   Release Notes for McAfee(R) GroupShield(TM) 
   Version 5.2.1 for Lotus Domino for Windows Patch 2
 Copyright (C) 2004 Networks Associates Technology,
                        Inc.
                 All Rights Reserved


==========================================================

Patch Release:   5th Aug 2004

This release was developed and tested with:

- GroupShield:         5.2.1 for Lotus Domino for
                       Windows
- DAT Version:         4381
- Engine Version:      4320

Make sure you have installed these versions or newer
before using this release.

==========================================================


Thank you for using GroupShield(TM) software. This
file contains important information regarding this
release. We strongly recommend that you read the
entire document.

The attached files are provided as is, and with no
warranty either expressed or implied as to their
suitability for any particular use or purpose.
Network Associates, Inc. assumes no liability for
damages incurred either directly or indirectly as a
result of the use of these files, including but not
limited to the loss or damage of data or systems,
loss of business or revenue, or incidental damages
arising from their use. patch files should be
applied only on the advice of McAfee Technical
Support, and only when you are actually experiencing
the issue being addressed by the patch. patch
files should not be proactively applied in order to
prevent potential product issues. You are
responsible for reading and following all
instructions for preparation, configuration, and
installation of patch files. patch files are not a
substitute or replacement for product Service Packs
which may be released by Network Associates, Inc. It
is a violation of your software license agreement to
distribute or share these files with any other
person or entity without written permission from
Network Associates, Inc. Further, posting of McAfee
patch files to publicly available Internet sites is
prohibited. Network Associates, Inc. reserves the
right to refuse distribution of patch files to any
company or person guilty of unlawful distribution of
McAfee software products. Questions or issues with
McAfee patch files should be directed to McAfee
Technical Support.


_________________________________________________________
WHAT'S IN THIS FILE

-   About This patch
   -   Purpose
   -   Resolved Issues
   -   Files Included With This patch
-   Installation
   -   Installation Requirements
   -   Installation Steps
   -   Testing Your Installation
   -   Removing This patch
-   Contact Information
-   Copyright & Trademark Attributions
-   License Information
_________________________________________________________
ABOUT THIS RELEASE


PURPOSE

This patch addresses the issue shown in the
RESOLVED ISSUES section below.

This patch is used with GroupShield v5.2.1 for
Lotus Domino for Windows software only.  The patch
comprises a single compressed archive file:

    GSD521P2EN.ZIP

This Patch also includes one file that replaces
the file GSD521.NAP on the McAfee ePolicy
Orchestrator server. This NAP file is the
interface between the ePO server and
GroupShield for Lotus Domino software

RESOLVED ISSUES

1.  An e-mail message that was already scanned
    and had a valid stamp was not being scanned
    again down-stream when banned content rules
    were set on the down-stream server.

2.  Releasing quarantined items from the
    Quarantine database. If multiple items were
    selected, an error message: "NSFNOTEUPDATE
    0 0ID Field!" was displayed. This Patch
    resolves this issue for any new quarantined
    items, but existing items will still
    display this error message.

3.  In certain circumstances, when scanning
    infected calendar items sent to an SMTP
    mail account, a spurious Non Delivery
    Report (NDR) would be generated.

4.  When a meeting request is sent from a Lotus
    Notes 6.x client to a Lotus Domino 6.x
    server, the infection may not be detected.
    The following variable can be added to
    NOTES.INI to allow for this type of
    detection.

    GSD_ADDITIONAL_SENT=1

5.  Where mail that is quarantined under the
    'Encrypted' exception list is moved to the
    'Denial of Service' exception list after
    the quarantined items are rescanned.  This
    Patch also resolves an issue where the
    'Exception Type' may be displayed as a nine
    digit number after Encrypted items are
    rescanned.

6.  In some circumstances, when an encrypted
    email was received, an alert was generated
    even when the Mailbox scanner for
    GroupShield for Lotus Domino was configured
    to Trust All. This issue is resolved with
    this Patch.

7.  In certain circumstances, the presence of
    3rd party extension manager addins could
    result in duplicate messages being
    received. This Patch incorporates a set of
    rules which, if followed by the 3rd party
    addin, will prevent these duplicate
    messages.

8.  In some circumstances, when Updating from a
    proxy server, the AutoUpdate process would
    not complete.

9.  When GroupShield Domino 5.2.1 and a 3rd
    party extension manager addin coexisted on
    an initial scanning server and a downstream
    server, both running Domino 6.0.x, some
    messages were marked dead on the downstream
    server which could result in dead mail on
    Domino 6.

