Find application whitelisting solution in use and enumerate its policies.
Practice methods of evading it.
Last updated 2 years ago