Turn the use of checksums on or off

By default, the firewall uses checksums to authenticate applications. When you trust or block applications, they are identified by their checksums automatically (you can also manually add checksums). If the application does not match a checksum, it is blocked.

If you disable this option, applications are identified by their filename.

To turn the use of checksums to authenticate applications on or off:

  1. Double-click the firewall policy you want to change.
  2. On the Welcome page of the Firewall Policy wizard, click Advanced firewall policy.
  3. Under Configurations, click Configure next to the location for which you want to configure the firewall.
  4. On the General tab, under Blocking, select or clear the Use checksums to authenticate applications check box.