      Release Notes for System Compliance
                  Profiler(TM)
               Version 1.0 BETA 2
   2003 Networks Associates Technology, Inc.
              All Rights Reserved


=====================================================

Thank you for using System Compliance Profiler
(TM) software. This file contains important
information regarding this release. We strongly
recommend that you read the entire document.


   IMPORTANT:
   McAfee Security strongly recommends that you
   use any pre-release software (beta or
   release candidate) in a test environment
   only. Pre-release software should not be
   installed in a production environment.

   McAfee Security does not support automatic
   upgrading of a pre-release version of the
   software. To upgrade to a later beta
   release, a release candidate, or a
   production release of the software, you must
   first uninstall the existing version of the
   software.


_____________________________________________________
WHAT'S IN THIS FILE

-  Features
-  Whats New in this Beta
-  Installation & System Requirements
-  Resolved Issues
-  Known Issues
-  Documentation
-  Participating in the McAfee Security Beta
   Program
-  Copyright and Trademark Attributions
   -  Trademarks
   -  License Agreement and Attributions


_____________________________________________________
FEATURES


System Compliance Profiler version 1.0 (Beta 2)
offers the following features:

-  Microsoft patch compliance reporting.

-  Customizable compliance assessment based on
   searches for specific files, registry
   entries, services and Microsoft patch
   references.

-  Downloadable rule templates.

-  File and patch integrity verification (with
   MD5 'fingerprinting') .

-  Completely integrated with McAfee ePolicy
   Orchestrator for centralized administration
   and host-based compliance reporting.

-  Graphical compliance reports with drill-down
   paths.


   NOTE:
   System Compliance Profiler provides scanning
   and reporting features only. To distribute
   and manage patches, Network Associates
   recommends using third-party deployment
   software.


_____________________________________________________
WHATS NEW IN THIS BETA

The major changes in System Compliance Profiler
Beta2 include:

-  The rule list has been split into two
   separate lists. The top list contains the
   rules that System Compliance Profiler uses
   in its scans. The bottom list contains rule
   templates, a rule development area, and a
   folder for archived rules.

-  In rule sets, you can no longer create
   individual rules at the top level; you can
   only create groups at this level. All rules
   must reside within a group.

-  You cannot cut and paste rule templates, but
   you can copy them.

-  The Product Deployment Details report has
   been removed.

-  Reports include additional drill-down
   paths.

-  Compliance/Non-Compliance reports now show
   "Unknown Scan Results" for computers that
   have not reported scan results using the
   latest scanning rules.

-  Reports now show violations by rule rather
   than by group. (However the results do show
   the group associated with each rule
   violation.)


_____________________________________________________
INSTALLATION AND SYSTEM REQUIREMENTS

Please see the product documentation for
complete information regarding installation and
system requirements.


_____________________________________________________
RESOLVED ISSUES

The following list describes issues from the
previous alpha release of this software product
that have been resolved with this current beta
release.


1. ISSUE:
   Rules designed to scan for HKEY_CURRENT_USER
   registry keys did not work properly.

   RESOLUTION:
   This list item is no longer available.



_____________________________________________________
KNOWN ISSUES

-  In some cases, removing System Compliance
   Profiler from ePolicy Orchestrator does not
   work the first time. If you encounter
   problems, uninstall the software again.



_____________________________________________________
DOCUMENTATION

Documentation is included on the product CD
and/or is available with a valid grant number
from the McAfee Security download site:

      https://secure.nai.com/us/forms/downloads/upgrades/login.asp

   NOTE:
   Electronic copies of all product manuals are
   saved as Adobe Acrobat .PDF files. The
   product CD includes the latest version of
   Acrobat Reader, or you can download any
   version from the Adobe web site:

      www.adobe.com/prodindex/acrobat/readstep.html


SYSTEM COMPLIANCE PROFILER DOCUMENTATION

-  Getting Started Guide.
   For use with ePolicy Orchestrator(TM).
   Procedures for installing, configuring,
   deploying, and managing your McAfee Security
   and third-party products through ePolicy
   Orchestrator management software.

-  This README file.

-  A CONTACT file.
   Contact information for McAfee Security and
   Network Associates services and resources:
   technical support, customer service, AVERT,
   beta program, and training. It also includes
   a list of phone numbers, street addresses,
   web addresses, e-mail addresses, and fax
   numbers for Network Associates offices in
   the United States and around the world.


SUPPLEMENTAL DOCUMENTATION

-  ePolicy Orchestrator 3.0(TM) Product Guide.



_____________________________________________________
PARTICIPATING IN THE MCAFEE SECURITY BETA
PROGRAM

To download new beta software or to read about
the latest beta information, visit the beta web
site:

      http://www.networkassociates.com/us/downloads/beta/

To submit your feedback on any McAfee Security
beta product, send e-mail to:

      Scp_beta@nai.com

McAfee Security is devoted to providing
solutions based on your input.


_____________________________________________________
COPYRIGHT AND TRADEMARK ATTRIBUTIONS

 2003 Networks Associates Technology, Inc. All
Rights Reserved. No part of this publication
may be reproduced, transmitted, transcribed,
stored in a retrieval system, or translated
into any language in any form or by any means
without the written permission of Networks
Associates Technology, Inc., or its suppliers
or affiliate companies. To obtain this
permission, write to the attention of the
Network Associates legal department at: 5000
Headquarters Drive, Plano, Texas 75024, or call
+1-972- 963-8000.