10. When starting the On-Access scanner on a
    Japanese language version of Microsoft
    Windows NT 4.0 a Domino panic error could
    occur if an email containing specific
    Japanese characters was present in
    MAIL.BOX.

11. After deleting Banned Content Rules from
    the Content Scan Rules view, e-mail
    messages could continue to be blocked until
    GSDCONFIG is unloaded and reloaded.

12. When scanning a database formatted in a
    particular way, an error message saying
    "Unable to extract file from Note" could
    occur.

13. It was not possible to use ePO to configure
    GroupShield Engine updates from the FTP
    site. This option has now been added to the
    NAP file.

14. In some circumstances, when enabling
    Content Scanning using the NAP file the
    rules would disappear from the GroupShield
    database.

15. Zero byte files are being received by end users in
    their emails even after the virus is cleaned.

16. DEAD MAIL caused when LZH and ZIP files when the
    contain files that are unscannable. 

17. GSD alerts Administrator users with the message 
    "Unable to extract file from Note" for any kind 
    of unknown error that occurs while attempting to 
    extract a file from a Notes file.

    This HotFix resolves this issue by treating such 
    Note files as unscannable and Administrator users 
    will no longer get the old alert notification.  
    Instead they will receive alerts for "unscannable files".  

    If you do not wish to receive these alerts, the generic 
    Alert maybe turned off by entering the following ini 
    setting into the Notes.ini. Ensure that there is a 
    carriage return at the end of the line otherwise Domino 
    will not pick up the setting: 

    GSD_DISABLE_GENERIC_ALERT=1,1,1,0  (default)

    Represents: Sender, Recipient, Administrator, Other. Last digit 
    should always be 0. 
    * 1 means that the Alert will go to the person 
    * 0 means that no Alert will be sent to the person. 
    The Other can not be specified and should always be set to 0 
    any other value will not be valid. 

    To completely turn off the Generic Alert set all values to 0.

18. GSD alerts Administrator users with "Unable to extract file
    from Note" in a multiple shared mail Domino 6 database. 

19. When checking for work, the GroupShield Reporter
    task could cause a spike in CPU usage.

20. ePO console inherit option is not working 
    correctly for Mailbox Settings property page.


FILES INCLUDED WITH THIS PATCH

This Patch consists of a package called
GSD521P2EN.ZIP, which contains the following
files


      GSD521.NAP
      GSDPATCH.EXE
      GSDPATCH2.NSF
      PATCH.INI

_____________________________________________________
INSTALLATION

INSTALLATION REQUIREMENTS



    NOTE:

    This Patch only supports GroupShield for
    Lotus Domino 5.2.1 on Microsoft Windows.
    It does not work with earlier versions of
    GroupShield software.

    To check which version of GroupShield for
    Lotus Domino you have installed, at the
    Domino console, type:

    TELL GSDCONFIG VERSION

    If you have GroupShield for Lotus Domino
    5.2.1 installed, the console will show the
    product version as:

    5.2.xxx.0

    where xxx is a build number (978 or above)
    that will vary depending on whether you
    have any hotfixes applied.

    IMPORTANT:
    This Patch replaces existing database
    design in your GroupShield for Lotus Domino
    data directory, which is located within the
    Lotus Domino Data Directory under GSD5.
    McAfee recommends that you back up your
    existing GroupShield for Lotus Domino
    Configuration database before you install
    this Patch.



INSTALLATION STEPS

McAfee distributes this Patch in a compressed
format to reduce transmission time. To install
this Patch, follow these steps:


1.  Create a temporary directory on your hard
    disk, then copy GSD521P2EN.ZIP to this
    directory.

2.  Use a compression utility such as WinZip or
    PKZip to extract the Patch files from the
    GSD521P2EN.ZIP archive into your temporary
    directory.

3.  Make a backup copy of all databases.

4.  Shut down the Lotus Domino Server.

5.  Run GSDPATCH.EXE

    This will load the Patch Installer.

6.  Click the Patch button to begin the
    installation of the Patch.

7.  Once complete, click the Finish button.


For details about WinZip visit:
http://www.winzip.com/ddchomeb.htm

For details about PKZip visit:
    http://www.pkware.com/shareware


To use the GSD521.NAP file contained within
this Patch, you must have ePolicy Orchestrator
Version 2.5.1 or later already installed on the
computer you intend to update with this Patch.

Use this procedure to over write the existing
McAfee GroupShield Software Package in the ePO
Repository.

