- Using dashboards
- Managing alerts across Cylance Endpoint Security services
- Managing users, devices, and groups
- Manage CylancePROTECT Desktop and CylanceOPTICS devices
- Manage zones
- Manage devices with the CylancePROTECT Mobile app
- Manage CylancePROTECT Mobile app and CylanceGATEWAY users
- View CylanceAVERT user details
- Manage user groups
- Configure device lifecycle management
- View a list of applications installed on CylancePROTECT Desktop devices
- Remove a registered FIDO device for a user account
- Discover unprotected devices
- Managing threats detected by CylancePROTECT Desktop
- Managing threats detected by CylancePROTECT Mobile
- Managing safe and unsafe lists for CylancePROTECT Desktop and CylancePROTECT Mobile
- Add a file to the CylancePROTECT Desktop global quarantine or global safe list
- Add a file to the CylancePROTECT Desktop local quarantine or local safe list
- Add a certificate to the CylancePROTECT Desktop global safe list
- Add an app, certificate, IP address, domain, or installer source to the CylancePROTECT Mobile safe or restricted list
- Analyzing data collected by CylanceOPTICS
- Using CylanceOPTICS to detect and respond to events
- Monitoring network connections with CylanceGATEWAY
- Monitoring sensitive files with CylanceAVERT
- View mobile OS vulnerabilities
- Auditing administrator actions
- Managing logs
- Send events to a SIEM solution or syslog server
- Enable access to the Cylance User API
- Troubleshooting Cylance Endpoint Security
- Using the BlackBerry Support Collection Tool
- Using the Report a problem feature
- Removing the BlackBerry Connectivity Node software from Cylance Endpoint Security
- Troubleshooting CylancePROTECT Desktop
- Remove the CylancePROTECT Desktop agent from a device
- Re-register a Linux agent
- Troubleshoot update, status, and connectivity issues with CylancePROTECT Desktop
- A large number of DYLD Injection violations are reported by Linux devices
- Time zone variances for CylancePROTECT Desktop
- Folder exclusions when using CylancePROTECT Desktop with third-party security products
- Linux driver is not loaded. Upgrade the driver package.
- Troubleshooting CylanceOPTICS
- BlackBerry Docs
- Cylance Endpoint Security
- Administration
- Cylance Endpoint Security Administration Guide
- Managing safe and unsafe lists for CylancePROTECT Desktop and CylancePROTECT Mobile
- Add a certificate to the CylancePROTECT Desktop global safe list
Add a certificate to the CylancePROTECT Desktop global safe list
CylancePROTECT Desktop
global safe listFor custom software that is properly signed, add the certificate to the certificates list to allow the software to run without interruption. This allows administrators to create a safe list by signed certificate which is represented by the SHA1 thumbprint of the certificate. When adding certificate information to the management console, the certificate itself is not uploaded or saved to the management console; the certificate information is extracted and saved to the management console (timestamp, subject, issuer, and thumbprint). The certificate timestamp represents when the certificate was created. The management console does not check if the certificate is current or expired. If the certificate changes (for example, renewed or new), it should be added to the safe list in the management console. The safe list by certificate feature works with PowerShell, ActiveScript, and Office macros.
This feature currently works with
Windows
and macOS
only.Identify the certificate thumbprint for the signed Portable Executable (PE).
- In the management console, on the menu bar, clickSettings > Certificates.
- ClickAdd Certificate.
- Click eitherBrowse for certificates to addor drag-and-drop the certificate to the message box. If browsing for the certificates, the Open window displays to allow selection of the certificates.
- Optionally, you can select the file type the certificateApplies to, Executable, or Script. This allows you to add an executable or script by a certificate instead of a folder location.
- Optionally, add notes about the certificate.
- ClickSubmit. The Issuer, Subject, Thumbprint, and Notes (if entered) are added to the repository.
When a certificate has expired or been revoked, you must remove the certificate and add a newly issued certificate. To remove a certificate, select the certificate and click
Remove From List
, then click Yes
to confirm. To add a valid certificate again, follow the steps above.