I need a solution
Hi community. I'm looking to see if anyone has created an SQL script that queries the SEPM DB and extracts the existing whitelist from the DB. I've already looked at the Log and SEM_Application table, which are great for event reporting, but what I am really after is a table (or tables) that contain the whitelist file fingerprint that has been file added by the GUI so that I can report on it. Be nice to also get any string information for directory exclusions like #HKEY#'s as well. Thanks to anyone who has done this before and can shed some light. - Jim
0