<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trying to whitelist a file for Threat Emulation and Anti-Exploit Blade. in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Trying-to-whitelist-a-file-for-Threat-Emulation-and-Anti-Exploit/m-p/82029#M2212</link>
    <description>&lt;P&gt;Maybe this will help:&amp;nbsp;&lt;A href="https://support.microsoft.com/en-us/help/889768/how-to-compute-the-md5-or-sha-1-cryptographic-hash-values-for-a-file" target="_blank"&gt;https://support.microsoft.com/en-us/help/889768/how-to-compute-the-md5-or-sha-1-cryptographic-hash-values-for-a-file&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Apr 2020 17:54:37 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2020-04-15T17:54:37Z</dc:date>
    <item>
      <title>Trying to whitelist a file for Threat Emulation and Anti-Exploit Blade.</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Trying-to-whitelist-a-file-for-Threat-Emulation-and-Anti-Exploit/m-p/81703#M2200</link>
      <description>&lt;P&gt;I have a user trying to run an .exe that is coming up as malware via the Threat Emulation and Anti-Exploit blade. It is confirmed to be a false positive. I am trying to add it as a whitelist but the only options are: Folder, domain or SHA1. It doesn't look like I can use a wildcard in the folder path for the file name so the next best option would be the SHA1 hash. Is there a relatively easy method for getting the SHA1? Most other AVs will provide the SHA1 on detection so that it can be added to the whitelist. I see the MD5 in the Forensics report but no SHA1. I would hate to have to grab the file from the user everytime there is a false positive just to generate a SHA1 hash.&lt;/P&gt;&lt;P&gt;Is there another way that I should be white listing this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2020 16:26:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Trying-to-whitelist-a-file-for-Threat-Emulation-and-Anti-Exploit/m-p/81703#M2200</guid>
      <dc:creator>jperry</dc:creator>
      <dc:date>2020-04-13T16:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: Trying to whitelist a file for Threat Emulation and Anti-Exploit Blade.</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Trying-to-whitelist-a-file-for-Threat-Emulation-and-Anti-Exploit/m-p/82029#M2212</link>
      <description>&lt;P&gt;Maybe this will help:&amp;nbsp;&lt;A href="https://support.microsoft.com/en-us/help/889768/how-to-compute-the-md5-or-sha-1-cryptographic-hash-values-for-a-file" target="_blank"&gt;https://support.microsoft.com/en-us/help/889768/how-to-compute-the-md5-or-sha-1-cryptographic-hash-values-for-a-file&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 17:54:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Trying-to-whitelist-a-file-for-Threat-Emulation-and-Anti-Exploit/m-p/82029#M2212</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-04-15T17:54:37Z</dc:date>
    </item>
  </channel>
</rss>

