LAN whitelists A use for whitelists is in
local area network (LAN) security. Many network admins set up
MAC address whitelists, or a MAC address filter, to control who is allowed on their networks. This is used when encryption is not a practical solution or in tandem with encryption. However, it's sometimes ineffective because a
MAC address can be faked.
IP whitelist Firewalls can usually be configured to only allow data-traffic from/to certain (ranges of) IP-addresses.
Application whitelists One approach in combating viruses and malware is to whitelist software which is considered safe to run, blocking all others. This is particularly attractive in a corporate environment, where there are typically already restrictions on what software is approved. Leading providers of application whitelisting technology include
Bit9,
Velox,
McAfee,
Lumension, ThreatLocker, Airlock Digital and SMAC. On Microsoft Windows, recent versions include
AppLocker, which allows administrators to control which executable files are denied or allowed to execute. With AppLocker, administrators are able to create rules based on file names, publishers or file location that will allow certain files to execute. Rules can apply to individuals or groups. Policies are used to group users into different enforcement levels. For example, some users can be added to a report-only policy that will allow administrators to understand the impact before moving that user to a higher enforcement level. Linux systems typically have
AppArmor and
SE Linux features available which can be used to effectively block all applications which are not explicitly whitelisted, and commercial products are also available. On HP-UX introduced a feature called "HP-UX Whitelisting" on 11iv3 version. == Controversy regarding name ==