The
whitelist will expire after a year, according to technical program manager Anthony Laforge.
Instead, you'll have to
whitelist websites that run Flash.
Using a case study of a recent UK
whitelist intended to regulate online gambling, I examine the affective politics of listing.
Enforcer utilises a
whitelist on each individual endpoint which eliminates the single-point failure risk inherent with a central
whitelist approach.
The policy is simply to accept the packet, if the source IP address is registered in the
whitelist already, but to drop the packet, if the source IP address is not registered in the
whitelist.
As part of the effort, the existing
whitelist has been audited as well and reduced to around 10,000 IP addresses.
Through interviews and needs assessment interviews, it was clear a solution was needed to minimize the amount of time IT professionals must spend maintaining the
whitelist profile.
But do you
whitelist (to ensure that emails from select senders will never be placed in trash, spam or junk mail folders)?
Bosses at Scotland Yard reportedly sent the orders to IT staff who are also no longer allowed to use the computer phrase
whitelist.
For example, when a user is surfing the Web and accidentally stumbles on a malicious website that attempts to silently install a keystroke logger on an endpoint, this spyware will simply not execute because it is not on the
whitelist.
If a contact is added to the
whitelist the message is moved to Inbox, otherwise it is deleted after a certain deadline.
Having
whitelist and blacklist based protection integrated in one solution provides organizations with greater security and compliance while simplifying workstation management for IT departments.