The table of prevention rules is in the Prevention section of the application web interface window.
The table contains the following information:
A file can be identified based on one of the following hashing algorithms:
Clicking the link with the name of the hashing algorithm opens a list in which you can view the file hash and select one of the following actions:
When this action is performed, the Threat Hunting section opens with events that are already filtered based on the hash you selected.
When this action is performed, the Alerts section opens with alerts that are already filtered based on the hash you selected.
This field is displayed if you are using the distributed solution and multitenancy mode.
This field is displayed only when you are using a standalone Central Node server.
A prevention rule can have one of the following states: