 Release Notes for McAfee AutoUpdate Architect
                  Version 1.0
 (c) 2003 Networks Associates Technology, Inc.
              All Rights Reserved


===============================================

McAfee AutoUpdate Architect version 1.0.0
AutoUpdate version 7.0.0

===============================================


Thank you for using McAfee AutoUpdate Architect
software. This file contains important
information regarding this release. We strongly
recommend that you read the entire document.


   IMPORTANT:
   McAfee strongly recommends that you use any
   pre-release software (beta or release
   candidate) in a test environment only.
   Pre-release software should not be installed
   in a production environment.


_______________________________________________
WHAT'S IN THIS FILE

-  Features
-  Installation and System Requirements
-  Known Issues
-  Documentation
-  Contacting McAfee and Network Associates
-  Copyright and Trademark Attributions
   -  Trademarks
   -  License Agreement

_______________________________________________
FEATURES

McAfee AutoUpdate Architect includes the
following features:

-  Always-up-to-date.
   McAfee AutoUpdate Architect can be
   configured to download the most current
   updates regularly for distribution to the
   destination computers. Such pull tasks can
   be scheduled to occur as often as you want.

-  Distributed repository support.
   The distributed repository architecture of
   McAfee AutoUpdate Architect makes it easy to
   deploy anti-virus updates throughout your
   enterprise by allowing you to retrieve your
   McAfee anti-virus software update from an
   internal update server. This feature
   supports Microsoft Windows or Novell FTP
   servers, HTTP servers, and UNC shares.

-  Support for all McAfee update types.
   From the McAfee AutoUpdate Architect
   console, you can deploy HotFixes, Service
   Packs, virus definition (dat) files, engine
   packages, and incremental and supplemental
   (extra.dat) files for supported McAfee
   products. Once you add these product updates
   to the master repository, you can deploy
   them to client computers.

-  Proxy server and firewall authentication
   support.
   You can configure McAfee AutoUpdate
   Architect so that the master repository
   retrieves updates and distributed
   repositories replicate through proxy servers
   and firewalls.

-  Bandwidth-friendly replication.
   You can choose to replicate only incremental
   DAT files.

-  Easy-to-use user interface.
   The user interface is greatly improved in
   this beta release of McAfee AutoUpdate
   Architect. The interface is web-based with
   easy-to-follow links, provides
   context-sensitive information when you point
   to the actions and components displayed, and
   is illustrative, with an easy-to-understand
   diagram of the McAfee AutoUpdate Architect
   components.

-  Strong encryption and digital signatures.
   McAfee AutoUpdate Architect secures update
   files with 168-bit 3DES encryption and
   44-byte DSA digital signatures.

-  Immediate or scheduled replication.
   You can configure McAfee AutoUpdate
   Architect to replicate new updates by
   scheduling the task. Or, if you wish to have
   full control over releasing new dat or
   engine files into your environment, you can
   launch a replication task immediately, at
   any time.

-  Exportable repository list file.
   The repository list is stored in the
   sitelist.xml file. This file allows products
   using AutoUpdate 7.0 or the ePolicy
   Orchestrator 3.0 agent to retrieve updates
   from repositories defined in the list. The
   order of the list indicates the priority of
   the repositories. This list is editable.

-  Support for system environment variables
   within the repository list.

-  Support for resumable downloads in all
   protocols. When a download is interrupted,
   the next download will resume the
   interrupted download if the file is larger
   than 4K.


_______________________________________________
INSTALLATION AND SYSTEM REQUIREMENTS

Please see product documentation for complete
information regarding installation and system
requirements.


_______________________________________________
KNOWN ISSUES

1. A replication task cannot be performed to an
   FTP repository through a proxy server. This
   is a limitation of proxy servers.
2. FTP servers that require an anonymous user
   to transmit a properly formatted e-mail
   address as the password are not supported.
   McAfee AutoUpdate Architect will remove the
   @ symbol from passwords. You may be able
   to disable this requirement on the FTP
   server.

3. If two separate accounts on an FTP server
   (such as an anonymous and an authenticated
   user accounts) are used to access the same
   repository, then the path from the root of
   the file system to the repository must be
   the same for both FTP user accounts. This
   means that you cannot configure the
   directory (with the "chroot" command) one
   without configuring the directory of the
   other to the same location. The recommended
   scenario is to have a dedicated user account
   whose home directory is the same as the
   anonymous user account, and have it
   configured to his home directory. Thus, if
   the anonymous user account is configured to
   "/var/ftp", then the authenticated user
   accounts home directory should be
   "/var/ftp". The FTP server should be
   configured to change the directory of the
   authenticated user account to its home
   directory.
4. Networks running content scanning/filtering
   software (for example, WebSense software
   products) are not able to update due to the
   update package being modified.
5. The McAfee AutoUpdate Architect console does
   not consistently display newly added
   information immediately.  Pressing the F5
   key to refresh the console after information
   has been added resolves this problem.

6. You may notice that AutoUpdate 7.0 does not
   consistently remove all temporary files and
   directories created when the update fails.
   However, once the update is successful, the
   files are removed. This is necessary for
   resumable downloads and saves bandwidth.

7. Exporting a repository list to ePolicy
   Orchestrator 2.x is not supported. Instead,
   use AutoUpdate 7.0 (Common Updater) policies
   (with the CMU300.NAP file) in ePolicy
   Orchestrator 2.x to configure repositories.

8. We recommend running McAfee AutoUpdate
   Architect with Microsoft Internet Explorer
   6.0 SP1 on Micorsoft Windows NT 4, Windows
   2000, and Windows XP systems. However, you
   should upgrade to Internet Explorer 6.0 SP1
   from the original Internet Explorer 6.0, not
   the cumulative patch. Otherwise, you may
   experience script errors. Microsoft has
   confirmed this problem with these Internet
   Explorer patches, and we are working with
   them to resolve this issue.

9. "Error: Object expected."
   You need local administrator rights to run
   McAfee AutoUpdate Architect. Otherwise, you
   get an error message that McAfee AutoUpdate
   Architect failed to initialize the ActiveX
   control.

10.   The DELETE key does not function in many
   of the McAfee AutoUpdate Architect dialog
   boxes. Use the BACKSPACE key.  We are
   currently working with Microsoft to resolve
   this issue.

11.   In certain circumstances, pressing the F5
   key to refresh the console causes the McAfee
   AutoUpdate Architect console to stop
   responding due to a timing issue on
   Microsoft .NET Server RC1.

12.   When you check packages into the master
   repository, packages that are no longer
   applicable are automatically removed. For
   example, if you have VirusScan 4.5 and
   VirusScan 4.5 HotFix 1 checked into the
   master repository, then check in VirusScan
   4.5.1, both VirusScan 4.5 packages are
   removed.

13.   McAfee AutoUpdate Architect does not
   appear on the "Applications" tab of the
   Windows Task Manager while McAfee AutoUpdate
   Architect software is running. If you wish
   to use Task Manager to close McAfee
   AutoUpdate Architect at any time, you must
   end MSHTA.EXE on the "Processes" tab.

14.   McAfee recommends that you do not check
   in the DAT+Engine SuperDAT file into MAA.
   This will cause client computers that are
   already up-to-date to download SuperDAT
   files, and use unnecessary bandwidth. To
   update engine and DAT files, McAfee
   recommends selecting "Updates" and checking
   in the DAT and Engine packages separately.

15.   You must keep your system account
   passwords used by McAfee AutoUpdate
   Architect up-to-date. If the password used
   by McAfee AutoUpdate Architect is not
   current, the software will continue
   attempting to log in, and the computer may
   stop responding.


_______________________________________________
DOCUMENTATION

This product includes a documentation set that
consists of manuals saved in Adobe Acrobat
Portable Document Format (.PDF), and an online
Help system.

Electronic copies of all product manuals are
included on the product CD, or are available
with a valid grant number on the McAfee
download site:

      www.mcafeeb2b.com/naicommon/download/upgrade/login.asp


A free copy of the latest version of Acrobat
Reader comes with the product CD, or you can
download any version from the Adobe web site:

      www.adobe.com/prodindex/acrobat/readstep.html


This product includes the following
documentation set:


1. Product Guide. This guide introduces the
   product, documents product features,
   provides detailed instructions for
   configuring the software, and includes
   information on deployment as well as
   recurring tasks and operating procedures. An
   Adobe Acrobat .PDF version of this guide is
   stored on the product CD. You can also
   download a copy in .PDF format from the
   McAfee download site.

