Use this dialog box to add the applications that trigger this firewall rule.
You must add the path name and file name of the application you want to add to this rule. For example, you can type either
c:\program files\internet explorer\iexplore.exeor
iexplore.*. You can use wildcard character, including
?. The path name is on the client.
You can optionally add a description of the application, such as Internet Explorer.
The exact size of the application, in bytes, such as 2534879.
The file fingerprint is a checksum that uniquely identifies a file and is more unique than a file name. The fingerprint is a 128-bit or 256-bit string that you create with an MD5 hashing algorithm or an SHA-256 hashing algorithm. For example, Cfca3291df528430fb6b2c526e9a04d0.
File fingerprints are useful if you want to add an application that has more than one version. You add a separate application with the unique file fingerprint for each version. For example, you would add both Internet Explorer 10 and Internet Explorer 11 with their respective file fingerprints as separate applications in the firewall rule.
To create a file fingerprint, you can use the checksum.exe tool that is installed with the client. The tool creates an MD5 file fingerprint for the applications that runs on a particular client. You can also use the third-party tools that use MD5 or SHA-256 to create file fingerprints.