Use checksums to authenticate applications
Each version of an application has a unique checksum. The firewall can use this checksum to decide whether an application is allowed or not.
By default, the firewall checks the checksum of each application that runs. If the checksum is unknown or has changed, the firewall blocks it or (in interactive mode) asks the user what to do.
The firewall also sends an alert to the management console, if one is being used, the first time a new or modified application is detected.
To add a checksum to the list of allowed checksums:
-
On the
Home page, under
Firewall, click
Configure firewall.
For information about the Home page, see About the Home page.
- Under Configurations, click Configure next to the location that you want to configure.
- Click the Checksums tab.
- Click Add.
- Locate the application, and then double-click it.