXT.CLASS SLOWERKILLER.CLASS SOLARVENGEANCERT.CLASS STARFIELD3.CLASS STARSMEN.CLASS STEALSTUFF.CLASS STRANGEBREW.CLASS TARGET.CLASS TELESCRIVENTE.CLASS TELNET.CLASS TELNETGUI.CLASS TELNETGUI2.CLASS THREADKILLER.CLASS TICKERTAPE.CLASS TICKET.CLASS TICKETHOLDER.CLASS TICKETREADER.CLASS TOURGUIDE.CLASS TRALLALA.CLASS TRIPLEFRAME.CLASS TRIPLETHREAT.CLASS TRIPLETHREAT2.CLASS TUMBLEITEM.CLASS TUMBLINTEXT.CLASS TURNTRICKS.CLASS UNGRATEFUL.CLASS UNPLUGGED.CLASS VALUEBOX.CLASS VIRUS.CLASS WASTEFUL.CLASS WEBMAILER.CLASS WIDGET.CLASS WORDMANAGER.CLASS WORDMEISTER.CLASS WRITEFILE.CLASS XYZAPP.CLASS ZEALAND.CLASS The INTERNET.DAT component of the 4002 .DAT files included with this release enables VirusScan to detect these six hostile ActiveX controls: EXPLODER.OCX NETLIST.CAB NETLIST.OCX RUNNER.OCX SLINGSHOT.CAB SLINGSHOT1.CAB ____________ KNOWN ISSUES 1. Using DOS memory managers might cause VirusScan to falsely detect viruses in memory. Since Windows 95 and Windows 98 no longer require DOS memory managers, you can eliminate false warnings by preceding each line in your CONFIG.SYS file that includes settings for a DOS memory manager with REM. This deactivates the memory manager. To learn more about working with your CONFIG.SYS file, see your DOS or Windows documentation. 2. If you use a password to protect your VShield configuration options, VShield will ask you for that password whenever you open the VShield Properties dialog box. Use your mouse to click inside the text box provided in order to enter the password--keyboard shortcuts will not work. Microsoft acknowledges this issue in its Knowledge Base Article ID #Q84133. Next, click OK to use the password you enter. To close the password verification dialog box without entering a password, click Cancel. 3. Disk defragmentation programs move files as they work to maximize hard disk efficiency. If you have VShield, VirusScan, or other applications active during a disk defragmentation operation, your disk defragmentation program might tell you that it cannot find the active application files. This is normal and does not mean that the files do not exist. To avoid error messages like this, close all open applications and disable VShield, then run your disk defragmentation operation again. 4. VShield will not detect infected files within a .zip archive if you have Novell's Client32 installed on your computer, and you: * Use Universal Naming Convention (UNC) notation to navigate to a directory on a NetWare server that contains the infected archive; and * Extract the infected files from the archive into the same directory. To avoid this problem, map a drive letter on your computer to the target directory on the NetWare server before you extract the compressed files. To ensure maximum anti-virus protection for your NetWare servers, install and use NetShield NetWare from Network Associates. 5. If you ask VShield to prompt you for an action when it finds a virus or a hostile object and you choose to have VShield move the infected file to a quarantine directory, VShield does not retain the correct filename for the infected file. Instead, VShield renames the infected file as it moves it. As a result, the infected file appears on the hard disk with a completely different filename and a .TMP extension. If you tell VShield to move infected files to a quarantine directory automatically, however, the program will retain the correct file names. 6. If VShield detects a virus in a file that you try to open from within another application, by default it will display a dialog box that lists range of possible responses for you to take. If you then choose to clean the infected file, the application that you use to open the newly cleaned file will tell you that it cannot do so. To work around this limitation, click OK to close the error message, then try to open the file again. The application should open the file successfully on the second try. This issue does not occur if VShield lists your response options in a full-screen alert message. If you choose to clean the file when you see this alert, you may open the newly cleaned file without difficulty. To set VShield so that it displays the full-screen alert message, open the VShield Properties dialog box to the System Scan property page, then click the Action tab. Select the Continue Access checkbox, then click OK to close the VShield Properties dialog box. To learn more about configuring VShield's response options, see "Using VShield" in the VirusScan User's Guide. 