What is Whitelist (Allowlist)? (2024)

What is Whitelist (Allowlist)? (1)

By

  • Andrew Froehlich,West Gate Networks

What is a whitelist (allowlist)?

A whitelist (allowlist) is a cybersecurity strategy that approves a list of email addresses, IP addresses, domain names or applications, while denying all others. IT administrators use a whitelist as a quick and easy way to help safeguard computers and networks from potentially harmful threats or inappropriate material on local networks or across the internet.

How does a whitelist work?

A whitelist is based on a strict policy set and is managed by an IT administrator. When the administrator is certain about access permissions, using a whitelist does not require an additional understanding of components that are not allowed since these are denied by default.

Administrators compile a list of allowed sources, destinations or applications that users require access to, and then the list is applied to a network appliance, desktop or server software, or OSes. Once applied, the network device or server monitors user, device or application requests and allows access to whitelisted services. All other requested services are denied. While the whitelist permits access or communication to specific approved applications or services, denied requests include locations or services that meet the following criteria:

  • are either software or malicious code, such as malware, advanced persistent threats or ransomware;
  • contain material that is not in compliance with company internet usage guidelines;
  • could lead to sensitive material leaking out to the public; and
  • inappropriately facilitates the use of shadow IT.

What are some examples of whitelisting?

Email spam filters. These filters are intended to prevent most unsolicited email messages, or spam, from appearing in subscriber inboxes. However, cleverly crafted spam sometimes slips through, while important, relevant emails are blocked. Most email users tolerate the occasional unsolicited email advertisem*nt but are more concerned when important messages are not received. The whitelist option within the spam filtering service puts the power of explicit permits into the mailbox user's hands.

Access control lists. ACLs that are applied to a network router interface can be configured to permit access to individual or blocks of IP addresses. ACLs are processed from the top down with an implicit deny any at the end of the list. This means that destination IP addresses are matched with the access list, and if the IP address is not contained in the list, the packet is dropped.

What does it mean to be put on a whitelist?

Often, a user or department requests access to a specific approved application or to a remote server or service not accessible from corporate devices or the corporate network. When a destination or application is put on a whitelist, it is considered safe, and access to the remote destination, application or service is granted.

Whitelist vs. blacklist (blocklist)

While a whitelist is a list of applications or services that are explicitly permitted, blacklisted or blocklisted applications or services are explicitly denied. There are situations in which maintaining a blacklist rather than a whitelist is preferred. For example, if the number of items, locations or applications that need to be permitted are greater than those that need to be blocked, it is easier to set up a blacklist. Content filters and antimalware applications tend to favor the use of blacklists for this reason.

Whitelisting best practices

The following are some best practices for maintaining and implementing whitelists:

  • document and categorize all whitelisted objects;
  • be as specific as possible when creating a whitelist object;
  • perform whitelist reviews to add or purge apps or services, and keep the list up to date; and
  • apply whitelists efficiently by placing users into access groups and applying specific whitelists to each group based on job function.

TechTarget is responding to readers' concerns as well as profound cultural changes when it comes to certain commonly used but potentially linguistically biased terms. In some cases, we are defaulting to industry-standard terminology that may be seen as linguistically biased in instances where we have not found a replacement term. However, we are actively seeking out and giving preference to terms that properly convey meaning and intent without the potential to perpetuate negative stereotypes.

This was last updated in December 2021

Continue Reading About whitelist (allowlist)

  • Technical controls to prevent business email compromise attacks
  • How to create a ransomware incident response plan

Related Terms

Apple
Apple Inc. (formerly Apple Computer Inc.) is an American computer and consumer electronics company famous for creating the iPhone...Seecompletedefinition
Apple Watch
Apple Watch is a wearable smartwatch that allows users to accomplish a variety of tasks, including making phone calls, sending ...Seecompletedefinition
What is a personal area network (PAN)?
A personal area network (PAN) is a small network that interconnects technology devices within a limited range of just a few ...Seecompletedefinition
What is Whitelist (Allowlist)? (2024)

FAQs

What is whitelisting to allowlist? ›

Once referred to as whitelisting, allowlisting is the practice of explicitly allowing a specific domain and sending IP access to a particular privilege, like delivering emails.

Are whitelist and allowlist the same? ›

It's true that the words “whitelisting” and “allowlisting” are synonymous.

What is the difference between whitelist and allowlist in Minecraft? ›

The whitelist is a list of players that are allowed to join your server. If the whitelist is enabled and someone who's not on the whitelist tries to join, they will be disconnected. In newer versions of the Bedrock Edition, the whitelist is called allowlist.

What is the meaning of allowlist mode? ›

Let's Define Allowlisting

Allowlisting identifies known files, applications, or processes and allows them to execute. Conversely, unknown activities are blocked or restricted, which prevents them from opening up and spreading within a system or environment in an attack mode.

What is the reason for whitelist? ›

The whitelisting of IP addresses is an important part of networking security since it can significantly reduce the attack surface and risk associated with unauthorized access.

What are the problems with whitelisting? ›

Challenges in Application Whitelisting

One of the greatest concerns regarding whitelisting is its effect on end-users. Denying applications by default is a cumbersome mechanism, which often impedes business processes and frustrates employees. The whitelisting process itself is also difficult to implement and manage.

What is the main function of whitelist? ›

The goal of whitelisting is to protect computers and networks from potentially harmful applications. In general, a whitelist is an index of approved entities. In information security (infosec), whitelisting works best in centrally managed environments, where systems are subject to a consistent workload.

