Security contact and IT policies for OncoHealth engagement. Roman Zorii is the IT security POC. Covers CrowdStrike, JumpCloud, Playwright cookie restrictions, and approved workarounds. Trigger when dealing with security alerts, antivirus blocks, browser automation restrictions, CrowdStrike, JumpCloud, or IT compliance on the OncoHealth laptop.
CrowdStrike blocks esentutl.exe cookie copying — Playwright's default persistent-context mechanism for Edge/Chrome. This is flagged as malware-like (credential theft pattern).
No antivirus exception will be granted for esentutl.exe cookie copying.
Roman's approved workarounds:
storageState — Playwright's JSON-based auth state (cookies + localStorage export/import)miro-login-capture.js used Playwright persistent context to read Miro boardsesentutl.exe to copy Edge session cookiesstorageState or API tokensshared/miro-api.js) instead of browser automation for Miro. For other browser automation, use storageState pattern.// Step 1: Manual login, save state
const context = await browser.newContext();
const page = await context.newPage();
await page.goto('https://target-site.com');
// ... manual login ...
await context.storageState({ path: 'auth-state.json' });
// Step 2: Reuse state (no esentutl.exe)
const context = await browser.newContext({ storageState: 'auth-state.json' });
storageState