7. If you start your computer with a VirusScan Emergency Disk that you created, the Emergency Disk utility will quit to a command prompt when it detects and cleans a boot sector infection. To ensure that you have removed all infecting viruses from your system, Network Associates recommends that you use the Emergency Disk to restart your computer again, then run another scan operation, before you restart your computer normally. 8. VirusScan will detect and remove the XF/SIC.A virus from infected Microsoft Excel documents. If you later use Excel 97 to open a file from which VirusScan has removed this virus, Excel will tell you that it cannot find a particular worksheet within the file at a particular cell reference. It will also tell you that continuing could damage your worksheet and ask you whether you want to cancel your request to open the file. The worksheet name it mentions will vary. You may safely open the worksheet. Click No in the confirmation dialog box to continue. To prevent the message from reappearing, open the document in Excel, then click the Insert menu, point to Name, then choose Define. In the dialog box that appears, delete the entries Auto_Open and Auto_Close. Save and close the file normally. 9. VirusScan's Internet Filter module does not block any IP addresses you have asked it to block if you connect to the Internet through America Online. ____________ INSTALLATION * INSTALLING VIRUSSCAN * 1. Insert the floppy disk or compact disc with your copy of VirusScan into your floppy disk drive or CD-ROM drive. If you downloaded a compressed copy of VirusScan from the Network Associates website or other electronic service, create a temporary directory on your hard disk or on a disk available on your network, then extract the files you downloaded into that directory. 2. Click Start in the Windows taskbar, then choose Run. 3. Type x:\setup.exe in the Run dialog box to start the installation utility from a floppy disk. To start the utility from a CD-ROM, type x:\win95\setup.exe. In both cases, x is the drive letter that designates your floppy drive or your CD-ROM drive. If you extracted files that you downloaded to your hard disk or to a disk on your network, specify the path to the correct directory. For example, type C:\DOWNLOAD\SETUP.EXE. 4. Click OK to continue. The VirusScan installation wizard will start. Follow the instructions shown on each wizard pane to choose the VirusScan options you want. 5. When you finish your installation, restart your computer. * PRIMARY PROGRAM FILES FOR VIRUSSCAN * Note: The specific files you see on your computer will depend on the type of license you purchased. Your VirusScan copy might not include some of these files. Files installed to the VirusScan program directory: _INST32I.EX_ File used in uninstallation _SETUP.DLL File used in uninstallation _SETUP32.LIB File used in uninstallation ADVGUI.DLL Advanced interface Dynamic Link Library file ALLDRIVE.VSC VirusScan settings file AVCONSOL.EXE VirusScan Scheduler AVCONSOL.INI VirusScan Scheduler settings file BOOTSCAN.EXE Emergency Disk command line scanner BROWSENT.DLL Dynamic Link Library file CDFW800.DLL Dynamic Link Library file for cc:Mail Scan CDMW800.DLL Dynamic Link Library file for cc:Mail Scan CFGCOM32.DLL Dynamic Link Library file CFW800.DLL Dynamic Link Library file for cc:Mail Scan CHKVXD.EXE VShield check file CHRSET32.DLL Dynamic Link Library file for cc:Mail Scan CIW800.DLL Dynamic Link Library file for cc:Mail Scan CLEAN.DAT Virus definitions file CMW800.DLL Dynamic Link Library file for cc:Mail Scan CONFIG32.EXE VirusScan Configuration Program CONFWIZ.EXE VShield Configuration Wizard CSH.DLL Dynamic Link Library file for Help DEFAULT.VSC Default VirusScan settings file DEFAULT.VSH Default VShield settings file DEISL1.ISU File used in uninstallation DMIALERT.DLL Dynamic Link Library File for DMI Alerting DOMAINX.DAT Banned URL definitions file EDISK.EXE Emergency Disk Creation Wizard program EDWIZ16.EXE Emergency Disk utility program EMALSCAN.DLL Dynamic Link Library file for MAPI on-access and on-demand scanning EMCLEAN.DAT Emergency Disk Virus definitions file EMNAMES.DAT Emergency Disk Virus definitions file EMSCAN.DAT Emergency Disk Virus definitions file INETWH16.DLL Dynamic Link Library File INETWH32.DLL Dynamic Link Library File INTERNET.DAT Hostile Applet definitions file IPSCANX.DAT Banned IP definitions file LICENSE.DAT License definitions file LICENSE.TXT License agreement file MCARCHIV.DLL Dynamic Link Library file for Compressed