Installation guide

20 Issue — In Metro mode, ScriptScan fails to load and execute. WWAHost.exe, which hosts and executes Metro Apps that
use Java scripts, loads DLLs only from the system folder or apps package folder. ScriptScan resides in %program
files%\systemcore folder. (Reference: 898855)
Resolution — Added proper access rights to ScriptScan so that WWAHost.exe can load it.
21 Issue — When matching file paths against Access Protection rules, the Access Protection driver could cause a system
crash when the file path length is a certain size (including user-defined rules). (Reference: 757986)
Resolution — Improved string length tracking when performing rule matching operations.
22 Issue — A vulnerability allowed for unauthorized privilege escalation by an authenticated user. (Reference: 789945)
Resolution — This update resolves the vulnerability. Refer to online Security Bulletin
SB10034 for the most current
details.
23 Issue — McShield service remains in "Stop Pending" status. (Reference: 916102)
Resolution — Fixed thread synchronization issue related to update certificates thread and service main thread.
24 Issue — In certain environments, scheduled on-demand scans with credentials could fail due to an authentication failure
even with correct credentials. (Reference: 778589)
Resolution — When authentication fails in these environments, Vsplugin now uses an alternative credential
authentication method to launch the on-demand scan task successfully.
Issues resolved in Patch 3
These issues were resolved in the VirusScan Enterprise Patch 3 release.
1 Issue — On-Demand Scanner memory usage grows indefinitely when scanning large number of relatively small files.
(Reference: 695931 )
Resolution — The number of files in the scanner queue is now limited to 100, preventing the On-Demand Scanner
memory from growing too large.
2 Issue — In an IPv6 environment, when a VirusScan Enterprise client sends an event with IPv6 information, the Threat
Event log shows the IPv6 address as a string value instead of the original IPv6 address format. (Reference: 716512).
Resolution — The Threat Event log now correctly displays IPv6 addresses.
3 Issue — McAfee ePolicy Orchestrator queries using pie charts that group by VirusScan Enterprise version numbers display
the client numbers accurately in the chart. However, when you drill down into one chart group, the filter is not applied
and both workstations and servers are displayed. (Reference: 739627)
Resolution — VirusScan Enterprise 8.8.0 Patch 3 and later clients now report a new Machine Type property that classifies
the client systems as Workstation or Server. Use this property in queries to filter against workstations or servers.
4 Issue — In specific situations, users could stop the McShield service. (Reference: 756805)
Resolution — Only administrative users can stop the McShield service.
Issues resolved in Patch 2
These issues were resolved in the VirusScan Enterprise Patch 2 release.