My vulnerability scan has flagged MSXML4.dll on few servers and workstations as unsupported and therefore subject to vulnerabilities. I would like to simply delete them but I would like to know which application installed it and still using it ? Any ideas ? Is there a powershell script I can use to auto remove these dll files
BTW the MSXML4 appears on my supported OS - Win 10, Windows Server 2012 and Windows Server 2016 in the C:\Windows\SYSWOW64\ folder.