file scanning MCKRNL32.DLL Dynamic Link Library file MCSCAN32.DLL Dynamic Link Library file MCUPDATE.EXE AutoUpdate and AutoUpgrade program file MCUTIL32.DLL Dynamic Link Library file MCZIP32.DLL Dynamic Link Library file for Send Virus utility MEDB632.DLL Dynamic Link Library file for cc:Mail Scan MESSAGES.DAT Message strings definitions file MEW800.DLL Dynamic Link Library file for cc:Mail Scan MFLDR32.DLL Dynamic Link Library file NAMES.DAT Virus definitions file PKGDESC.INI Package description file PACKING.LST Packing list file PRESERVE.INI Preserved settings file README.1ST License agreement file RESELLER.TXT Network Associates resellers list file RWABS16.DLL Dynamic Link Library file for Emergency Disk creation RWABS32.DLL Dynamic Link Library file for Emergency Disk creation S95EXT.DLL Dynamic Link Library file SCAN.DAT Virus definitions file SCAN.EXE Command-line scan program SCAN_C.VSC VirusScan settings file SCAN32.EXE VirusScan graphical user interface scanning program SCAN86.EXE DOS command line scan program SCANPM.EXE Protected mode command line scan program SCRSCAN.EXE Screen Saver scan program SCRSCANP.DLL Dynamic Link Library file for ScreenScan SCRSCANR.DLL Dynamic Link Library file for ScreenScan SENDVIR.EXE Anti-Virus Research Submission program SETUP.EXE Setup program SHUTIL.DLL Dynamic Link Library file UNINST.INS File for Uninstall UPDATE.INI AutoUpdate settings file UPGRADE.INI AutoUpgrade settings file VALIDATE.EXE Validation utility program VIM32.DLL Dynamic Link Library file for cc:Mail Scan VMEFNW32.DLL Dynamic Link Library file for cc:Mail Scan VSC.LM Electronic Commerce settings file VSCAN4.CNT VirusScan Help file VSCAN4.HLP VirusScan Help file VSCONFIG.EXE VirusScan configuration program file VSHWIN32.EXE VShield program file VSSTAT.EXE VShield statistics program file WBHOOK32.DLL Dynamic Link Library file WCMDR.EXE File for Uninstall WCMDR.INI File for Uninstall WCMDRSIL.INI File for Uninstall WEBSCANX.EXE VShield program file WHATSNEW.TXT This document Y2K.TXT Year 2000 compliance report Files installed in the WINDOWS directory: SECCAST.ICO SecureCast icon file Files installed in the WINDOWS\SYSTEM directory: MCAFECOM.DLL Dynamic Link Library file MCKRNL.VXD Virtual Device Driver MCSCAN32.VXD Virtual Device Driver MCUTIL.VXD Virtual Device Driver VSHIELD.VXD Virtual Device Driver for VShield VSHINIT.VXD Virtual Device Driver for VShield * TESTING YOUR INSTALLATION * The Eicar Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations. To test your installation, copy the following line into its own file, then save the file with the name EICAR.COM. X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* The file size will be 69 or 70 bytes. Next, start your anti-virus software and allow it to scan the directory that contains EICAR.COM. When your software scans this file, it will report finding the EICAR-STANDARD-AV-TEST-FILE virus. Note that this file is NOT A VIRUS. Delete the file when you have finished testing your installation to avoid alarming unsuspecting users. ______________________ UNINSTALLING VIRUSSCAN To uninstall VirusScan, click Start in the Windows taskbar, choose Settings, point to Control Panel, and open. Open the Add/Remove Programs utility from the folder. Highlight VirusScan on the program list, and click Add/Remove to uninstall VirusScan. To remove VirusScan without using the uninstall utility, follow these steps: 1. Remove references to VirusScan from your AUTOEXEC.BAT and your SYSTEM.INI files. To do so, follow these steps: A. Start the Windows system editor. Click Start in the Windows taskbar, then choose Run. Type SYSEDIT in the Run dialog box, then click OK. A set of text files will open on your screen. Your AUTOEXEC.BAT file should appear as the first or topmost window in this set. If it does not, click the title bar for the AUTOEXEC.BAT window. B. Locate and delete these lines of text in the AUTOEXEC.BAT file: C:\PROGRA~1\NETWOR~1\MCAFEE~1\SCAN.EXE C:\ @IF ERRORLEVEL 1 PAUSE SET PATH=%PATH%; C:\PROGRA~1\NETWOR~1\MCAFEE~1 C. Click the title bar for the SYSTEM.INI window to bring it to the foreground, then locate this line: [boot]SCRNSAVE.EXE=C:\PROGRA~1\NETWOR~1\MCAFEE~1\SCRSCAN.EXE Next, change the line to read: [boot]SCRNSAVE.EXE=C:\WINDOWS\SYSTEM\WINDOW~1.SCR D. When you have deleted all VirusScan references in your AUTOEXEC.BAT file and restored your SYSTEM.INI file to its original state, choose Save from the SYSEDIT File menu to save your changes, then choose Exit from the File menu to quit the SYSEDIT application. 