my question is how the WHAM-fasl-scrpts are executed/interpreted on the windows systems.
What kind of binary will be transmitted to the scan target to execute the WHAM-FASL-scripts (Registry Reading,....) and how?
Go to Solution.
I can't share much more here in a public forum other than "we do not transmit binaries to the targets".
If you have a business justification for needing something further than that, I suggest you open a Service Request, and possibly more can be shared if you're under NDA.
I'm checking on an answer for this. I'm not sure how much of that information we will be able to share.
When I get some answers I will respond.
Download the new ePolicy Orchestrator (ePO) Support Center Extension which simplifies ePO management and provides support resources directly in the console. Learn more about ePO Support Center
2821 Mission College Blvd.
Santa Clara, CA 95054 USA
Consumer Support | Enterprise Support | McAfee.com
Legal | Privacy | Copyright © 2019 McAfee, LLC