Manage whitelist database samples

Use the Advanced Threat Defense web interface to manage whitelisted files, URLs, and digital signatures.

Note: The whitelist database lists the MD5/SHA-256 hash values of trusted files and do not need to be analyzed.