From 5933e69f644d6e87745ae0419253115898c28ef1 Mon Sep 17 00:00:00 2001 From: JackStuart Date: Wed, 13 Nov 2024 22:51:29 +0800 Subject: [PATCH 1/3] Convert command to Powershell --- defender-office-365/tenant-allow-block-list-files-configure.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/defender-office-365/tenant-allow-block-list-files-configure.md b/defender-office-365/tenant-allow-block-list-files-configure.md index 31298010e0..5cc278cd01 100644 --- a/defender-office-365/tenant-allow-block-list-files-configure.md +++ b/defender-office-365/tenant-allow-block-list-files-configure.md @@ -41,6 +41,9 @@ This article describes how admins can manage entries for files in the Microsoft ```DOS certutil.exe -hashfile "\" SHA256 ``` +```powershell + Get-FileHash -Path "\Filename>" -Algorithm SHA25 +``` An example value is `768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3a`. Perceptual hash (pHash) values aren't supported. From 9461c1d3e21b300f8cb0169d54c9a8c860c45718 Mon Sep 17 00:00:00 2001 From: JackStuart Date: Wed, 13 Nov 2024 22:52:03 +0800 Subject: [PATCH 2/3] Update formatting --- .../tenant-allow-block-list-files-configure.md | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/defender-office-365/tenant-allow-block-list-files-configure.md b/defender-office-365/tenant-allow-block-list-files-configure.md index 5cc278cd01..89ac5e6a78 100644 --- a/defender-office-365/tenant-allow-block-list-files-configure.md +++ b/defender-office-365/tenant-allow-block-list-files-configure.md @@ -36,14 +36,10 @@ This article describes how admins can manage entries for files in the Microsoft - To connect to Exchange Online PowerShell, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell). To connect to standalone EOP PowerShell, see [Connect to Exchange Online Protection PowerShell](/powershell/exchange/connect-to-exchange-online-protection-powershell). -- You specify files by using the SHA256 hash value of the file. To find the SHA256 hash value of a file in Windows, run the following command in a Command Prompt: - - ```DOS - certutil.exe -hashfile "\" SHA256 +- You specify files by using the SHA256 hash value of the file. To find the SHA256 hash value of a file in Windows, run the following command in Powershell: + ```powershell + Get-FileHash -Path "\Filename>" -Algorithm SHA25 ``` -```powershell - Get-FileHash -Path "\Filename>" -Algorithm SHA25 -``` An example value is `768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3a`. Perceptual hash (pHash) values aren't supported. From ad04bd7b8345ff9f4c6aa4929238c4a34749c1b8 Mon Sep 17 00:00:00 2001 From: JackStuart Date: Wed, 13 Nov 2024 22:52:20 +0800 Subject: [PATCH 3/3] Typo --- defender-office-365/tenant-allow-block-list-files-configure.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/defender-office-365/tenant-allow-block-list-files-configure.md b/defender-office-365/tenant-allow-block-list-files-configure.md index 89ac5e6a78..cc004b3e86 100644 --- a/defender-office-365/tenant-allow-block-list-files-configure.md +++ b/defender-office-365/tenant-allow-block-list-files-configure.md @@ -38,7 +38,7 @@ This article describes how admins can manage entries for files in the Microsoft - You specify files by using the SHA256 hash value of the file. To find the SHA256 hash value of a file in Windows, run the following command in Powershell: ```powershell - Get-FileHash -Path "\Filename>" -Algorithm SHA25 + Get-FileHash -Path "\Filename>" -Algorithm SHA256 ``` An example value is `768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3a`. Perceptual hash (pHash) values aren't supported.