2. Online Help system. Online Help, accessed
   from within the software application, gives
   you quick access to hints and tips about
   using your software. Help includes
   field-level page-level context Help with
   links to more detailed and related
   information. (Help also includes an overview
   of product features and step-by-step
   procedures for product features.)


3. A LICENSE Agreement. This outlines the terms
   under which you may use the product. Read it
   carefully. If you install the product, you
   agree to the license terms.

4. This README file.



_______________________________________________
PARTICIPATING IN THE MCAFEE BETA PROGRAM

To download new beta software or to read about
the latest beta information, visit the beta web
site located at:

   www.mcafeeb2b.com/beta

To submit beta feedback on any McAfee product,
send e-mail to:

      avbeta@nai.com

McAfee is devoted to providing solutions based
on your input.



_______________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

(c) 2003 Networks Associates Technology, Inc.
All Rights Reserved. No part of this
publication may be reproduced, transmitted,
transcribed, stored in a retrieval system, or
translated into any language in any form or by
any means without the written permission of
Networks Associates Technology, Inc., or its
suppliers or affiliate companies. To obtain
this permission, write to the attention of the
Network Associates legal department at: 3965
Freedom Circle, Santa Clara, California 95054,
or call +1-972-308-9960.


TRADEMARKS

Active Firewall, Active Security, Active
Security (in Katakana), ActiveHelp,
ActiveShield, AntiVirus Anyware and design,
Bomb Shelter, Certified Network Expert,
Clean-Up, CleanUp Wizard, CNX, CNX
Certification Certified Network Expert and
design, Design (stylized N), Disk Minder,
Distributed Sniffer System, Distributed Sniffer
System (in Katakana), Dr Solomons, Dr
Solomons label, Enterprise SecureCast,
Enterprise SecureCast (in Katakana), Event
Orchestrator, EZ SetUp, First Aid, ForceField,
GMT, GroupShield, GroupShield (in Katakana),
Guard Dog, HelpDesk, HomeGuard, Hunter,
LANGuru, LANGuru (in Katakana), M and design,
Magic Solutions, Magic Solutions (in Katakana),
Magic University, MagicSpy, MagicTree, McAfee,
McAfee (in Katakana), McAfee and design,
McAfee.com, MultiMedia Cloaking, Net Tools, Net
Tools (in Katakana), NetCrypto, NetScan,
NetShield, NetStalker, Network Associates,
NetXray, NotesGuard, Nuts & Bolts, Oil Change,
PC Medic, PCNotary, PrimeSupport, Recoverkey,
Recoverkey - International, Registry Wizard,
ReportMagic, Router PM, Safe & Sound,
SalesMagic, SecureCast, Service Level Manager,
ServiceMagic, SmartDesk, Sniffer, Sniffer (in
Hangul), Stalker, SupportMagic, TIS, TMEG,
Total Network Security, Total Network
Visibility, Total Network Visibility (in
Katakana), Total Service Desk, Total Virus
Defense, Trusted Mail, UnInstaller, Virex,
Virus Forum, ViruScan, VirusScan, WebScan,
WebShield, WebShield (in Katakana), WebSniffer,
WebStalker, WebWall, Whos Watching Your
Network, WinGauge, Your E-Business Defender,
ZAC 2000, Zip Manager are registered trademarks
of Network Associates, Inc. and/or its
affiliates in the US and/or other countries.
All other registered and unregistered
trademarks in this document are the sole
property of their respective owners.

This product includes or may include software
developed by the OpenSSL Project for use in the
OpenSSL Toolkit. (http://www.openssl.org/)

This product includes or may include
cryptographic software written by Eric Young.
(eay@cryptsoft.com)



LICENSE AGREEMENT

NOTICE TO ALL USERS: CAREFULLY READ THE
APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO
THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE
LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
CONSULT THE SALES AND OTHER RELATED LICENSE
GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU
HAVE RECEIVED SEPARATELY AS PART OF THE
PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT
CD, OR A FILE AVAILABLE ON THE WEB SITE FROM
WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF
YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH
IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE.
IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO
NETWORK ASSOCIATES, INC. OR THE PLACE OF
PURCHASE FOR A FULL REFUND.




