Use checksums to authenticate applications

Each version of an application has a unique checksum. The firewall can use this checksum to decide whether an application is allowed or not.

By default, the firewall checks the checksum of each application that runs. If the checksum is unknown or has changed, the firewall blocks it or (in interactive mode) asks the user what to do.

The firewall also sends an alert to the management console, if one is being used, the first time a new or modified application is detected.

To add a checksum to the list of allowed checksums:

  1. On the Home page, under Firewall, click Configure firewall.

    For information about the Home page, see About the Home page.

  2. Under Configurations, click Configure next to the location that you want to configure.
  3. Click the Checksums tab.
  4. Click Add.
  5. Locate the application, and then double-click it.
If you are using interactive mode, the firewall can display a learning dialog when it detects a new or modified application.