Configure hash lists to define trusted files to exclude from security scans.
ImportantIf you are working on a policy, make sure to save your settings before leaving the
screen. Leaving the screen without saving discards any changes.
Hash lists currently only support SHA-1 values. Support for additional hash algorithms
is coming soon.
|
Hash lists are a policy resource you can use to define trusted files by their hash
values on your endpoints to exclude from Anti-Malware scans. You can add up to 250 hash lists.
Procedure
- Go to .
- Create or edit a list.
-
To create a new list, click Add hash list.
-
To edit an existing list, click the list name and go to General
-
- Specify a name and description for the list.
- Specify a hash value.
- To add more hash values, click Add.You can specify up to 50 hash values per list.
- Click Save.