1.  Log on to the desired ePolicy Orchestrator
    server.

2.  In the console tree under ePolicy
    Orchestrator |<SERVER>, right-click
    Repository, then select Configure
    Repository. The Software Repository
    Configuration Wizard appears.

3.  Select Add new software to be managed, then
    click Next. The Select a Software Package
    dialog box appears

4.  Select the Software Package (.NAP) file for
    the GroupShield for Lotus Domino product,
    then click Open. The Software Package file
    is uncompressed, then the individual files
    are added to the Repository.

5.  The installation begins. If there is an
    existing version of this NAP file already
    loaded you will be asked to confirm that
    you wish to overwrite the existing file.

6.  When the files are successfully installed,
    a message confirms the installation has
    completed. Any settings previously entered
    for client servers using GroupShield for
    Lotus Domino version will remain unaltered



TESTING YOUR INSTALLATION

You can test the operation of the software by
running the EICAR Standard AntiVirus Test File
on any computer where you have installed the
software. The EICAR Standard AntiVirus Test
File is a combined effort by anti-virus vendors
throughout the world to implement one standard
by which customers can verify their anti-virus
installations.

To test your installation:

1.  Copy the following line into its own file,
    then save the file with the name
    EICAR.COM.

       X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

    The file size will be approximately 70
    bytes.

2.  Start your anti-virus software and allow it
    to scan the directory that contains
    EICAR.COM.

    When your software scans this file, it will
    report finding the EICAR test file.

3.  Delete the file when you have finished
    testing your installation to avoid alarming
    unsuspecting users.

    IMPORTANT:
    Please note that this file is NOT A VIRUS.


For more information on the EICAR test file,
visit:

       www.eicar.org.



REMOVING THIS PATCH

To remove this Patch from your computer you
will be required to reinstall GroupShield 5.2.1
for Lotus Domino software

    NOTE:
    We recommend that you do NOT remove the
    Patch files from your GroupShield for Lotus
    Domino installation once you install them.
    If you reinstall your GroupShield for Lotus
    Domino 5.2.1 software, we recommend that
    you also reinstall the Patch.



_________________________________________________________
CONTACT INFORMATION

Technical Support
    Home Page
       http://www.networkassociates.com/us/support/

    KnowledgeBase Search
       https://knowledgemap.nai.com/phpclient/homepage.aspx

    PrimeSupport Service Portal
       https://mysupport.nai.com

    Login credentials required.


McAfee Beta Program
    Beta Web Site
       http://www.networkassociates.com/us/downloads/beta/mcafeebetahome.htm

    E-mail
       avbeta@nai.com


Security Headquarters:  AVERT
(Anti-Virus & Vulnerability Emergency Response
Team)
    Home Page
       http://www.networkassociates.com/us/security/home.asp

    Virus Information Library
       http://vil.nai.com

    AVERT WebImmune
       https://www.webimmune.net/default.asp

    Submit a Virus Sample
       http://vil.nai.com/vil/submit-sample.asp

    AVERT DAT Notification Service
       http://vil.nai.com/vil/join-DAT-list.asp


Download Site
    Home Page
       http://www.networkassociates.com/us/downloads/

    DAT File and Engine Updates
       http://www.networkassociates.com/us/downloads/updates/

       ftp://ftp.nai.com/pub/antivirus/datfiles/4.x

    Product Upgrades
       https://secure.nai.com/us/forms/downloads/upgrades/login.asp

    Valid grant number required.
    Contact Customer Service


Training
    McAfee Security University
       http://www.networkassociates.com/us/services/education/mcafee/university.htm


Customer Service
    US, Canada, and Latin America toll-free:
   Phone:     +1-888-VIRUS NO or +1-888-847-8766
              Monday-Friday, 8am-8pm, Central Time

   E-mail:    https://secure.nai.com/us/forms/support/request_form.asp

   Web:       http://www.nai.com/us/index.asp
              http://www.networkassociates.com/us/support/default.asp

For additional contact information (including
addresses and toll-free numbers for worldwide
offices), see the CONTACT file that accompanied your
original product release.


_____________________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

Copyright (C) 2004 Networks Associates Technology,
Inc. All Rights Reserved. No part of this
publication may be reproduced, transmitted,
transcribed, stored in a retrieval system, or
translated into any language in any form orbyany
means without the written permission of Networks
Associates Technology, Inc., or its suppliers or
affiliate companies. To obtain this permission,
write to the attention of the Network Associates
legal department at: 5000 Headquarters Drive, Plano,
Texas 75024, or call +1-972-963-8000.