2. Remove VirusScan icons from the Start menu. To do this, follow these steps: A. Click Start in the Windows taskbar, point to Settings, then choose Taskbar. B. Click the Start Menu Programs tab. C. Click the Remove button. D. Select the McAfee VirusScan folder in the list that appears in the Remove Shortcuts/Folders dialog box, then click Remove. E. Windows will ask you to confirm your action. Click Yes to continue. F. Click Close to close the Remove Shortcuts/Folders dialog box, then click OK to close the Taskbar Properties dialog box. 3. Edit the Registry. To do this, follow these steps: A. Start the Windows Registry editor. Click Start in the Windows taskbar, then choose Run. Type REGEDIT in the Run dialog box, then click OK. B. Click + to expand the HKEY_LOCAL_MACHINE folder, click + again to expand the SOFTWARE folder, then click one more time to expand the CLASSES folder. Next, delete these keys or entries: .vsc .vsh \CLSID\{9EF56D61-A50F-11ce-B105-0000C04B2D52} \CLSID\{C88249A0-AD7E-11cf-AD53-444553540000} \comfile\shell\VirusScan \Directory\shell\VirusScan \Drive\shell\VirusScan \Excel.Addin\shell\VirusScan \Excel.Chart.5\shell\VirusScan \Excel.Chart.8\shell\VirusScan \Excel.Macrosheet\shell\VirusScan \Excel.Sheet.5\shell\VirusScan \Excel.Sheet.8\shell\VirusScan \Excel.Template\shell\VirusScan \Excel.Workspace\shell\VirusScan \Excel.XLL\shell\VirusScan \exefile\shell\VirusScan \Office.Binder.8\shell\VirusScan \Office.Binder.98\shell\VirusScan \rtffile\shell\VirusScan \VSConfigFile \VSHConfigFile \WinZip\shell\VirusScan \Word.Document.6\shell\VirusScan \Word.Document.8\shell\VirusScan \Word.RTF\shell\VirusScan \Word.RTF.8\shell\VirusScan \Word.Template\shell\VirusScan \Word.Template.8\shell\VirusScan C. Move to the HKEY_LOCAL_MACHINE\SOFTWARE folder, then delete these keys or entries: 1. McAfee \Scan95 \ScreenScan 2. \Microsoft\Windows\CurrentVersion\AppPaths\ \SCAN32.EXE \SCRSCAN.EXE \VSHWIN32.EXE 3. \Microsoft\Windows\CurrentVersion\ Controls Folder\Display\shellex \PropertySheetHandlers \ScrScanP 4. \Microsoft\Exchange\Client\Extensions\ \Exchange Scan="4.0;C:\Program Files \Network Associates\McAfee VirusScan \emalscan.dll;1;11000000000000;1110000;" \Outlook Setup Extension= "4.0;Outxxx.dll;7;000000000000000;0000000000;OutXXX" 5. \Microsoft\Windows\CurrentVersion\Run\ \AvconsoleExe \McAfeeWebScanX \Vshwin32EXE \VsStatEXE 6. \Microsoft\Windows\CurrentVersion\RunServices \Vshwin32EXE 7. \Microsoft\Windows\CurrentVersion\SharedDLLs \C:\WINDOWS\SYSTEM\MCAFECOM.DLL \C:\WINDOWS\SYSTEM\MCKRNL.VXD \C:\WINDOWS\SYSTEM\MCSCAN32.VXD \C:\WINDOWS\SYSTEM\MCUTIL.VXD \C:\WINDOWS\SYSTEM\VSHIELD.VXD \C:\WINDOWS\SYSTEM\VSHINIT.VXD 8. \Microsoft\Windows\CurrentVersion\Uninstall \McAfee VirusScan D. Move to the HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Services\VxD\ folder, then delete these keys or entries: \VSHINIT 4. Restart your computer. 5. Delete VirusScan files and directories. To do so, follow these steps: A. Click Start, point to Programs, then choose Windows Explorer. B. Locate the folder that contains your copy of VirusScan. If you chose the default installation options, you should find VirusScan in this directory path: Program Files\Network Associates\McAfee VirusScan C. Remove the following files from the \Windows\system directory on your hard disk: MCAFECOM.DLL MCKRNL.VXD MCSCAN32.VXD MCUTIL.VXD VSHIELD.VXD VSHINIT.VXD You have now removed VirusScan from your system. Restart your computer to have your changes take effect. _____________ DOCUMENTATION For more information, refer to the users guides for each product included on the CD-ROM or available from Network Associates electronic services. Each product user's guide is saved in Adobe Acrobat Portable Document Format (.PDF). You can view and print this document with Adobe's Acrobat Reader. PDF files can include hypertext links and other navigation features to assist you in finding answers to questions about your Network Associates product. To download Adobe Acrobat Reader from the World Wide Web, visit Adobe's website at: http://www.adobe.com/prodindex/acrobat/readstep.html To download Network Associates documentation, visit the Network Associates website at: http://www.nai.com Additional contact information appears in the following section. Documentation feedback is welcome. Send e-mail to tvd_documentation@nai.com. __________________________ FREQUENTLY ASKED QUESTIONS Regularly updated lists of frequently asked questions about Network