Article Number: 000130826
A secure hash algorithm (SHA)-256 hash may be required to exclude a file from an anti-virus or malware prevention application. This article discusses how to identify the SHA-256 hash for a file on Windows, macOS, or Linux.
Not applicable
Click Windows, macOS, or Linux for the process to identify the file's SHA-256 hash.
cmd
and then press OK.CertUtil -hashfile [FILENAME] SHA256
and then press Enter.[FILENAME]
used in the example may differ in your environment.
5e71d4ffc3a0723b1bcca206fd14c0e217f6d9beb33a5b327ea251d3a54df5af
is the file’s SHA-256.sudo shasum -a 256 [FILENAME]
and then press Enter.56429c53bff44bbf21527f0bf13a27bc20ceff42160d3170287af6d50da195623
is the file’s SHA-256.sudo sha256sum [FILENAME]
and then press Enter.4167b599f36af0781b81563bd2179a6d35daa3145f0b6f99ac6d9ee1894b516a
is the file’s SHA-256.To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.
Dell Encryption
13 Nov 2023
8
Solution