 Release Notes for McAfee AutoUpdate Architect
                  Version 1.0
 (c) 2003 Networks Associates Technology, Inc.
              All Rights Reserved


===============================================

McAfee AutoUpdate Architect version 1.0.0
AutoUpdate version 7.0.0

===============================================


Thank you for using McAfee AutoUpdate Architect
software. This file contains important
information regarding this release. We strongly
recommend that you read the entire document.


_______________________________________________
WHAT'S IN THIS FILE

-  Features
-  Installation and System Requirements
-  Known Issues
-  Documentation
-  Contacting McAfee and Network Associates
-  Copyright and Trademark Attributions
   -  Trademarks
   -  License Agreement

_______________________________________________
FEATURES

McAfee AutoUpdate Architect includes the
following features:

-  Always-up-to-date.
   McAfee AutoUpdate Architect can be
   configured to download the most current
   updates regularly for distribution to the
   destination computers. Such pull tasks can
   be scheduled to occur as often as you want.

-  Distributed repository support.
   The distributed repository architecture of
   McAfee AutoUpdate Architect makes it easy to
   deploy anti-virus updates throughout your
   enterprise by allowing you to retrieve your
   McAfee anti-virus software update from an
   internal update server. This feature
   supports Microsoft Windows or Novell FTP
   servers, HTTP servers, and UNC shares.

-  Support for all McAfee update types.
   From the McAfee AutoUpdate Architect
   console, you can deploy HotFixes, Service
   Packs, virus definition (dat) files, engine
   packages, and incremental and supplemental
   (extra.dat) files for supported McAfee
   products. Once you add these product updates
   to the master repository, you can deploy
   them to client computers.

-  Proxy server and firewall authentication
   support.
   You can configure McAfee AutoUpdate
   Architect so that the master repository
   retrieves updates and distributed
   repositories replicate through proxy servers
   and firewalls.

-  Bandwidth-friendly replication.
   You can choose to replicate only incremental
   DAT files.

-  Easy-to-use user interface.
   The user interface is greatly improved in
   this beta release of McAfee AutoUpdate
   Architect. The interface is web-based with
   easy-to-follow links, provides
   context-sensitive information when you point
   to the actions and components displayed, and
   is illustrative, with an easy-to-understand
   diagram of the McAfee AutoUpdate Architect
   components.

-  Strong encryption and digital signatures.
   McAfee AutoUpdate Architect secures update
   files with 168-bit 3DES encryption and
   44-byte DSA digital signatures.

-  Immediate or scheduled replication.
   You can configure McAfee AutoUpdate
   Architect to replicate new updates by
   scheduling the task. Or, if you wish to have
   full control over releasing new dat or
   engine files into your environment, you can
   launch a replication task immediately, at
   any time.

-  Exportable repository list file.
   The repository list is stored in the
   sitelist.xml file. This file allows products
   using AutoUpdate 7.0 or the ePolicy
   Orchestrator 3.0 agent to retrieve updates
   from repositories defined in the list. The
   order of the list indicates the priority of
   the repositories. This list is editable.

-  Support for system environment variables
   within the repository list.

-  Support for resumable downloads in all
   protocols. When a download is interrupted,
   the next download will resume the
   interrupted download if the file is larger
   than 4K.


_______________________________________________
INSTALLATION AND SYSTEM REQUIREMENTS

Please see product documentation for complete
information regarding installation and system
requirements.


_______________________________________________
KNOWN ISSUES

1. A replication task cannot be performed to an
   FTP repository through a proxy server. This
   is a limitation of proxy servers.
2. FTP servers that require an anonymous user
   to transmit a properly formatted e-mail
   address as the password are not supported.
   McAfee AutoUpdate Architect will remove the
   @ symbol from passwords. You may be able
   to disable this requirement on the FTP
   server.

3. If two separate accounts on an FTP server
   (such as an anonymous and an authenticated
   user accounts) are used to access the same
   repository, then the path from the root of
   the file system to the repository must be
   the same for both FTP user accounts. This
   means that you cannot configure the
   directory (with the "chroot" command) one
   without configuring the directory of the
   other to the same location. The recommended
   scenario is to have a dedicated user account
   whose home directory is the same as the
   anonymous user account, and have it
   configured to his home directory. Thus, if
   the anonymous user account is configured to
   "/var/ftp", then the authenticated user
   accounts home directory should be
   "/var/ftp". The FTP server should be
   configured to change the directory of the
   authenticated user account to its home
   directory.
4. Networks running some content
   scanning/filtering software may not be able
   to update due to the update package being
   modified.
5. The McAfee AutoUpdate Architect console does
   not consistently display newly added
   information immediately.  Pressing the F5
   key to refresh the console after information
   has been added resolves this problem.

6. You may notice that AutoUpdate 7.0 does not
   consistently remove all temporary files and
   directories created when the update fails.
   However, once the update is successful, the
   files are removed. This is necessary for
   resumable downloads and saves bandwidth.

