Cloudflare Docs
Cloudflare-One
Visit Cloudflare Zero Trust on GitHub
Set theme to dark (⇧+D)

File Check

Feature availability
Operating Systems WARP mode required Zero Trust plans
macOS, Windows, Linux WARP with Gateway All plans

The File Check device posture attribute checks for the presence of a file on a device.

To enable File Check:

  1. On the Zero Trust Dashboard, navigate to My Team > Devices > Device posture.

  2. Click +Add.

  3. Select File Check.

  4. Enter a descriptive name for the check.

  5. Select your operating system.

  6. Enter a file path (for example: c:\my folder\myfile.exe).

  7. Next, you can choose to enter a Signing certificate thumbprint .

    Adding this information will enable the check to ensure that the file was signed by the expected software developer.

  8. You can also opt to enter a SHA-256 value .

    This enables the check to ensure the integrity of the binary file on the device.

  9. Click Save.

Your device posture attribute is now visible on the Device posture page.

Determine the signing thumbprint

The process to determine the signing thumbprint of a file varies depending on the operating system. This is how you would look up the signing thumbprint of the Cloudflare WARP application on macOS and Windows.

On macOS

  1. Create a directory.

    $ ~/Desktop % mkdir tmp
    
    $ ~/Desktop % cd tmp
    
  2. Run the following command to extract certificates for the WARP application:

    $ ~/Desktop/tmp % codesign -d --extract-certificates "/Applications/Cloudflare WARP.app/Contents/Resources/CloudflareWARP" Executable=/Applications/Cloudflare WARP.app/Contents/Resources/CloudflareWARP
    
  3. Next, run the following command to extract the SHA1 thumbprint:

    $ ~/Desktop/tmp % openssl x509 -inform DER -in codesign0 -fingerprint -sha1 -noout | tr -d :
    SHA1 Fingerprint=FE2C359D79D4CEAE6BDF7EFB507326C6B4E2436E
    

On Windows

  1. Open a PowerShell window.
  2. Use the Get-AuthenticodeSignature command to find the thumbprint. For example:
Get-AuthenticodeSignature -FilePath c:\myfile.exe

Determine the SHA-256 value

The SHA-256 value almost always changes between versions of a file/application.

On macOS

  1. Open a Terminal window.
  2. Use the shasum command to find the SHA256 value of the file. For example:
$ shasum -a 256 myfile

On Windows

  1. Open a PowerShell window.
  2. Use the get-filehash command to find the SHA256 value of the file. For example:
get-filehash -path "C:\myfile.exe" -Algorithm SHA256 | format-list