We are running periodic scan on all endpoints . During this scan few files has been detected .We have got confirmation that some of the files are legitimate and it's being used in infra.
Can you please suggest in providing what is the best method to whitelist the safe and confirmed files .
Yes, you can whitelist the file hash by going into Incident Response → Action Center → New Action – Add to allow list.
Please note that once the file changes (via updates for example) you will need to whitelist the new hash again.
If you know the signature of your verified software, you can also add the singer as a trusted signer when creating a new malware profile (the page I recommended in the above response).
Please note that adding file hash to the allowlist will bypass the verdict of WF or local analysis, it will not prevent alerts generated by BTP rules, and alerts can still be triggered by child processes .
In case your alerts are triggered by BTP rules, you can add a Global Behavioral Threat Protection (BTP) Rule Exception.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!