Anyone can help us out in vulnerability found in McAfee Web Gateway version 220.127.116.11.0 for SSL/TLS use of weak RC4 cipher over TCP port 9393, this comes under scan report of tool available with us i.e. Qualys Scan.
as mentioned port 9393 is not a port that is opened by default on MWG. That means I don't know what service is listening on that port. That means I cannot tell how to configure SSL settings for this port - as I don't know what is listening on that port.
If you have not configured the port yourself somewhere in the configuration you could run "netstat -tlpen" via SSH to display all opened ports and the process which has opened the port. This might help to find more details.
ASC (Active System Console) listens on port 9393.
This is deprecated functionality and is no longer maintained. All of the features that ASC provided (hardware monitoring) are now possible in MWG natively as of 7.6.0 (Web Gateway 7.6.0 Release Notes - PD26143 ).
To disable ASC, go to the command line on each appliance and type: asc-disable
This will turn it off.
If you are still using ASC for notifications and alerts, I suggest you check out this article:
Download the new ePolicy Orchestrator (ePO) Support Center Extension which simplifies ePO management and provides support resources directly in the console. Learn more about ePO Support Center