Advanced firewall configuration / Configuring the firewall |
By default, the firewall uses checksums to authenticate applications. When you trust or block applications, they are identified by their checksums automatically (you can also manually add checksums). If the application does not match a checksum, it is blocked.
If you disable this option, applications are identified by their filename.
To turn the use of checksums to authenticate applications on or off: