The User-Defined Suspicious Object allows users to manually
add the file hashes (SHA-1 or SHA-2) or paths of new IOC (Indicators of Compromise)
into the blocked-file list, which prevents all managed endpoints from being infected
by the malicious files.
![]() |
NoteThe StellarProtect (Legacy Mode) only supports SHA-1 file
hash.
|
Procedure
- Go to .
- Navigate to the target agent or group, and then go to
its Policy page.
Note
For instructions on how to go to the Policy page, see Go to the Agent View for a single agent or Go to the Group Policy Screen for a group of agents. - Find the User-Defined Suspicious Object at the right side of the screen.
- Click Add. The Add Item to User-Defined Suspicious Objects window appears.
- Select Hash or File Path as the suspicious file type.
- Specify the file hash or path in the corresponding text field.
- (Optional) Specify notes in the Notes text field.
- Click OK to complete this task.
- (Optional) To remove a user-defined suspicious object, select the target hash/file path and click the Delete button next to the +Add button.
- A pop-up Notification window appears. Click Confirm to delete the selected item.