


If you want to upload more hashes later, click on the “Upload Hashes” icon on the top right corner of the window.Ī list of the hashes along with the selected policy, in this case “always block” is visible from the “Configuration -> Prevention Hashes” dashboard. You can see that the hash has been uploaded. If not make changes until the settings are as desired. Select your choice and click “apply” again.Ī confirmation window will appear, select “apply” if everything looks correct. Rows with non-MD5/SHA256 hash format will be ignored.Īfter clicking “apply” you’ll have the opportunity to select an action you’d like Falcon to take when a matching hash is detected. Hash being added is for an executable file onlyĪll valid MD5 and SHA256 hashes will be uploaded, even if a hash was already uploaded as part of a different list.Contains one MD5 or SHA256 hash per line.Contains up to 3,000 MD5 and SHA256 hashes (per file).The list of hashes must meet the following criteria: Rows with non-MD5/SHA256 hash format will be ignored. All valid MD5 and SHA256 hashes will be uploaded. The list can be a text file with one MD5 or SHA256 hash per line. Then we can either brows to a file or paste a list directly into the windows.

Note that you can also automate the task of importing hashes with the CrowdStrike Falcon® API. To enabled this navigate to the Configuration App, Prevention hashes window, and click on “Upload Hashes” in the upper right-hand corner. There are cases when you might want to block applications because you are certain that you never want them to run in your environment.įalcon allows you to upload hashes from your own black or white lists. This document covers blacklisting and whitelisting steps. This unified combination of methods protects you against known malware, unknown malware, script-based attacks, file-less malware and others. Those methods include machine learning, exploit blocking, blacklisting and indicators of attack. Falcon uses multiple methods to prevent and detect malware. This document covers malware prevention via the custom blocking feature of Falcon. How to Prevent Malware with Custom Blocking
