What do you mean by adding white list?

Best answer: The concept of white list corresponds to “black list”, which refers to setting users who can pass, and users outside the white list cannot pass. If a white list is set up, users in the white list (or Internet Protocol addresses, intellectual property packages, mails, etc.) will pass first, and will not be rejected as spam, thus greatly improving security and rapidity.

演示机型:Iphone12&&华为P40&&小米11系统版本:iOS14.4&&EMUI11&&MIUI12.0.7

The concept of “white list” corresponds to “black list”, which refers to setting users who can pass, but users outside the white list cannot pass. If a white list is set up, users in the white list (or Internet Protocol addresses, intellectual property packages, mails, etc.) will pass first, and will not be rejected as spam, thus greatly improving security and rapidity.

working principle:

By identifying whether the processes or files in the system have approved attributes, common process names, file names, publisher names, and digital signatures, white list technology can enable enterprises to approve which processes are allowed to run in a specific system. Some vendor products only include executable files, while others also include scripts and macros, and can block a wider range of files. Among them, an increasingly popular whitelisting method is called application control, which focuses on managing the behavior of endpoint applications. As we all know, whitelisting used to be a criticized technology. White list has always been regarded as difficult to deploy and time-consuming to manage. Moreover, this technology makes it difficult for enterprises to cope with employees who want to deploy the application of their choice. However, in recent years, white list products have made great progress. It is better integrated with existing endpoint security technologies to eliminate deployment and management obstacles, and provides users who want to quickly install applications with quick automatic approval. In addition, most products now also provide this function, that is, take a system as a benchmark model, generate its own internal whitelist database, or provide templates for setting acceptable benchmarks, which can also support the compliance of standards such as PCIDSS or socks.

Leave a Reply 0

Your email address will not be published. Required fields are marked *