7. Exporting a repository list to ePolicy
   Orchestrator 2.x is not supported. Instead,
   use AutoUpdate 7.0 (Common Updater) policies
   (with the CMU300.NAP file) in ePolicy
   Orchestrator 2.x to configure repositories.

8. We recommend running McAfee AutoUpdate
   Architect with Microsoft Internet Explorer
   6.0 SP1 on Micorsoft Windows NT 4, Windows
   2000, and Windows XP systems. However, you
   should upgrade to Internet Explorer 6.0 SP1
   from the original Internet Explorer 6.0, not
   the cumulative patch. Otherwise, you may
   experience script errors. Microsoft has
   confirmed this problem with these Internet
   Explorer patches, and we are working with
   them to resolve this issue.

9. "Error: Object expected."
   You need local administrator rights to run
   McAfee AutoUpdate Architect. Otherwise, you
   get an error message that McAfee AutoUpdate
   Architect failed to initialize the ActiveX
   control.

10.   The DELETE key does not function in many
   of the McAfee AutoUpdate Architect dialog
   boxes. Use the BACKSPACE key.  We are
   currently working with Microsoft to resolve
   this issue.

11.   In certain circumstances, pressing the F5
   key to refresh the console causes the McAfee
   AutoUpdate Architect console to stop
   responding due to a timing issue on
   Microsoft .NET Server RC1.

12.   When you check packages into the master
   repository, packages that are no longer
   applicable are automatically removed. For
   example, if you have VirusScan 4.5 and
   VirusScan 4.5 HotFix 1 checked into the
   master repository, then check in VirusScan
   4.5.1, both VirusScan 4.5 packages are
   removed.

13.   McAfee AutoUpdate Architect does not
   appear on the "Applications" tab of the
   Windows Task Manager while McAfee AutoUpdate
   Architect software is running. If you wish
   to use Task Manager to close McAfee
   AutoUpdate Architect at any time, you must
   end MSHTA.EXE on the "Processes" tab.

14.   McAfee recommends that you do not check
   in the DAT+Engine SuperDAT file into MAA.
   This will cause client computers that are
   already up-to-date to download SuperDAT
   files, and use unnecessary bandwidth. To
   update engine and DAT files, McAfee
   recommends selecting "Updates" and checking
   in the DAT and Engine packages separately.

15.   You must keep your system account
   passwords used by McAfee AutoUpdate
   Architect up-to-date. If the password used
   by McAfee AutoUpdate Architect is not
   current, the software will continue
   attempting to log in, and the computer may
   stop responding.

16.   Running McAfee AutoUpdate Architect and
   VirusScan Enterprise 7.0 on the same
   computer can cause problems because they
   share the same AutoUpdate repository list.
   Do not import the client AutoUpdate
   repository list (SITELIST.XML) file from the
   VirusScan Console, or use the "Edit
   AutoUpdate repository list" command to
   modify the repository list. The local
   repository list on the computer running
   McAfee AutoUpdate Architect is used for
   replication and pull tasks. When the client
   repository list overwrites this repository
   list causes replication and pull tasks to
   fail.

17.   Please use this release version to
   connect to the NAI HTTP and FTP sites for
   pull tasks. The NAI official HTTP and FTP
   update site structure has been slightly
   adjusted. Therefore the beta 1 and beta 2
   versions may not work properly with the new
   site structure.

18.   Clicking the "Verify" button on "HTTP
   Replication Credentials" causes an error if
   the replication UNC share path contains
   environment variables.

19.   Installing America Online software on a
   client computer changes the Internet
   Explorer dial-up settings to "Always dial my
   default connection". Therefore, when a
   scheduled task runs, the America Online
   connection is used and the task fails. If
   you want to run America Online software on a
   client computer, you must set Internet
   Explorer settings to "Never dial a
   connection".


_______________________________________________
DOCUMENTATION

This product includes a documentation set that
consists of manuals saved in Adobe Acrobat
Portable Document Format (.PDF), and an online
Help system.

Electronic copies of all product manuals are
included on the product CD, or are available
with a valid grant number on the McAfee
download site:

      www.mcafeeb2b.com/naicommon/download/upgrade/login.asp


A free copy of the latest version of Acrobat
Reader comes with the product CD, or you can
download any version from the Adobe web site:

      www.adobe.com/prodindex/acrobat/readstep.html


This product includes the following
documentation set:


1. Product Guide. This guide introduces the
   product, documents product features,
   provides detailed instructions for
   configuring the software, and includes
   information on deployment as well as
   recurring tasks and operating procedures. An
   Adobe Acrobat .PDF version of this guide is
   stored on the product CD. You can also
   download a copy in .PDF format from the
   McAfee download site.

2. Online Help system. Online Help, accessed
   from within the software application, gives
   you quick access to hints and tips about
   using your software. Help includes
   field-level topic and page-level context
   Help with links to more detailed and related
   information. (Help also includes an overview
   of product features and step-by-step
   procedures for product features.)


3. A LICENSE Agreement. This outlines the terms
   under which you may use the product. Read it
   carefully. If you install the product, you
   agree to the license terms.

4. This README file.


_______________________________________________
CONTACTING MCAFEE AND NETWORK ASSOCIATES

Technical Support
      http://knowledge.nai.com


AVERT Anti-Virus Emergency Response Team
      www.mcafeeb2b.com/naicommon/avert/default.asp


Download Site
      www.mcafeeb2b.com/naicommon/download/

      ftp://ftp.nai.com/pub/antivirus/datfiles/4.x

   DAT File Updates
      www.mcafeeb2b.com/naicommon/download/dats/find.asp

   Product Upgrades
      www.mcafeeb2b.com/naicommon/download/upgrade/login.asp

      Valid grant number required.
      Contact Network Associates Customer
      Service


On-Site Training Information
      www.mcafeeb2b.com/services/mcafee-training/default.asp


Network Associates Customer Service
   US, Canada, and Latin America toll-free:
   Phone:   +1-888-VIRUS NO or +1-888-847-8766
            Monday - Friday, 8 a.m. - 8 p.m.,
            Central Time

   E-mail:  services_corporate_division@nai.com
   Web:     www.nai.com
            www.mcafeeb2b.com

For additional information on contacting
Network Associates and McAfee  including
toll-free numbers for other geographic areas --
see the CONTACT file that accompanied your
original product release.


_______________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

(c) 2003 Networks Associates Technology, Inc.
All Rights Reserved. No part of this
publication may be reproduced, transmitted,
transcribed, stored in a retrieval system, or
translated into any language in any form or by
any means without the written permission of
Networks Associates Technology, Inc., or its
suppliers or affiliate companies. To obtain
this permission, write to the attention of the
Network Associates legal department at: 3965
Freedom Circle, Santa Clara, California 95054,
or call +1-972-308-9960.


TRADEMARKS

Active Firewall, Active Security, Active
Security (in Katakana), ActiveHelp,
ActiveShield, AntiVirus Anyware and design,
Bomb Shelter, Certified Network Expert,
Clean-Up, CleanUp Wizard, CNX, CNX
Certification Certified Network Expert and
design, Design (stylized N), Disk Minder,
Distributed Sniffer System, Distributed Sniffer
System (in Katakana), Dr Solomons, Dr
Solomons label, Enterprise SecureCast,
Enterprise SecureCast (in Katakana), Event
Orchestrator, EZ SetUp, First Aid, ForceField,
GMT, GroupShield, GroupShield (in Katakana),
Guard Dog, HelpDesk, HomeGuard, Hunter,
LANGuru, LANGuru (in Katakana), M and design,
Magic Solutions, Magic Solutions (in Katakana),
Magic University, MagicSpy, MagicTree, McAfee,
McAfee (in Katakana), McAfee and design,
McAfee.com, MultiMedia Cloaking, Net Tools, Net
Tools (in Katakana), NetCrypto, NetScan,
NetShield, NetStalker, Network Associates,
NetXray, NotesGuard, Nuts & Bolts, Oil Change,
PC Medic, PCNotary, PrimeSupport, Recoverkey,
Recoverkey - International, Registry Wizard,
ReportMagic, Router PM, Safe & Sound,
SalesMagic, SecureCast, Service Level Manager,
ServiceMagic, SmartDesk, Sniffer, Sniffer (in
Hangul), Stalker, SupportMagic, TIS, TMEG,
Total Network Security, Total Network
Visibility, Total Network Visibility (in
Katakana), Total Service Desk, Total Virus
Defense, Trusted Mail, UnInstaller, Virex,
Virus Forum, ViruScan, VirusScan, WebScan,
WebShield, WebShield (in Katakana), WebSniffer,
WebStalker, WebWall, Whos Watching Your
Network, WinGauge, Your E-Business Defender,
ZAC 2000, Zip Manager are registered trademarks
of Network Associates, Inc. and/or its
affiliates in the US and/or other countries.
All other registered and unregistered
trademarks in this document are the sole
property of their respective owners.

This product includes or may include software
developed by the OpenSSL Project for use in the
OpenSSL Toolkit. (http://www.openssl.org/)

This product includes or may include
cryptographic software written by Eric Young.
(eay@cryptsoft.com)



LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE
APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO
THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE
LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
CONSULT THE SALES AND OTHER RELATED LICENSE
GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU
HAVE RECEIVED SEPARATELY AS PART OF THE
PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT
CD, OR A FILE AVAILABLE ON THE WEB SITE FROM
WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF
YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH
IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE.
IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO
NETWORK ASSOCIATES, INC. OR THE PLACE OF
PURCHASE FOR A FULL REFUND.




