Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Profitez de récompenses et de remises réservées aux membres
  • Créez et accédez à une liste de vos produits
  • Gérer vos sites, vos produits et vos contacts au niveau des produits Dell EMC à l’aide de la rubrique Gestion des informations de l’entreprise.

How to Identify a File's SHA-256 Hash for Security Applications

Résumé: Learn about how to identify a file’s SHA-256 hash by following these instructions. Hashes can be used to exclude a file in security applications.

Cet article concerne   Cet article ne concerne pas 

Symptômes

A secure hash algorithm (SHA)-256 hash may be required to exclude a file from an anti-virus or malware prevention application. This article discusses how to identify the SHA-256 hash for a file on Windows, macOS, or Linux.


Affected Operating Systems:

  • Windows
  • macOS
  • Linux

Cause

Not applicable

Résolution

Click Windows, macOS, or Linux for the process to identify the file's SHA-256 hash.

Windows

  1. Right-click the Windows Start menu and then click Run.

Run

  1. In the Run UI, type cmd and then press OK.

Run UI

  1. In Command Prompt, browse to the location of the appropriate [FILENAME].
Note: [FILENAME] = Name of file.
  1. Type CertUtil -hashfile [FILENAME] SHA256 and then press Enter.

CertUtil

Note: [FILENAME] used in the example may differ in your environment.
  1. Record the file’s SHA-256 hash. In the example, 5e71d4ffc3a0723b1bcca206fd14c0e217f6d9beb33a5b327ea251d3a54df5af is the file’s SHA-256.

SHA-256 hash

Note: The SHA-256 hash in the example may differ in your environment.

macOS

  1. Select Go, then Utilities, and then Terminal.

Terminal

  1. Double-click Terminal to launch the UI.
  2. In terminal, browse to the location of the appropriate [FILENAME].
Note: [FILENAME] = Name of file.
  1. In Terminal, type sudo shasum -a 256 [FILENAME] and then press Enter.
  2. Populate the Password for the account being used and then press Enter.

Password

Note: [FILENAME] used in the example may differ in your environment.
  1. Record the file’s SHA-256 hash. In the example, 56429c53bff44bbf21527f0bf13a27bc20ceff42160d3170287af6d50da195623 is the file’s SHA-256.

SHA-256 hash

Note: The SHA-256 hash in the example may differ in your environment.

Linux

  1. Open Terminal.

Terminal

  1. In Terminal, browse to the appropriate [FILENAME].
Note: [FILENAME] = Name of file.
  1. Type sudo sha256sum [FILENAME] and then press Enter.
  2. Populate the password for the account being used and then press Enter.

Password

  1. Record the file’s SHA-256 hash. In the example, 4167b599f36af0781b81563bd2179a6d35daa3145f0b6f99ac6d9ee1894b516a is the file’s SHA-256.

SHA-256

Note: The [FILENAME] and SHA-256 hash in the example may differ in your environment.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Produits concernés

Dell Encryption
Propriétés de l’article
Numéro d’article: 000130826
Type d’article: Solution
Dernière modification: 13 nov. 2023
Version:  8
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.
Propriétés de l’article
Numéro d’article: 000130826
Type d’article: Solution
Dernière modification: 13 nov. 2023
Version:  8
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.