Skip to content
Cloudflare for Teams
Visit Cloudflare for Teams on GitHub
Set theme to dark (⇧+D)

Application Check

Feature availability
Operating SystemsWARP mode requiredTeams plans
macOS, Windows, LinuxWARP with GatewayAll plans

The Application Check device posture attribute checks that a specific application process is running on a device.

To enable Application Check:

  1. On the Teams Dashboard, navigate to My Team > Devices > Device posture.

  2. Click +Add.

  3. Select Application Check.

  4. Enter a descriptive name for the check.

  5. Select your operating system.

  6. Enter a file path (for example, c:\my folder\myfile.exe).

  7. Next, you can choose to enter a Signing certificate thumbprint.

    Adding this information will enable the check to ensure that the application was signed by the expected software developer.

  8. You can also opt to enter a SHA-256 value.

    This enables the check to ensure the integrity of the binary file on the device.

  9. Click Save.

Your device posture attribute is now visible on the Device posture page.

Determine the signing thumbprint

The process to determine the signing thumbprint of an application varies depending on the operating system. This is how you would look up the signing thumbprint of the Cloudflare WARP application on macOS and Windows.

On macOS

  1. Create a directory.

    $ ~/Desktop % mkdir tmp
    $ ~/Desktop % cd tmp
  2. Run the following command to extract certificates for the WARP application:

    $ ~/Desktop/tmp % codesign -d --extract-certificates "/Applications/Cloudflare WARP.app/Contents/Resources/CloudflareWARP" Executable=/Applications/Cloudflare WARP.app/Contents/Resources/CloudflareWARP
  3. Next, run the following commant to extract the SHA1 thumbprint:

    $ ~/Desktop/tmp % openssl x509 -inform DER -in codesign0 -fingerprint -sha1 -noout | tr -d :
    SHA1 Fingerprint=FE2C359D79D4CEAE6BDF7EFB507326C6B4E2436E

On Windows

  1. Open a PowerShell window.
  2. Use the Get-AuthenticodeSignature command to find the thumbprint. For example:
Get-AuthenticodeSignature -FilePath c:\myfile.exe

Determine the SHA-256 value

The SHA-256 value almost always changes between versions of a file/application.

On macOS

  1. Open a Terminal window.
  2. Use the shasum command to find the SHA256 value of the file. For example:
$ shasum -a 256 myfile

On Windows

  1. Open a PowerShell window.
  2. Use the get-filehash command to find the SHA256 value of the file. For example:
get-filehash -path "C:\myfile.exe" -Algorithm SHA256 | format-list