


A zone rule can identify software from a zone that is specified through Internet Explorer. Internet Zone Rule: Internet zone rules apply only to Windows Installer packages.For example, you can use certificate rules to automatically trust software from a trusted source in a domain without prompting the user. Certificate Rule: A certificate rule identifies software by its signing certificate.However, any change to the file changes its hash value and allows it to bypass restrictions. A file can be renamed or moved to another folder and still result in the same hash. For example, you can create a hash rule and set the security level to Disallowed to prevent users from running a certain file. Hash: A hash is computed by a hash algorithm, Software restriction policies can identify files by their hash, using both the SHA-1 (Secure Hash Algorithm) and the MD5 hash algorithm.
