I would open a case with Technical Support as I suggested in my last post. Linked under Useful Links at ther top of this page.
It's now free by phone as well as online chat.
The Windows System Event log reports multiple entries for Event ID 516. Entries similar to the following are recorded in the Windows System Event log:
Event Type: Warning
Event Source: mfehidk
Event Category: (256)
Event ID: 516
Date: <Date>
Time: <time>
User: N/A
Computer: <name>
Description:
Process **\VSTSKMGR.EXE pid (XXXX) contains signed but untrusted code, but was allowed to perform a privileged operation with a McAfee driver
On some systems the event is logged every few minutes.
No other symptoms are reported on the client.
Perform the steps below to troubleshoot issues where third-party code is inserted into McAfee processes or interacts with McAfee kernel code from other processes.
Deal with intrusive third-party applications
If you determine that the events are caused by a third-party application, and no option exists from the vendor to avoid hooking McAfee processes or otherwise engaging with McAfee code, you can opt to trust the application so that no more Event 516 messages will be generated for that specific application. These events will still occur for other applications and for malware.
NOTE: An application can only be trusted if it has a digital signature. If it does not, VSE can never trust it. There is no way to suppress events for unsigned applications.
Risks associated with trusting a third-party application
Files that contain a digital certificate that you choose to trust are still scanned when first accessed. McAfee utilizes a clean-file scan cache to avoid re-scanning files that have already been scanned and found to be clean. Files that are trusted are added to the cache and will remain in the cache even after a DAT signature update occurs. This behavior is inherent with trusting digital signatures.
NOTE: When you add a file to the scan cache, the stored data includes the settings used to scan the file. If your scan settings are changed to a higher (more secure) level, then trusted items in the cache would be rescanned.
Advantage: You may see a performance gain, even after a DAT update.
Disadvantage: If new DAT signatures would normally find those trusted files to be infected, they would not be scanned by the
On-Access Scanner to find that malware.
Mitigation McAfee reserves the right to use the DAT signature updates to force trusted files to be removed from the clean-file scan cache, causing them to be re-scanned when accessed. You can also cause existing trusted files to be scanned. Perform an On-Demand Scan and disable the option Allow On-Demand scans to utilize the scan cache. See the Related Information section for additional information
How to trust a third-party applicationMessage was edited by: alexn on 8/29/12 8:09:07 AM CDT
- Obtain the signature file.
- Right-click the third-party DLL file (or any of the third-party application signed files) and select Properties.
- Click the Digital Signatures tab.
- Select the appropriate digital signature from the Signature list.
- Click Details, View Certificate.
- Click the Details tab, then click Copy to File.
- Complete the Certificate Export Wizard and note where you save the .cer file. McAfee recommends that you accept the default wizard options, with the exception of the file path.
- Import a copy of the product's digital certificate into the McAfee Trust certificate store.
- Contact McAfee Support. See the Related Information section for the contact details.
- Provide the .cer file you want to add.
McAfee Support will provide an executable package to add the certificate to the McAfee Trust certificate store.- Run the executable provided by McAfee Support. (Steps to do so via ePolicy Orchestrator will be provided by McAfee Support.)
- Click Tools, General Options, Global Scan Settings and deselect Enable saving scan data across reboots, then click Apply, OK.
- Restart your computer. This is necessary for the certificate store changes to take effect.
- Click Tools, General Options, Global Scan Settings and select Enable saving scan data across reboots, then click Apply, OK.
Useful info, Alex, but two things.
1. You've answered a question posted two years ago. It's not clear from the context whether this is a response to an old problem or a new one. I suspect it's a new one, in which case a new thread with a different title might be appropriate.
2. The information was originally intended for Corporate users. Home users don't have VSE and won't see vstskmgr.exe or wscav.dll (I don't, anyway). The Process Explorer instructions are useful, but I think the rest of it needs to be adapted for the Home User product(s). In particular,
- Run the executable provided by McAfee Support. (Steps to do so via ePolicy Orchestrator will be provided by McAfee Support.)
Will that executable be provided to Home users?
Tools, General Options, Global Scan Settings
This must be a menu setting on something we haven't got.
Hi Alex,
You've clearly done a lot of research, but I tend to agree with Hayton. I believe I set the ball rolling 2 years ago. Your suggestion looks quite complicated and,if unsuccessful, could wreck an otherwise satisfactorily running Vista system.
As a McAfeeAntiVirus Plus Home user paying $65 p.a. (for 2 PCs) I don't see why I should have to go to so much trouble to fix a McAfee defect. Why can't an update, upgrade or the Virtual Technician do it?
Regards
We have also opened a ticket with support on this. We see it across our environment. Win7 desktop and servers.. Anyone have anything new on this?
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.
Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership: