How to Safe List Files in Dell Threat Defense
Summary: Follow these step-by-step instructions to learn how to safe list files in Dell Threat Defense.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Instructions
Note:
- As of May 2022, Dell Threat Defense has reached End of Maintenance. This product and its articles are no longer updated by Dell. For more information, reference Product Life Cycle (End of Support and End of Life) Policy for Dell Data Security. If you have any questions on alternative articles, either reach out to your sales team or contact endpointsecurity@dell.com.
- Reference Endpoint Security for additional information about current products.
A Dell Threat Defense administrator may choose to safe list files to:
- Prevent third-party conflicts
- Resolve performance issues
- Clear false positives
This article discusses how to safe list files in Dell Threat Defense.
Affected Products:
- Dell Threat Defense
Affected Operating Systems:
- Windows
- Mac
- From a web browser, go to the Dell Threat Defense administration console at:
- North America: https://dellthreatdefense.cylance.com/Login
- Europe: https://dellthreatdefense-eu.cylance.com
- Asia Pacific: https://dellthreatdefense-au.cylance.com
- North America: https://dellthreatdefense.cylance.com/Login
- Log in to the Dell Threat Defense administration console.

- In the console, click the Settings tab.

- In Settings, click the Global List tab.

- Click the Safe tab.

- Files may be safe-listed for Executables or Scripts. Click the appropriate file type for more information.

Executables
- Click Add File.

- In the Add File to Safe List menu:
- Populate the file’s SHA256.
- Optionally, add the file’s MD5.
- Optionally, add the File name.
- Select the appropriate Category for the file.
- Populate a Reason for safe listing the file.
- Click Submit.
Note:- For more information, reference How to Identify a File's SHA-256 Hash for Security Applications.
- The examples that are used in the screenshot will differ in your environment.
Scripts
- Click Add Script.

- In the Add Script to Safe List menu:
- Populate the file’s SHA256.
- Optionally, add the File name.
- Populate a Reason for safe listing the file.
- Click Submit.
Note:- For more information, reference How to Identify a File's SHA-256 Hash for Security Applications.
- The examples that are used in the screenshot will differ in your environment.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
Affected Products
Dell Threat DefenseArticle Properties
Article Number: 000129506
Article Type: How To
Last Modified: 25 Feb 2025
Version: 15
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.