How to use allowlist? ›

Enable and Set Up Bedrock Allow List
  1. Access your control panel and Stop your server.
  2. Navigate to Files > Config Files.
  3. Open Server Settings.
  4. Locate the field allow-list, set this to true . Save the file.
  5. Save and Start your server, then navigate to the Console.
  6. In the command line type allowlist add USERNAME .

Why is it called a whitelist? ›

The origins of the terms “blacklist” and “whitelist” can be traced back to the early 17th century. These words were used in the context of labor relations in order to identify individuals who were either banned (blacklisted) from employment or granted special permission (whitelisted) to work under specific conditions.

Does whitelist mean block? ›

Whitelisting very effectively blocks untrusted sources and provides superior protection against malware and attacks. Whitelisting restricts access strictly to already known and trusted sources such as existing and approved apps, users, websites, and IP addresses.

Is whitelist same as safelist? ›

A safelist (also known as whitelist) is a list of accepted items in a set. This list is inclusionary, confirming that the item being analyzed is acceptable.

What does whitelist enabled mean? ›

A whitelist (allowlist) is a cybersecurity strategy that approves a list of email addresses, IP addresses, domain names or applications, while denying all others.

How does allowlisting work? ›

Allowlisting operates on a simple but effective principle: only the trusted can enter. Imagine it as having a VIP list for a highly secure event. Only those whose names are on the list can get through the door, no exceptions. This is exactly how allowlisting works in the realm of cybersecurity.

What is the opposite of allowlist? ›

Just as the name suggests, allowlisting is the opposite of blocklisting, where a list of trusted entities such as applications and websites are created and exclusively allowed to function in the network.

What is the difference between blocklist and allowlist? ›

Allowlist: A list of who or what that is allowed access to a given device or service. Blocklist: A list of who or what that is blocked access to a given device or service. These two terms immediately describe the functionality of the lists to everyone, even those who aren't in the know.

What is allowlist in contacts? ›

allowlist feature allows you to add dependable incoming/outgoing numbers which has higher priority than the blocklist, ensuring a seamless connection between you and your customers.

What are whitelisting permissions? ›

One of the newer ways to level up partnerships is to leverage the process of influencer whitelisting. Whitelisting is the process of an influencer granting a brand permission to access their social media accounts, assuming paid promotional control of their handles.

What is the difference between whitelist and safelist? ›

A safelist (also known as whitelist) is a list of accepted items in a set. This list is inclusionary, confirming that the item being analyzed is acceptable.

What is allowlist in email? ›

Email allowlist—A list of IP addresses you define as approved to send mail to your domain. If you notice that legitimate messages from specific contacts are incorrectly marked as spam, you can allowlist the contact's IP address.

Top Articles
Why You Shouldn't Invest in Real Estate through an S Corp: The Debt Basis Dilemma
Streaming Protocols for Live Broadcasting: Everything You Need to Know
What Did Bimbo Airhead Reply When Asked
San Angelo, Texas: eine Oase für Kunstliebhaber
Cranes For Sale in United States| IronPlanet
Tyler Sis 360 Louisiana Mo
Braums Pay Per Hour
Capitulo 2B Answers Page 40
Voyeuragency
Regal Stone Pokemon Gaia
Craiglist Galveston
Tcgplayer Store
Craigslist Panama City Fl
Second Chance Maryland Lottery
Dallas Craigslist Org Dallas
Between Friends Comic Strip Today
The EyeDoctors Optometrists, 1835 NW Topeka Blvd, Topeka, KS 66608, US - MapQuest
Pocono Recird Obits
Holiday Gift Bearer In Egypt
If you have a Keurig, then try these hot cocoa options
Knock At The Cabin Showtimes Near Alamo Drafthouse Raleigh
Ontdek Pearson support voor digitaal testen en scoren
Sandals Travel Agent Login
Lbrands Login Aces
Dexter Gomovies
Black Lion Backpack And Glider Voucher
950 Sqft 2 BHK Villa for sale in Devi Redhills Sirinium | Red Hills, Chennai | Property ID - 15334774
How often should you visit your Barber?
Devotion Showtimes Near The Grand 16 - Pier Park
Pfcu Chestnut Street
The Menu Showtimes Near Amc Classic Pekin 14
Bt33Nhn
Here’s how you can get a foot detox at home!
Vanessa West Tripod Jeffrey Dahmer
The 50 Best Albums of 2023
Why Holly Gibney Is One of TV's Best Protagonists
Watchseries To New Domain
The Complete Guide To The Infamous "imskirby Incident"
Srg Senior Living Yardi Elearning Login
Crazy Balls 3D Racing . Online Games . BrightestGames.com
Überblick zum Barotrauma - Überblick zum Barotrauma - MSD Manual Profi-Ausgabe
Nsav Investorshub
Let's co-sleep on it: How I became the mom I swore I'd never be
Reese Witherspoon Wiki
Walgreens On Secor And Alexis
Divinity: Original Sin II - How to Use the Conjurer Class
Frequently Asked Questions
60 Days From August 16
Treatise On Jewelcrafting
Roller Znen ZN50QT-E
Www Extramovies Com
Mast Greenhouse Windsor Mo
Latest Posts
Article information

Author: Saturnina Altenwerth DVM

Last Updated:

Views: 5978

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Saturnina Altenwerth DVM

Birthday: 1992-08-21

Address: Apt. 237 662 Haag Mills, East Verenaport, MO 57071-5493

Phone: +331850833384

Job: District Real-Estate Architect

Hobby: Skateboarding, Taxidermy, Air sports, Painting, Knife making, Letterboxing, Inline skating

Introduction: My name is Saturnina Altenwerth DVM, I am a witty, perfect, combative, beautiful, determined, fancy, determined person who loves writing and wants to share my knowledge and understanding with you.