- What is the Cylance Engine?
- How the Cylance Engine analyzes a file
- System requirements for the Cylance Engine
- Installing and updating the Cylance Engine
- Install the Cylance Engine on a Linux distribution
- Query the version of your Cylance Engine on a Linux distribution
- Update the version of your Cylance Engine on a Linux distribution
- Remove the Cylance Engine from a Linux distribution
- Install the Cylance Engine on a Windows distribution
- Query the version of your Cylance Engine on a Windows distribution
- Update the version of your Cylance Engine on a Windows distribution
- Remove the Cylance Engine from a Windows distribution
- File-scoring service
- File-scoring service protocols
- Appendix: Cylance Infinity Data Service
- Appendix: Threat indicators
- Appendix: Prometheus monitoring support
- Appendix: CylanceTcpService Protocol
- BlackBerry Docs
- Cylance Engine
- Cylance Engine Integration Guide
- How the Cylance Engine analyzes a file
- Restricted and allowed list of file hashes
Restricted and allowed list of file hashes
The
Cylance Engine
can maintain a list of SHA256 file hashes that bypasses the machine-learning scoring algorithm. If a file hash is present in the allowed list, the corresponding file is assigned a good score (1.0); if the file is present in the restricted list, the file is assigned a bad score (-1.0). BlackBerry
also maintains a global restricted and allowed list of file hashes that have been determined to be bad or good by additional qualification means outside of the machine-learning algorithm. You can download this list using the Infinity Public Data API.