Associates products are also available on the Network Associates website, on CompuServe, and on America Online. Q: I use both cc:Mail and a MAPI-compliant e-mail system at work. Can I have VShield scan both of these systems at once or switch back and forth between them? A: VShield's E-Mail Scan module includes support for only one e-mail client at any given time. You may not, for example, have the E-Mail Scan module scan both a MAPI-compliant mailbox and a Lotus cc:Mail server at the same time. You can, however, scan first one mailbox then switch the E-Mail Scan module so that it scans the other mailbox. You can also have VShield's E-Mail Scan module examine your cc:Mail mailbox in the background, then have VirusScan's E-Mail Scan on-demand component begin scanning your MAPI mailbox. Q: I am installing new software on my computer, and the manual recommends disabling any anti-virus software. How do I disable VShield without uninstalling it? A: Right-click the VShield icon located in your system tray next to the system clock, point to Enable, then choose System Scan from the shortcut menu. If System Scan does not have a checkmark beside it in this menu, it is already disabled. After you install your new software, reactivate VShield by right-clicking the VShield icon in the system tray, pointing to Enable, then choosing System Scan from the shortcut menu. If System Scan has a checkmark next to it in the menu, it is enabled. Q: I've activated VirusScan's heuristic scanning option, but it won't identify the viruses it detects. Why not? A: VirusScan's heuristic scanning feature looks for certain "virus-like" characteristics in the files it scans. When it finds a sufficient number of these characteristics, VirusScan concludes that the file is infected. This powerful scanning technique allows VirusScan to discover viruses that are so new that they do not yet have names or identities. VirusScan will, however, identify viruses by name when they match its list of known viruses. Q: When I choose Virus List in VirusScan, I get a message that tells me it's unable to connect. What's happening? A: Network Associates now stores its virus information in a web-based Virus Information Library. To use this feature, you must have a network-based or dial-up Internet connection and web browsing software installed on your computer. If you still cannot connect, start your web browser and enter this address into the text box at the top of your browser window: http://www.nai.com/vinfo Q: I opened VirusScan Scheduler, then I configured, activated and scheduled a scan task to run, but it never did. What happened? A: To run a scheduled scan task, you must leave VirusScan Scheduler running. If you close the Scheduler or shut down your computer, the scheduled task will not run. If the task misses the time it's supposed to run, it will not run when you next start your computer or when you next start the Scheduler, it will wait until the next scheduled time you have set for it to run. Q: I have an existing VirusScan installation with a lot of custom settings. Can I keep these settings when I upgrade to the current VirusScan version? A: The Setup utility for VirusScan v4.0.2 or later will offer to preserve your settings from previous versions during installation. This feature will preserve any configuration options you set in v3.2.0 or later. It will make every attempt to preserve settings for VirusScan 3.x versions earlier than v3.2.0, but Network Associates does not support this feature for versions earlier than v3.2.0. Setup will NOT preserve settings from VirusScan v2.x, nor from any version of WebScanX. Q: How can I get Setup to remove all files, including settings files, from existing VirusScan versions when I run a silent installation? A: To have Setup remove all VirusScan files during a silent installation, add this line to the end of the SETUP.ISS file you use for the silent installation: Preserve=0 If this line does not appear in the file, or if its value is anything other than zero, Setup will preserve the settings files from your existing VirusScan version during silent installation. To learn more about recording and running a silent installation, consult the VirusScan User's Guide. Q: When VirusScan detects an infection in files compressed in .CAB or ZIP-SFX format, why doesn't VirusScan clean, delete, or move the files? A: Because files compressed in .CAB and ZIP-SFX formats can include a Microsoft Authenticode certificate, altering the files can render them