TRADEMARKS

Active Firewall, Active Security, Active
Security (in Katakana), ActiveHelp,
ActiveShield, AntiVirus Anyware and design,
Appera, AVERT, Bomb Shelter, Certified Network
Expert, Clean-Up, CleanUp Wizard, ClickNet,
CNX, CNX Certification Certified Network Expert
and design, Covert, Design (stylized N), Disk
Minder, Distributed Sniffer System, Distributed
Sniffer System (in Katakana), Dr Solomons, Dr
Solomons label, E and Design, Entercept,
Enterprise SecureCast, Enterprise SecureCast
(in Katakana), ePolicy Orchestrator, Event
Orchestrator (in Katakana), EZ SetUp, First
Aid, ForceField, GMT, GroupShield, GroupShield
(in Katakana), Guard Dog, HelpDesk, HelpDesk
IQ, HomeGuard, Hunter, Impermia, InfiniStream,
Intrusion Prevention Through Innovation,
IntruShield, IntruVert Networks, LANGuru,
LANGuru (in Katakana), M and design, Magic
Solutions, Magic Solutions (in Katakana), Magic
University, MagicSpy, MagicTree, McAfee, McAfee
(in Katakana), McAfee and design, McAfee.com,
MultiMedia Cloaking, NA Network Associates, Net
Tools, Net Tools (in Katakana), NetAsyst,
NetCrypto, NetOctopus, NetScan, NetShield,
NetStalker, Network Associates, Network
Performance Orchestrator, Network Policy
Orchestrator, NetXray, NotesGuard, nPO, Nuts &
Bolts, Oil Change, PC Medic, PCNotary,
PortalShield, Powered by SpamAssassin,
PrimeSupport, Recoverkey, Recoverkey 
International, Registry Wizard, Remote Desktop,
ReportMagic, RingFence, Router PM, Safe &
Sound, SalesMagic, SecureCast, SecureSelect,
Service Level Manager, ServiceMagic, SmartDesk,
Sniffer, Sniffer (in Hangul), SpamKiller,
SpamAssassin, Stalker, SupportMagic,
ThreatScan, TIS, TMEG, Total Network Security,
Total Network Visibility, Total Network
Visibility (in Katakana), Total Service Desk,
Total Virus Defense, Trusted Mail, UnInstaller,
VIDS, Virex, Virus Forum, ViruScan, VirusScan,
WebScan, WebShield, WebShield (in Katakana),
WebSniffer, WebStalker, WebWall, What's The
State Of Your IDS?, Whos Watching Your
Network, WinGauge, Your E-Business Defender,
ZAC 2000, Zip Manager are registered trademarks
or trademarks of Network Associates, Inc.
and/or its affiliates in the US and/or other
countries. Sniffer brand products are made
only by Network Associates, Inc. All other
registered and unregistered trademarks in this
document are the sole property of their
respective owners.


LICENSE INFORMATION

License Agreement

NOTICE TO ALL USERS: CAREFULLY READ THE
APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO
THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE
LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH
TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
CONSULT THE SALES AND OTHER RELATED LICENSE
GRANT OR PURCHASE ORDER DOCUMENTS THAT
ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU
HAVE RECEIVED SEPARATELY AS PART OF THE
PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT
CD, OR A FILE AVAILABLE ON THE WEB SITE FROM
WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF
YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH
IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE.
IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO
NETWORK ASSOCIATES, INC. OR THE PLACE OF
PURCHASE FOR A FULL REFUND.


Attributions

This product includes or may include:

-  Software developed by the OpenSSL Project
   for use in the OpenSSL Toolkit
   (http://www.openssl.org/).

-  Cryptographic software written by Eric Young
   (eay@cryptsoft.com).

-  Some software programs that are licensed (or
   sublicensed) to the user under the GNU
   General Public License (GPL) or other
   similar Free Software licenses which, among
   other rights, permit the user to copy,
   modify and redistribute certain programs, or
   portions thereof, and have access to the
   source code.  The GPL requires that for any
   software covered under the GPL which is
   distributed to someone in an executable
   binary format, that the source code also be
   made available to those users.  For any such
   software covered under the GPL, the source
   code is made available on this CD.  If any
   Free Software licenses require that Network
   Associates provide rights to use, copy or
   modify a software program that are broader
   than the rights granted in this agreement,
   then such rights shall take precedence over
   the rights and restrictions herein.

-  Software originally written by Henry
   Spencer, Copyright 1992, 1993, 1994, 1997
   Henry Spencer.

-  Software originally written by Robert
   Nordier, Copyright  1996-7 Robert Nordier.
   All rights reserved.

-  Software written by Douglas W. Sauder.

-  Software developed by the Apache Software
   Foundation (http://www.apache.org/).

-  International Components for Unicode ("ICU")
   Copyright  1995-2002 International Business
   Machines Corporation and others. All rights
   reserved.

-  Software developed by CrystalClear Software,
   Inc., Copyright  2000 CrystalClear
   Software, Inc.

-  FEAD Optimizer technology, Copyright
   Netopsystems AG, Berlin, Germany.



