{"id":7803,"date":"2014-09-24T00:00:00","date_gmt":"2014-09-24T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2014\/09\/24\/whitelisting-why-and-how-it-works\/"},"modified":"2021-08-06T18:55:54","modified_gmt":"2021-08-06T18:55:54","slug":"whitelist","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/","title":{"rendered":"What Does Whitelisting Mean?"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<p>The rising popularity of whitelisting boils down to simple math. With a relatively small number of malware items, it made sense to compile known virus signatures to detect and prevent infection. But with a huge <a href=\"https:\/\/www.eweek.com\/security\/eweek-30-computer-viruses-evolve-from-minor-nuisances-to-costly-pests\">increase in the volume of viruses<\/a> and other forms of intrusion, it isn\u2019t easy to keep virus signatures up to date.<\/p>\n<p>That is where whitelisting comes in. Instead of listing all the potential bad stuff you don&#8217;t want to let in, it\u2019s simpler to create a shorter list of applications and processes that are authorized to run.<\/p>\n<p>&#8220;Traditional antivirus is based on blacklisting which helps to block known malware,&#8221; said Simone Spencer, endpoint product sxpert, <a href=\"https:\/\/www.mcafee.com\/en-us\/index.html\">McAfee<\/a>.\u00a0&#8220;Whitelisting limits use with a &#8216;deny by default&#8217; approach so that only approved files or applications can be installed. Dynamic application whitelisting strengthens security defenses and helps to prevent malicious software and other unapproved programs from running.&#8221;<\/p>\n<h2>Application Control<\/h2>\n<p>Another name for whitelisting is application control; you stay on top of which apps are allowed to run and which are not. Gartner analyst Neil MacDonald sees this kind of containment and isolation approach as an emerging foundational security strategy. Virus and malware signatures are becoming increasingly ineffective, McDonald said, so a better approach is to treat everything as a potential unknown threat.<\/p>\n<p><a href=\"https:\/\/www.gartner.com\/en\">Gartner<\/a> surveys show that 25 percent of enterprises are already deploying some form of application control. And another 50 percent are seriously considering it. That&#8217;s why the analyst firm predicts that whitelisting will enter the mainstream by 2017. Within three years, Gartner believes more than half of tablets, smartphones, desktops, laptops and servers will only be allowed to run pre-approved applications, with everything else denied access.<\/p>\n<h2>Whitelisting and Ransomware \u00a0<\/h2>\n<p>&#8220;Whitelisting is more necessary than ever because viruses and other malware are morphing,&#8221; said Rob Cheng, CEO of <a href=\"https:\/\/www.pcpitstop.com\/\">PC Pitstop<\/a>.&#8221;This means that one virus looks like hundreds or thousands of different viruses to traditional AV products.&#8221;<\/p>\n<p>The type of attack vector has shifted recently, with individual users and entire companies being subjected to <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> \u2013 infections that encrypt all their data and lock them out unless they pay a ransom. Recent ransomware attacks like <a href=\"https:\/\/en.wikipedia.org\/wiki\/CryptoLocker\">CryptoLocker<\/a> and CryptoWall are examples of attacks that could have been prevented through the use of application whitelisting.<\/p>\n<p>&#8220;The stakes have gotten higher because of ransomware viruses, which encrypt your hard drive and demand a ransom in BitCoins for all your files back,&#8221; said Cheng. &#8220;It encrypts photos, videos, Excel files, PowerPoint presentations and so on, so all your most personal documents are lost.&#8221;<\/p>\n<p>Traditional products use a blacklist to attempt to stop ransomware. But a virus will be blocked from executing and hence infecting only if it is on the list. That can be too slow, given the speed with which the bad guys morph their malware. By the time it is on the blacklist, another variant is invading user files.<\/p>\n<p>&#8220;A whitelist stops the virus morphing issue dead in its tracks,&#8221; said Cheng.\u00a0&#8220;From a marketing perspective, we describe the white list as a VIP list for your PC. If you are not on the list, then you are not getting in.&#8221;<\/p>\n<h2>How to Whitelist<\/h2>\n<p>So how do you go about whitelisting? James Tarala, an instructor for security training organization <a href=\"https:\/\/www.sans.org\/\">SANS Institute<\/a> and one of the principal contributors to the <a href=\"http:\/\/www.counciloncybersecurity.org\/\">Council on CyberSecurity<\/a>, said that whitelisting can be based on several things. This includes the name of the executable, a digital signature of the program being executed, or the location on the computer\u2019s file system where the executable resides.<\/p>\n<p>Smaller organizations might be able to compile their own whitelist. But most enterprises are advised to turn to whitelisting software preconfigured with known good executables and domains. You can then add more required domains as needed to the initial list.