unusable. To avoid this possibility, VirusScan does not clean, delete, or move infected files compressed in .CAB or ZIP-SFX format. Network Associates recommends that you decompress any infected files compressed in these formats, then run VirusScan again to clean the uncompressed files. Q: VirusScan detected a virus on my system, but it is not one of the default files listed in its Program Extensions dialog box. Therefore, I suspect it might be a false detection. What can I do to verify a detected virus? A: If you suspect a false detection on a non-executable file, run VirusScan's command line scanner, SCAN.EXE, to verify the infection. If VirusScan detects a virus and SCAN.EXE does not, download the latest .DAT file update, then scan your system again. If VirusScan still detects a virus that you suspect is a false detection, please report the issue to Network Associates technical support. Q: I would like to purchase and download the latest version of VirusScan from one of the Network Associates electronic services, but I do not want to give my credit card information over the Internet for security purposes. Can I purchase VirusScan via modem and download the product via the Internet? A: Yes. The first time you download VirusScan, the Network Associates SecureCast wizard will prompt you to select the transmission method you prefer to use to download your Network Associates product. It will also prompt you to transmit your encrypted credit card information. At the Transaction Connection Type dialog box, select Internet to download your order via the Internet. At the Security Connection Type dialog box, select Direct Dial Modem to transmit your credit card information via modem. Q: I have created my own Emergency Disk without using the Emergency Disk creation utility. Is there anything I need to do to be sure that it will work properly? A: To have your own Emergency Disk start scanning properly, you must create a CONFIG.SYS file on the boot diskette, then add these lines: DEVICE=HIMEM.SYS DOS=HIGH Add the HIMEM.SYS file from the \WINDOWS directory to the boot diskette. NOTE: For detailed instructions on creating an Emergency Disk, refer to the instructions outlined in the VirusScan User's Guide, which you'll find on the Network Associates website. NOTE ALSO: If you copied the files EMNAMES.DAT, EMCLEAN.DAT, and EMSCAN.DAT to the Emergency Disk you created (as it states in the User's Guide), you must rename these files to NAMES.DAT, CLEAN.DAT, and SCAN.DAT, respectively, in order for the Emergency Disk to function properly. Q: I moved a .VSC file to my Startup folder. Whenever I turn on my computer, VirusScan starts, but does not begin scanning. How can I make VirusScan start scanning automatically? A: You need to customize your options. Follow these steps: 1. Location the .VSC file you saved. 2. Right-click the .VSC file, then choose Properties from the shortcut menu that appears. 3. Click the Detection tab. 5. Select the Start Automatically check box. 6. Click OK to close the properties dialog box. Q: When VirusScan starts, how does it determine its default settings? A: VirusScan reads its default settings from the DEFAULT.VSC file located in the installation directory. Q: What error codes can CHKVXD.EXE return? A: Possible CHKVXD.EXE error level codes, along with their descriptions, are: 65535(-1)= VShield not installed 0 = VShield enabled 1 = VShield disabled Q: How can I tell that ScreenScan is working? A: ScreenScan does not tell you when it scans your system, but if you enable the logging option when you configure it, VirusScan will record all ScreenScan activity in its log file. Q: Can I update Network Associates data (.DAT) files to detect new viruses? A: Yes, you can use the AutoUpdate utility included as a default task with the VirusScan Scheduler. AutoUpdate allows you to schedule periodic .DAT file updates. Network Associates also makes its SecureCast client software freely available so you can receive updated files automatically, as soon as they become available. For details, consult the VirusScan User's Guide. If you need additional assistance with downloading, contact Network Associates Download Support. Contact information appears later in this file. Q: I've placed a VirusScan upgrade package on one of my network servers, but when the AutoUpgrade utility on my client systems tries to locate it, it can't find the files. What should I do? A: If you store new VirusScan upgrade files on a server that uses case-sensitive file names, you