How to Safe List Files in Dell Threat Defense
摘要: Follow these step-by-step instructions to learn how to safe list files in Dell Threat Defense.
本文适用于
本文不适用于
本文并非针对某种特定的产品。
本文并非包含所有产品版本。
说明
Note:
- As of May 2022, Dell Threat Defense has reached End of Maintenance. This product and its articles are no longer updated by Dell. For more information, reference Product Life Cycle (End of Support and End of Life) Policy for Dell Data Security. If you have any questions on alternative articles, either reach out to your sales team or contact endpointsecurity@dell.com.
- Reference Endpoint Security for additional information about current products.
A Dell Threat Defense administrator may choose to safe list files to:
- Prevent third-party conflicts
- Resolve performance issues
- Clear false positives
This article discusses how to safe list files in Dell Threat Defense.
Affected Products:
- Dell Threat Defense
Affected Operating Systems:
- Windows
- Mac
- From a web browser, go to the Dell Threat Defense administration console at:
- North America: https://dellthreatdefense.cylance.com/Login
- Europe: https://dellthreatdefense-eu.cylance.com
- Asia Pacific: https://dellthreatdefense-au.cylance.com
- North America: https://dellthreatdefense.cylance.com/Login
- Log in to the Dell Threat Defense administration console.

- In the console, click the Settings tab.

- In Settings, click the Global List tab.

- Click the Safe tab.

- Files may be safe-listed for Executables or Scripts. Click the appropriate file type for more information.

Executables
- Click Add File.

- In the Add File to Safe List menu:
- Populate the file’s SHA256.
- Optionally, add the file’s MD5.
- Optionally, add the File name.
- Select the appropriate Category for the file.
- Populate a Reason for safe listing the file.
- Click Submit.
Note:- For more information, reference How to Identify a File's SHA-256 Hash for Security Applications.
- The examples that are used in the screenshot will differ in your environment.
Scripts
- Click Add Script.

- In the Add Script to Safe List menu:
- Populate the file’s SHA256.
- Optionally, add the File name.
- Populate a Reason for safe listing the file.
- Click Submit.
Note:- For more information, reference How to Identify a File's SHA-256 Hash for Security Applications.
- The examples that are used in the screenshot will differ in your environment.
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
受影响的产品
Dell Threat Defense文章属性
文章编号: 000129506
文章类型: How To
上次修改时间: 25 2月 2025
版本: 15
从其他戴尔用户那里查找问题的答案
支持服务
检查您的设备是否在支持服务涵盖的范围内。