8.8.2. Managing the white and black lists of the Malcore engine

8.8.2.1. Introduction

It is possible to instruct the Malcore engine to deem files as healthy or not without scanning them but by using their SHA256 fingerprint.
The exception list referred to as the Whitelist contains a list of SHA256 fingerprints of files that Malcore should consider to be safe.
The exception list referred to as the Blacklist contains a list of SHA256 fingerprints of files that Malcore should consider to be compromised.
When the files to be scanned are sent to Malcore, Malcore compares their SHA256 fingerprints with the two lists and, depending on the case, considers them to be healthy, compromised, or to be scanned.
This procedure shows how to populate both lists.
All additions and changes made from the White List and Black List sections of the MALCORE engine configuration settings will be taken into account in the analysis of the flow as well as for the files scanned via the GScan.

Note


8.8.2.2. Prerequisites

  • User : member of Administrator group


8.8.2.3. Preliminary operations


8.8.2.4. Procedure to access to the `Users management` window for an administrator account

  • In the navigation bar, successively click on:

  • The `Admin` button

  • The `Gcenter` sub-menu

  • The `Malcore Management` command
    The `Malcore Management` window is displayed.

8.8.2.5. Procedure for White list management

  • Click on the `White List` section.

../../_images/MALCORE_WL-01.PNG
  • To add an item to the list :

  • Press the `Add to Single SHA256` button (1).
    The `Add to White List` window is displayed.
  • Enter the SHA 256.

  • Enter a comment, if any, for further details.

  • Click on the `Save` button.
    If successful, the following message is displayed: `The SHA256 xxxxx was successfully added to white list.`
    In case of an error, the following message is displayed.
    For example, `The SHA256 was not added to white list. File with SHA256 xxxxx already exists in white list`
  • To add a set of items to the list:

  • Press the `Add a set of SHA256` button (6).
    The `Add to White List` window is displayed.
  • Use the `Browse` button to select the csv file.

  • If necessary, delete the previous list by ticking the `Clean previous list` box.

  • Click on the `Save` button.

  • Enter any comments.

  • Click on the `Save` button.
    A status message indicates the result of the import.
    For example , `98/100 SHA256 has been added to white list`. Here the message indicates the number (98) of elements taken into account.
    The remaining items (2) are not imported either because the csv file is not compliant or because they are already present in the existing lists.

8.8.2.6. Procedure for Black list management

  • Click on the `Black List` section.

../../_images/MALCORE_WL-02.PNG
  • To add an item to the list:

  • Press the `Add to Single SHA256` button (1).
    The `Add to Black List` window is displayed.
  • Enter the SHA 256.

  • Enter a comment, if any, for further details.

  • Click on the `Save` button.
    If successful, the following message is displayed: `The SHA256 xxxxx was successfully added to Black list.`.
    In case of an error, the following message is displayed.
    For example, `The SHA256 was not added to the Black list. File with SHA256 xxxxx already exists in the Black list`.
  • To add a set of items to the list:
  • Press the `Add a set of SHA256` button (6).
    The `Add to Black List` window is displayed.
  • Use the `Browse` button to select the csv file.

  • If necessary, delete the previous list by ticking the `Clean previous list` box.

  • Click on the `Save` button.

  • Enter any comments.

  • Click on the `Save` button.
    A status message indicates the result of the import.
    For example , `98/100 SHA256 has been added to the Black list`. Here the message indicates the number (96) of elements taken into account.
    The remaining items (4) are not imported either because the csv file is not compliant or because they are already present in the existing lists.