If you run a vulnerability scanner against a Microsoft SQL database, it might flag on the Microsoft Stored Procedure (SP)
xp_dirtree. This scan indicates that it's vulnerable and must be removed from the public role, or otherwise disabled. ePolicy doesn't use this stored procedure, so you can safely disable it with no negative impact to ePO.
To remove execute permissions on the stored procedure from the public role, use the following SQL command:
REVOKE Execute ON xp_dirtree FROM PUBLIC
IMPORTANT:
- The statement above is only relevant to ePO. If other databases exist on the same SQL instance as the ePO database, they can be adversely affected when you use the command above.
- Before you run the command, contact the vendors for any other database running on the same instances as the ePO database.