and the SHA-256, SHA-1, and MD5 hash for the sample with
which the artifact is associated.
You can then filter
the generated CSV file based on this metadata.
a threat researcher who plans to circulate the CSV file across a
global IT department where regional offices might have different
security requirements could create regional labels to group artifacts.
She could then generate a CSV file on a daily or weekly basis, and
the regional IT departments can filter the list accordingly based
on the regional label (the labeled artifacts can then be added to
the appropriate regional block list).