Quantcast
Channel: Symantec Connect - Endpoint Protection - Discussions
Viewing all articles
Browse latest Browse all 10484

Add Exception Based On File-Hash

$
0
0
I need a solution

Hi everyone

Simple question, but I do not seem to find the information I look for so far.
What happened:

There have been a lot of false-positives detected by new signatures.
On a lot of workstations, there has an EXE been quarantined.
This EXE, of course, needs to be added to the exceptions.

Issue I have here, that each detection has generated an entry in the list of applications to add in the execption policy.
The file always has the same hash, but each time another file location.

Now, do I have to add each of this available applications to the exception policy or is one time enough? Because the file always has the same SHA256 hash.

Thanks for the help in advance.

0

Viewing all articles
Browse latest Browse all 10484

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>