<\/p>\n<p>Stu Sjouwerman, CEO of <a href=\"https:\/\/www.knowbe4.com\/project-malwareshield\">KnowBe4<\/a>, gave an example of how a whitelisting application works: It does a scan in order to create a local whitelist. It then allows only known good executables to run. Users accessing the Internet get immediate protection in the form of a list of a known-good website, which is combined with a locally created, organization-specific whitelist. An alert is sent to anyone who tries to go to an unknown and potentially dangerous domain. They are required to either go back or confirm they really want to go there.<\/p>\n<p>&#8220;Even if malware already exists on a workstation, it will be blocked when it attempts to call home,&#8221; said Sjouwerman.<\/p>\n<p>For those that want help in compiling whitelists, the SANS Institute and the Council on CyberSecurity created the <a href=\"https:\/\/www.sans.org\/critical-security-controls\/\">Critical Security Controls project<\/a>. This gives users access to a prioritized list of security controls that organizations can implement to help them defend against ransomware attacks and other malware, Tarala said. \u00a0<\/p>\n<p>Sjouwerman also recommended letting users know that a whitelist is going to be created and briefing them on its importance. This should be done via a briefing as well as follow up training.<\/p>\n<h2>Short List of Whitelisting Products<\/h2>\n<p>There are many tools out there that do some kind of whitelisting. Users should gravitate toward those that can automatically scan systems to find out which applications are already running, can also access known-good lists of Web executables, and allow the user to add or subtract apps and websites as they decide. Avoid those that are complex and tie up too much IT time.<\/p>\n<p>The big security and IT firms offer whitelisting, often as add-ons to existing products or as part of a larger suite. Examples include:<\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/products\/application-control.html\">McAfee Application Control<\/a><\/p>\n<p><a href=\"https:\/\/www.symantec.com\/security_response\/securityupdates\/list.jsp?fid=adc\">Symantec Endpoint Protection Application and Device Control<\/a><\/p>\n<p><a href=\"https:\/\/www.ivanti.com\/products\/security-controls\">LANDesk Security Suite<\/a><\/p>\n<p><a href=\"https:\/\/whitelisting.kaspersky.com\/\">Kaspersky Whitelist<\/a><\/p>\n<p>But you don&#8217;t have to stick with the big boys. With whitelisting technology experiencing fresh impetus, it could be that specialists will lead the industry in terms of innovation. Examples include:<\/p>\n<p><a href=\"http:\/\/www.pcpitstop.com\/store\/pcmatic.asp\">PC Pitstop&#8217;s PC Matic<\/a><\/p>\n<p><a href=\"http:\/\/www.pcpitstop.com\/store\/pcmatic.asp\"><\/a><a href=\"https:\/\/www.knowbe4.com\/project-malwareshield\">KnowBe4 MalawareShield<\/a><\/p>\n<p><a href=\"http:\/\/www.knowbe4.com\/project-malwareshield\/\"><\/a><a href=\"https:\/\/www.ivanti.com\/solutions\/needs\/implement-application-management-for-my-endpoi?asredirect\">AppSense Application Access Control<\/a><br \/><a href=\"https:\/\/www.beyondtrust.com\/\">Avecto Privilege Guard<\/a><br \/><a href=\"https:\/\/www.carbonblack.com\/products\/solutions\/use-case\/critical-system-lockdown-application-control\/\">Bit9 + Carbon Black<\/a><br \/><a href=\"https:\/\/www.ivanti.com\/products\/application-control?lnredirect\">Lumension Endpoint Management and Security<\/a><\/p>\n<p><a href=\"https:\/\/www.lumension.com\/application-control-software.aspx\"><\/a><a href=\"http:\/\/www.faronics.com\/products\/anti-executable\/enterprise\/\">Faronics Anti-Executable Enterprise<\/a> <br \/><a href=\"http:\/\/www.savantprotection.com\/\">Savant Protection<\/a><br \/><a href=\"http:\/\/www.sophos.com\/en-us\/products\/enduser-protection-suites.aspx\">Sophos Endpoint Protection<\/a> <br \/><a href=\"https:\/\/digitalguardian.com\/products\/threat-aware-data-protection-platform\">Verdasys Digital Guardian<\/a><br \/><a href=\"http:\/\/www.viewfinity.com\/default.aspx\">Viewfinity Endpoint Protection<\/a><\/p>\n<h2>Whitelisting Not a Standalone Solution<\/h2>\n<p>Nobody, though, is suggesting that you should dump all other lines of security and do only whitelisting.<\/p>\n<p>&#8220;Whitelisting is not a replacement for antivirus,&#8221; said Spencer. &#8220;It should be used as a valuable complementary piece within a comprehensive security solution.&#8221;<\/p>\n<p>Further, Cheng made the point that there is a downside to whitelisting. By doing so, you create the potential to block a good program which has not yet been identified.\u00a0\u00a0You see this on sites like Yahoo that serve up a security warning and label a site as potentially dangerous \u2013 yet it is one you have used and trusted for years.\u00a0<\/p>\n<p>&#8220;If this happens, the user has a way of adding that program to a local whitelist and then it can execute,&#8221; said Cheng.\u00a0&#8220;It is an inconvenience to the user, but they are still able to do what they want.