TRADEMARKS

Active Firewall, Active Security, ActiveSecurity (in
Katakana), ActiveHelp, ActiveShield, AntiVirus
Anyware and design, Bomb Shelter, Certified Network
Expert, Clean-Up, CleanUp Wizard, ClickNet, CNX, CNX
Certification Certified Network Expert and design,
Covert, Design (Stylized E), Design (Stylized N),
Disk Minder, Distributed Sniffer System, Distributed
Sniffer System (in Katakana), Dr Solomon's, Dr
Solomon's label, Entercept, Enterprise SecureCast,
Enterprise SecureCast (in Katakana), ePolicy
Orchestrator, EZ SetUp, First Aid, ForceField, GMT,
GroupShield, GroupShield (in Katakana), Guard Dog,
HomeGuard, Hunter, IntruShield, Intrusion Prevention
Through Innovation, IntruVert Networks, LANGuru,
LANGuru (in Katakana), M and Design, McAfee, McAfee
(in Katakana), McAfee and design, McAfee.com, McAfee
VirusScan, NA Network Associates, Net Tools, Net
Tools (in Katakana), NetCrypto, NetOctopus, NetScan,
NetShield, NetStalker, Network Associates, Network
Associates Coliseum, NetXray, NotesGuard, Nuts &
Bolts, Oil Change, PC Medic, PCNotary, PrimeSupport,
Recoverkey, Recoverkey - International, Registry
Wizard, RingFence, Router PM, SecureCast,
SecureSelect, Sniffer, Sniffer (in Hangul),
SpamKiller, Stalker, TIS, TMEG, Total Network
Security, Total Network Visibility, Total Network
Visibility (in Katakana), Total Virus Defense,
Trusted Mail, UnInstaller, Virex, Virus Forum,
ViruScan, VirusScan, WebScan, WebShield, WebShield
(in Katakana), WebSniffer, WebStalker, WebWall,
What's The State Of Your IDS?, Who's Watching Your
Network, WinGauge, Your E-Business Defender, Zip
Manager are registered trademarks or trademarks of
Network Associates, Inc. and/or its affiliates in
the US and/or other countries.  Sniffer(R) brand
products are made only by Network Associates, Inc.
All other registered and unregistered trademarks
herein are the sole property of their respective
owners.


_____________________________________________________
LICENSE INFORMATION

LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE
LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU
PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND
CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF
YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE
ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED
LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE
RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A
BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE
AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED
THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF
THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL
THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE
PRODUCT TO NETWORK ASSOCIATES OR THE PLACE OF
PURCHASE FOR A FULL REFUND.


