If you enable the use checksums to authenticate applications, when you trust or block applications they are identified based on their checksums automatically (you can also manually add checksums). If the application does not match a checksum it is blocked.
If you disable this option, applications are identified by their filename.
To turn the use of checksums to authenticate applications on or off:
For information about the Home page, see About the Home page.
To turn the use of checksums to authenticate applications on, select the check box.