\u00a0 On the other hand, as you know, the ramifications of allowing a virus to run can be severe.&#8221;<\/p>\n<p><em>Drew Robb is a freelance writer specializing in technology and engineering. Currently living in Florida, he is originally from Scotland, where he received a degree in geology and geography from the University of Strathclyde. He is the author of Server Disk Management in a Windows Environment (CRC Press). <\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6ecc3a4dbe-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ecc3a4dbe\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ecc3a4dbe\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ecc3a4dbe\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ecc3a4dbe\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ecc3a4dbe\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ecc3a4dbe\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The rising popularity of whitelisting boils down to simple math. With a relatively small number of malware items, it made sense to compile known virus signatures to detect and prevent infection. But with a huge increase in the volume of viruses and other forms of intrusion, it isn\u2019t easy to keep virus signatures up to [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[2563,1146],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[397],"class_list":["post-7803","post","type-post","status-publish","format-standard","hentry","category-threats","tag-antivirus","tag-malware","b2b_audience-evaluation-and-selection","b2b_product-anti-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Does Whitelisting Mean? | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Whitelisting is listing what apps &amp; processes are allowed to run. Discover how to whitelist &amp; whitelisting tools now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Does Whitelisting Mean? | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Whitelisting is listing what apps &amp; processes are allowed to run. Discover how to whitelist &amp; whitelisting tools now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-24T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-06T18:55:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"What Does Whitelisting Mean?\",\"datePublished\":\"2014-09-24T00:00:00+00:00\",\"dateModified\":\"2021-08-06T18:55:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\"},\"wordCount\":1214,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"antivirus\",\"malware\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\",\"name\":\"What Does Whitelisting Mean? | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2014-09-24T00:00:00+00:00\",\"dateModified\":\"2021-08-06T18:55:54+00:00\",\"description\":\"Whitelisting is listing what apps & processes are allowed to run. Discover how to whitelist & whitelisting tools now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Does Whitelisting Mean?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Does Whitelisting Mean? | eSecurity Planet","description":"Whitelisting is listing what apps & processes are allowed to run. Discover how to whitelist & whitelisting tools now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/","og_locale":"en_US","og_type":"article","og_title":"What Does Whitelisting Mean? | eSecurity Planet","og_description":"Whitelisting is listing what apps & processes are allowed to run. Discover how to whitelist & whitelisting tools now.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/","og_site_name":"eSecurity Planet","article_published_time":"2014-09-24T00:00:00+00:00","article_modified_time":"2021-08-06T18:55:54+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"What Does Whitelisting Mean?","datePublished":"2014-09-24T00:00:00+00:00","dateModified":"2021-08-06T18:55:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/"},"wordCount":1214,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["antivirus","malware"],"articleSection":["Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/threats\/whitelist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/","url":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/","name":"What Does Whitelisting Mean? | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2014-09-24T00:00:00+00:00","dateModified":"2021-08-06T18:55:54+00:00","description":"Whitelisting is listing what apps & processes are allowed to run. Discover how to whitelist & whitelisting tools now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/whitelist\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/whitelist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"What Does Whitelisting Mean?"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7803"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7803"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7803\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7803"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7803"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7803"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}