LICENSE ATTRIBUTIONS

This product includes or may include:
*Software developed by the OpenSSL Project for use
in the OpenSSL Toolkit (http://www.openssl.org/).
*Cryptographic software written by Eric A. Young and
software written by Tim J. Hudson. *Some software
programs that are licensed (or sublicensed) to the
user under the GNU General Public License (GPL) or
other similar Free Software licenses which, among
other rights, permit the user to copy, modify and
redistribute certain programs, or portions thereof,
and have access to the source code. The GPL requires
that for any software covered under the GPL which is
distributed to someone in an executable binary
format, that the source code also be made available
to those users. For any such software covered under
the GPL, the source code is made available on this
CD. If any Free Software licenses require that
Network Associates provide rights to use, copy or
modify a software program that are broader than the
rights granted in this agreement, then such rights
shall take precedence over the rights and
restrictions herein.  *Software originally written
by Henry Spencer, Copyright 1992, 1993, 1994, 1997
Henry Spencer.  *Software originally written by
Robert Nordier, Copyright (C) 1996-7 Robert Nordier.
*Software written by Douglas W. Sauder.  *Software
developed by the Apache Software Foundation
(http://www.apache.org/). A copy of the license
agreement for this software can be found at
www.apache.org/licenses/LICENSE-2.0.txt.
*International Components for Unicode ("ICU")
Copyright (C) 1995-2002 International Business
Machines Corporation and others.  *Software
developed by CrystalClear Software, Inc., Copyright
(C) 2000 CrystalClear Software, Inc. *FEAD(R)
Optimizer(R)  technology, Copyright Netopsystems AG,
Berlin, Germany. *Outside In(R)  Viewer Technology
(C) 1992-2001 Stellent Chicago, Inc. and/or Outside
In(R) HTML Export, (C) 2001 Stellent Chicago, Inc.
*Software copyrighted by Thai Open Source Software
Center Ltd. and Clark Cooper, (C) 1998, 1999, 2000.
*Software copyrighted by Expat maintainers.
*Software copyrighted by The Regents of the
University of California, (C) 1989.  *Software
copyrighted by Gunnar Ritter.  *Software copyrighted
by Sun Microsystems(R), Inc. (C) 2003.  *Software
copyrighted by Gisle Aas. (C) 1995-2003.  *Software
copyrighted by Michael A. Chase, (C) 1999-2000.
*Software copyrighted by Neil Winton, (C) 1995-1996.
*Software copyrighted by RSA Data Security, Inc.,
(C) 1990-1992.  *Software copyrighted by Sean M.
Burke, (C) 1999, 2000.  *Software copyrighted by
Martijn Koster, (C) 1995.  *Software copyrighted by
Brad Appleton, (C) 1996-1999.  *Software copyrighted
by Michael G. Schwern, (C) 2001.  *Software
copyrighted by Graham Barr, (C) 1998.  *Software
copyrighted by Larry Wall and Clark Cooper, (C)
1998-2000.  *Software copyrighted by Frodo
Looijaard, (C) 1997.  *Software copyrighted by the
Python Software Foundation, Copyright (C) 2001,
2002, 2003. A copy of the license agreement for this
software can be found at www.python.org.  *Software
copyrighted by Beman Dawes, (C) 1994-1999, 2002.
*Software written by Andrew Lumsdaine, Lie-Quan Lee,
Jeremy G. Siek (C) 1997-2000 University of Notre
Dame.  *Software copyrighted by Simone Bordet &
Marco Cravero, (C) 2002.  *Software copyrighted by
Stephen Purcell, (C) 2001.  *Software developed by
the Indiana University Extreme! Lab
http://www.extreme.indiana.edu/).  *Software
copyrighted by International Business Machines
Corporation and others, (C) 1995-2003.  *Software
developed by the University of California, Berkeley
and its contributors.  *Software developed by Ralf
S. Engelschall <rse@engelschall.com> for use in the
mod_ssl project (http://www.modssl.org/).  *Software
copyrighted by Kevlin Henney, (C) 2000-2002.
*Software copyrighted by Peter Dimov and Multi Media
Ltd. (C) 2001, 2002.  *Software copyrighted by David
Abrahams, (C) 2001, 2002. See
http://www.boost.org/libs/bind/ bind.html for
documentation.  *Software copyrighted by Steve
Cleary, Beman Dawes, Howard Hinnant & John Maddock,
(C) 2000.  *Software copyrighted by Boost.org, (C)
1999-2002.  *Software copyrighted by Nicolai M.
Josuttis, (C) 1999.  *Software copyrighted by Jeremy
Siek, (C) 1999-2001.  *Software copyrighted by
Daryle Walker, (C) 2001.  *Software copyrighted by
Chuck Allison and Jeremy Siek, (C) 2001, 2002.
*Software copyrighted by Samuel Krempp, (C) 2001.
See http://www.boost.org for updates, documentation,
and revision history.  *Software copyrighted by Doug
Gregor (gregod@cs.rpi.edu), (C) 2001, 2002.
*Software copyrighted by Cadenza New Zealand Ltd.,
(C) 2000.  *Software copyrighted by Jens Maurer, (C)
2000, 2001.  *Software copyrighted by Jaakko Jrvi
(jaakko.jarvi@cs.utu.fi), (C) 1999, 2000.  *Software
copyrighted by Ronald Garcia, (C) 2002.  *Software
copyrighted by David Abrahams, Jeremy Siek, and
Daryle Walker, (C) 1999-2001.  *Software copyrighted
by Stephen Cleary (shammah@voyager.net), (C) 2000.
*Software copyrighted by Housemarque Oy
<http:// www.housemarque.com>,(C) 2001.  *Software
copyrighted by Paul Moore, (C) 1999.  *Software
copyrighted by Dr. John Maddock, (C) 1998-2002.
*Software copyrighted by Greg Colvin and Beman
Dawes, (C) 1998, 1999.  *Software copyrighted by
Peter Dimov, (C) 2001, 2002.  *Software copyrighted
by Jeremy Siek and John R. Bandela, (C) 2001.
*Software copyrighted by Joerg Walter and Mathias
Koch, (C) 2000-2002.


DBN 001-EN

V3.0.0


