VIRUSSCAN: 8.8.0 (188.8.131.528)-patch3
MCAFEE AGENT: 184.108.40.20622
In our internal network we are testing a webapplication.
We recieve an SCRIPTING alert (see the attachment bellow).
Under EPO-VirusScan Enterprise 8.8.0 > On-Access General Policies > My Default/SCRIPTSCAN
We have added: https://testsite.company.com/web-site/frames.jsp.
Woke up agents for complete task/policy update.
Alert is still appearing
* Any other proper suggestion?
* What's with the wildcards? Under scriptscan it saids:
with best regards,
Message was edited by: bostjanc on 6/10/13 2:02:18 PM GMT+01:00Message was edited by: bostjanc on 6/10/13 2:02:34 PM GMT+01:00
Solved! Go to Solution.
I would be more worried that your own code is being detected as an actual known exploit rather than generic script blocking but that's another question for another time.
A couple of thoughts
1. What are you testing it on? Don't forget that there are two places to put the exclusion one for workstations and one for servers
2. Aren't exclusions supposed to be just the domain name? https://kc.mcafee.com/corporate/index?page=content&id=KB65382
Our research department is developing some web applications.
I think they have solved it in the code, but I need to get info from a reasearcher whos is currently away.
i have excluded on workstations because currently then don't test it on servers.