I need a solution
Hi everyone
Simple question, but I do not seem to find the information I look for so far.
What happened:
There have been a lot of false-positives detected by new signatures.
On a lot of workstations, there has an EXE been quarantined.
This EXE, of course, needs to be added to the exceptions.
Issue I have here, that each detection has generated an entry in the list of applications to add in the execption policy.
The file always has the same hash, but each time another file location.
Now, do I have to add each of this available applications to the exception policy or is one time enough? Because the file always has the same SHA256 hash.
Thanks for the help in advance.
0