must rename the file PKGDESC.INI, which comes with VirusScan upgrades, so that it uses only lower-case letters. Otherwise, AutoUpgrade will not find the file on the server and therefore will not install the new VirusScan version on client computers. Q: An error occurs when VirusScan has completed 95 percent of its installation. Why does this occur on my system, but not on others? A: Using a non-standard Windows 95 Winsock will cause the Setup to fail on some systems at the 95 percent completed point. To prevent this, use the default Windows 95 Winsock. Q: I removed the Recycle Bin from the VirusScan exclusions list. How can I replace it? A: Because the Recycle Bin is a system folder, it cannot be added to the exclusions list using VirusScan's browse feature. To restore it to the list, enter the Recycle Bin's full path in the exclusions list: \Recycled\ Q: Why are additional extensions added to the Program Files Only list? A: As the Network Associates Anti-Virus Emergency Response Team finds viruses that can infect new file types, it adds new extensions to the default extensions list to enhance security. For instance, new viruses can infect Microsoft Office binder files, so the default extensions list now includes the file extension for these binder files so that VirusScan will examine them for viruses. Q: I thought I could right-click Microsoft Office .DO?, .XL?, or .OBD files, then choose Scan for Viruses from a shortcut menu in order to start a scan operation. I have Microsoft Office installed, but when I try this, it doesn't work. Why not? A: If you installed Microsoft Office after you installed VirusScan, you might need to reinstall VirusScan to enable context-sensitive shortcut menus. Q: I am having trouble installing Service Pack 2 for Microsoft Exchange Client 5.0. Why? A: VShield uses files which the upgrade needs to write to. In order to successfully install the service pack, you must first close VShield by right-clicking the VShield icon the Windows system tray, then selecting Exit. You will now be able to successfully run the service pack upgrade. Q: I'm running Microsoft Exchange Client 5.0, and VirusScan's On-Demand scan icons aren't showing on my taskbar. Why? A: If you're using Microsoft Exchange Client 5.0, the two Exchange On-Demand scan icons will not appear on the Windows taskbar. This is due to a limitation of Exchange. Please refer to your Exchange documentation for instructions on how to place these icons onto the taskbar within Exchange. _____________________________ CONTACTING NETWORK ASSOCIATES On December 1, 1997, McAfee Associates merged with Network General Corporation, Pretty Good Privacy, Inc., and Helix Software, Inc. to form Network Associates, Inc. The combined Company subsequently acquired Dr Solomon's Software and CyberMedia, Inc. Network Associates continues to market and support the product lines from each of the former entities. You may direct all questions, comments and technical support requests to the Network Associates Customer Care department at any of the addresses or phone numbers listed below. Contact the Network Associates Customer Care department at: 1. Phone (408) 988-3832 Monday-Friday, 6:00 A.M. - 6:00 P.M. Pacific time 2. Fax (408) 970-9727 24-hour, Group III Fax 3. Fax-back automated response system (408) 346-3414 Send correspondence to any of the following Network Associates locations: Network Associates Corporate Headquarters 3965 Freedom Circle McCandless Towers Santa Clara, CA 95054 Phone numbers for corporate-licensed customers: Phone: (408) 988-3832 Fax: (408) 970-9727 Phone numbers for retail-licensed customers: Phone: (972) 278-6100 Fax: (408) 970-9727 Network Associates offices outside the United States: Network Associates Australia Level 1, 500 Pacific Highway St. Leonards, NSW Sydney, Australia 2065 Phone: 61-2-8425-4200 Fax: 61-2-9439-5166 Network Associates Austria Pulvermuehlstrasse 17 Linz, Austria Postal Code A-4040 Phone: 43-732-757-244 Fax: 43-732-757-244-20 Network Associates Belgium Bessenveldtstraat 25a Diegem, Belgium - 1831 Phone: 32-3-716-4070 Fax: 61-2-716-4770 Network Associates do Brasil Rua Geraldo Flausino Gomez 78 Cj. - 51 Brooklin Novo - São Paulo SP - 04575-060 - Brasil Phone: (55 11) 5505 1009 Fax: (55 11) 5505 1006 Network Associates Canada 139 Main Street, Suite 201 Unionville, Ontario Canada L3R 2G6 Phone: (905) 479-4189 Fax: (905) 479-4540 Network Associates People's Republic of China New Century Office Tower, Room 1557 No. 6 Southern Road Capitol Gym