You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Users who have unique configuration and security requirements can select **Show Advanced Settings** to configure the Policy to support advanced use cases. Hover over each setting to view its description.
76
76
77
-
NOTE: Advanced settings are not recommended for most users.
77
+
NOTE: Advanced settings are not recommended for most users.
@@ -123,13 +123,16 @@ To add a trusted application:
123
123
124
124
. Click *Add Trusted Application*.
125
125
126
-
. Complete the following field requirements in the "Trusted Applications" dialog:
126
+
. Complete the following field requirements in the *Trusted Applications* dialog:
127
127
128
128
* `Name your trusted app application`: Enter a name for the trusted application.
129
129
130
130
* `Select operating system`: Select the appropriate operating system from the drop-down.
131
131
132
-
* `Field`: Select the appropriate field you want to use - *Hash* or *Path*.
132
+
* `Field`: Select the appropriate field you want to use -- `Hash`, `Path`, or, if you are adding a Windows trusted application, `Signature`.
133
+
+
134
+
NOTE: Hash values must be valid to add the trusted application.
135
+
+
133
136
134
137
* `Operator`: Defaults to `is` (i.e., "equal to"). This cannot be changed.
135
138
@@ -139,9 +142,8 @@ To add a trusted application:
139
142
140
143
. Click *Add trusted application*. If successfully added, the added application appears in the Trusted applications list.
141
144
142
-
NOTE: Hash values must be valid to add the trusted application.
143
-
144
-
*Trusted applications list*
145
+
[discrete]
146
+
=== Trusted applications list
145
147
146
148
The *Trusted applications list* lists all the trusted applications that have been added to the {security-app}. By default, applications appear in "Grid view" -- a comprehensive display of all metadata and field values. To view a condensed version of the list that displays general information, select *List view*.
. If in the Grid view, click *Remove* on the appropriate application to delete. If in the List view, click the *Remove this entry* button that looks like a trash can.
157
+
. If in the Grid view, click *Remove* on the appropriate application to delete.
158
+
+
159
+
If in the List view, click the *Remove this entry* button that looks like a trash can.
156
160
157
-
. On the "Remove trusted application" dialog that appears, confirm you are removing the correct application. If so, click *Remove trusted application*. A "Successfully removed" confirmation appears.
161
+
. On the "Remove trusted application" dialog that appears, verify that you are removing the correct application, then click *Remove trusted application*. A "Successfully removed" confirmation appears.
0 commit comments