Views:

Configure hash lists to define trusted files to exclude from security scans.

Important
Important
If you are working on a policy, make sure to save your settings before leaving the screen. Leaving the screen without saving discards any changes.
Hash lists currently only support SHA-1 values. Support for additional hash algorithms is coming soon.
Hash lists are a policy resource you can use to define trusted files by their hash values on your endpoints to exclude from Anti-Malware scans. You can add up to 250 hash lists.

Procedure

  1. Go to Endpoint SecurityEndpoint Security ConfigurationPolicy ResourcesHash Lists.
  2. Create or edit a list.
    • To create a new list, click Add hash list.
    • To edit an existing list, click the list name and go to General
  3. Specify a name and description for the list.
  4. Specify a hash value.
  5. To add more hash values, click Add.
    You can specify up to 50 hash values per list.
  6. Click Save.