Beijing People's Republic of China 100044 Phone: 86 10 6849-2650 Fax: 86 10 6849-2069 NA Network Associates Oy Kielotie 14 B 01300 Vantaa Finland Phone: 358 9 836 2620 Fax: 358 9 836 26222 Network Associates France S.A. 50 Rue de Londres 75008 Paris France Phone: 33 1 44 908 737 Fax: 33 1 45 227 554 Network Associates Deutschland GmbH Industriestrasse 1 D-82110 Germering Germany Phone: 49 8989 43 5600 Fax: 49 8989 43 5699 Network Associates Hong Kong 19/F, Matheson Centre 3 Matheson Street Causeway Bay Hong Kong Phone: 852-2832-9525 Fax: 852-2832-9530 Network Associates Srl Centro Direzionale Summit Palazzo D/1 Via Brescia, 28 20063 - Cernusco sul Naviglio (MI) ITALY Phone: 39 (0)2 9214 1555 Fax: 39 (0)2 9214 1644 Network Associates Japan, Inc. Toranomon 33 Mori Bldg. 3-8-21 Toranomon Minato-ku Tokyo 105-0001 Japan Phone: 81 3 5408 0700 Fax: 81 3 5408 0781 Network Associates Latin America 150 South Pine Island Road, Suite 205 Plantation, Florida 33324 United States Phone: (954) 452-1731 Fax: (954) 236-8031 Network Associates de Mexico Andres Bello No. 10, 4 Piso 4th Floor Col. Polanco Mexico City, Mexico D.F. 11560 Phone: (525) 282-9180 Fax: (525) 282-9183 Network Associates International B.V. Gatwickstraat 25 1043 GL Amsterdam The Netherlands Phone: 31 20 586 6100 Fax: 31 20 586 6101 Network Associates Portugal Av. da Liberdade, 114 1269-046 Lisboa Portugal Phone: 351 1 340 4543 Fax: 351 1 340 4575 Net Tools Network Associates South Africa Bardev House, St. Andrews Meadowbrook Lane Epson Downs, P.O. Box 7062 Bryanston, Johannesburg South Africa 2021 Phone: 27 11 706-1629 Fax: 27 11 706-1569 Network Associates South East Asia 7 Temasek Boulevard The Penthouse #44-01, Suntec Tower One Singapore 038987 Phone: 65 430-6670 Fax: 65 430-6671 Network Associates Spain Orense 4, 4th Floor Edificio Trieste 28020 Madrid Spain Phone: 34 91 598 18 00 Fax: 34 91 556 14 01 Network Associates Sweden Datavägen 3A Box 596 S-175 26 Järfälla Sweden Phone: 46 (0) 8 580 88 400 Fax: 46 (0) 8 580 88 405 Network Associates AG Baeulerwisenstrasse 3 8152 Glattbrugg Switzerland Phone: 0041 1 808 99 66 Fax: 0041 1 808 99 77 Network Associates International Ltd. Minton Place, Victoria Street Windsor, Berkshire SL4 1EF United Kingdom Phone: 44 (0)1753 827 500 Fax: 44 (0)1753 827 520 Or, you can receive online assistance through any of the following resources: 1. Internet E-mail: support@nai.com 2. Internet FTP: ftp.nai.com 3. World Wide Web: http://support.nai.com 4. America Online: keyword MCAFEE 5. CompuServe: GO NAI To provide the answers you need quickly and efficiently, the Network Associates technical support staff needs some information about your computer and your software. Please have this information ready when you call: - Program name and version number - Computer brand and model - Any additional hardware or peripherals connected to your computer - Operating system type and version numbers - Network name, operating system, and version - Network card installed, where applicable - Modem manufacturer, model, and baud, where applicable - Relevant browsers or applications and their version numbers, where applicable - How to reproduce your problem: when it occurs, whether you can reproduce it regularly, and under what conditions - Information needed to contact you by voice, fax, or e-mail We also seek and appreciate general feedback. * FOR PRODUCT UPGRADES * To make it easier for you to receive and use Network Associates products, we have established a reseller's program to provide service, sales, and support for our products worldwide. For a listing of resellers, see the resellers.txt file or contact Network Associates Customer Care for resellers near you. * FOR REPORTING PROBLEMS * Network Associates prides itself on delivering a high-quality product. If you find any problems, please take a moment to review the contents of this file. If the problem you've encountered is documented, there is no need to report the problem to Network Associates. If you find any feature that does not appear to function properly on your system, or if you believe an application would benefit greatly from enhancement, please contact Network Associates with your suggestions or concerns. * FOR ON-SITE TRAINING INFORMATION * Contact Network Associates Customer Service at (800) 338-8754. * NETWORK ASSOCIATES BETA SITE * Get pre-release software, including .DAT files, through http://beta.nai.com. You will have access to Public Beta and External Test Areas. Your feedback will make a difference.