Feeds

McAfee upgrade plays nasty with Lotus Notes

You've got mail! But can't have it!

Choosing a cloud hosting partner with confidence

Admins who took the time to upgrade to the latest version of McAfee's VirusScan Enterprise are reporting problems with client applications of Lotus Notes, in some cases requiring IT administrators to reinstall the email program.

The problem appears to occur after VirusScan has been upgraded to 8.5i. It causes Lotus Notes to display an error message informing users that they are not authorized to receive their own email.

"That's a major issue," an IT administrator, who asked to remain unidentified, complained. He said the problem plagues some users and not others, seemingly without rhyme or reason. In some cases, Lotus had been corrupted, requiring him to reinstall the program. For the time being he has been forced to downgrade to VirusScan 8.0.

A McAfee spokeswoman, having been informed of the report, said she would get back with more information. As of the writing of this article - tick, tock - we still had not received a return call.

So we went digging further and came across an item on McAfee's knowledge base. It acknowledged: "A new feature in VirusScan Enterprise (VSE) 8.5i is incurring a problem with the Lotus Notes client while attempting to scan the server-side mailboxes." It assured users that engineers were working to fix the bug.

It also provided a work-around, but our tipster said he was unable to get that to work.

So we did a little more digging and came across a posting on a Lotus support site. The author found that only installations that included the Domino Designer client for Windows XP and 2000 were afflicted.

"I found that on these clients functions for McAfee scanning had been added to the Notes [Actions] menu," according to the post. "Removing these lines from notes.ini and restarting the client fixed the problem."

This isn't the first infirmity to affect McAfee users. Last year a flaw in McAfee SecurityCenter made systems vulnerable to a complete system compromise, having the dubious effect of making users more secure running no security software at all. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?