Infraon Infinity
API DocsAdmin GuideUser GuideVideo LibraryResources
  • Infraon Documentation
  • Explore More
    • What's New
    • Use Cases
      • Dashboard
        • Default Dashboard
        • Add a Dashboard
        • Miscellaneous
      • Asset
        • IT & Fixed Asset
          • Asset Categories
          • Add Asset
            • Adding an Asset Manually
            • Adding an asset using CSV
            • Adding an asset using Inventory Agent
          • Miscellaneous
        • Software Inventory
        • Software License Management
        • CMDB view
      • Ticket Management
        • Ticket Creation
          • Created by Techician
          • Email to incident
          • Self Service Portal
          • Trigger Configuration
        • Ticket Assignment
          • Ticket Assignment (Manual)
          • Ticket Assignment (Automatic)
        • Ticket Resolution
        • Miscellaneous
    • Handbooks
    • Video Library: Infraon Infinity
      • Dashboard
      • Assets
        • IT & Fixed Asset
          • Add an Asset
        • Software Inventory
        • Software License
        • CMDB View
      • Ticket Management
        • Ticket Creation
        • Ticket Assignment
        • Ticket Resolution
        • Miscellaneous
      • Request Management
      • Problem Management
      • Change Management
      • Release Management
      • Event Management
      • Report
      • SLA Management
      • Network Diagram
      • Topology
      • Geomap
      • Infraon Configuration
        • General Settings
        • User Management
        • Service Management
        • Notifications
        • Infraon Automation
        • Bots
        • Organization
        • IT Operations
          • Advance Resource Configuration
          • Blacklist and Whitelist
          • Discovery
          • Diagnosis Tools
          • Device Credentials
          • Maintenance
          • Correlation Rules
          • Network Configuration
          • Thresholds
  • Infinity Admin Guide
    • Overview
    • Getting Started
      • Welcome to Infraon!
      • Know Infraon!
      • User's first login
  • Infraon Platform
    • Account Signup
    • CI Rule Configuration
    • Infraon URL
    • Login Settings
    • Module Prefix Configuration
    • Rebrand Infraon
    • Template Configuration
    • Vendor
    • SSP Configuration
  • Infinity User Guide
    • Introduction
    • Workspace
    • Dashboard
      • Widgets
      • Add a Dashboard
    • Asset
      • Asset Lifecycle
      • How does it work?
      • Asset Types
      • Asset Categories/Sub-Categories
      • Asset Grid Page
      • Add Asset/Add Item
      • Asset Information – SDH / PDH
      • Consumable Asset (Beta)
      • Software Assets
      • Software License
      • CMDB View
        • CI relationship in CMDB Downstream
        • CI relationship in CMDB Upstream
    • Contract Management
      • Add contract
    • NCCM
      • Download Job
      • Calendar View
    • IMACD (Beta)
      • Instructions to add a process
      • Gate pass
    • Ticket Management
      • Tickets
      • Add ticket
    • Request Management
      • Request
      • Add Request
    • Problem Management
      • Problem
      • Add Problem
    • Change Management
      • Change
      • Add Change
    • Log Management
      • Log Search
      • Log Stream
    • Release Management
      • What you see on the screen
      • Instructions to add a New Release
    • Event Management
      • Events
    • Report
      • How does it work
      • Add Report
    • Knowledge Base
      • Infraon's Knowledge Base
    • SLA Management
      • SLA
      • Profile
    • Geomap
      • What you see on the screen
    • Network Diagram (Beta)
      • How does it work?
    • Topology
      • Topological Links
    • Infraon Configuration
      • General Settings
        • Audits
        • Business Hours
        • Tag Management
        • API Registration
      • User Management
        • Department
        • Active users
        • Leaves
        • My Leaves
        • Password Policy
        • Requesters
        • Roles & Privileges
        • Teams
        • Users
        • Shift Configuration
      • Service Management
        • Service Catalogue
      • Notifications
        • Configure SMS
        • Configure SMTP
        • Messenger Audit
        • Trigger Configuration
      • Infraon Automation
        • Business Rule
          • Manual Service Mapping
        • Escalation
        • Email Integration
        • Customer Feedback Template
        • Mail Automator
        • Microsoft Outlook
        • Workflow
          • Advanced Options
          • Task Workflow
      • Bots
        • Bots assistance
        • Data Collector
        • Inventory Agent
      • Organization
        • Address Book
        • License
        • Asynchronous Task Manager
      • IT Operations
        • Advance Resource Configuration
        • Blacklist and Whitelist
        • CLI Jobs
        • Circuit Discovery
        • Device Credentials
        • Diagnosis Tools
        • Discovery
          • Automatic Discovery
          • Network Discovery
          • Windows Servers
          • Linux Servers
          • Hypervisor Monitoring
          • VMware
          • URL/ Web Services
          • Wireless Controller
        • Job Progress
        • Maintenance
        • Network Configuration
          • Baseline Scheduler
          • Configuration Comparison
          • Configuration File Compare
          • Configuration Parameters
          • Configuration Profile
          • Configuration Search
          • Configuration Template
            • What you see on the screen
            • How to write Command Portion in Template
            • Conditioning in Template
            • Guidelines for Configuration Template
            • Add Template
              • Miscellaneous
          • Generate MD5
          • Jobs Account Audit
          • OS Image
            • OS Image Download Scheduler
          • Configuration Trigger
          • Job(s) Retry Queue
          • Workflow Jobs
          • Rules
          • Rule Group
          • Policy
          • Manage Vulnerabilities
            • Vulnerabilities by CVE
            • Vulnerabilities by Assets
            • Vulnerabilities Database
          • Download Jobs
            • What you see on the screen
            • Add Download Job
          • Upload Jobs
            • What you see on the screen
            • Add Upload Job
          • Service Template
            • Service Job
          • Authentication Profile
          • Authorization Profile
        • Rules
          • Log Rule
          • Correlation Rule
        • Thresholds
        • Trap Configuration
      • Log Management
        • Log Multi-Index
        • Log Search
        • Log Stream
        • Export Configs
    • Marketplace (Beta)
      • Azure Active Directory
      • Infraon Dell
      • Google Workspace
      • Infraon JAMF
      • Infraon ServiceNow
      • Infraon Slack
      • Infraon Teams
      • Infraon WhatsApp
      • Infraon Ring Central
      • Infraon LDAP
      • Infraon JIRA
Powered by GitBook
On this page
  • What is blacklisting?
  • What is whitelisting?
  • Steps to add the configuration

Was this helpful?

  1. Infinity User Guide
  2. Infraon Configuration
  3. IT Operations

Blacklist and Whitelist

In the realm of software and application security, two key concepts arise: blacklisting and whitelisting. Though seemingly opposite, these methods play crucial roles in safeguarding your system from unwanted programs and vulnerabilities.

What is blacklisting?

Blacklisting operates on the principle of exclusion. A blacklist is a curated list of programs deemed undesirable, malicious, or unauthorized. Software identified on the blacklist is then blocked from installation or execution on a system.

Here are some common reasons why software might be blacklisted:

  • Known malware or viruses: These programs are designed to harm your system, steal data, or disrupt operations.

  • Unwanted applications: Some software might be disruptive or inappropriate for certain environments.

  • Pirated software: Using illegal copies of software can be harmful and is often blacklisted.

  • Vulnerable applications: Programs with known security flaws pose a risk and might be blacklisted until patched.

What is whitelisting?

Whitelisting, on the other hand, takes the opposite approach. Instead of listing what's bad, it defines what's good. A whitelist is a curated list of programs explicitly permitted to be installed or run on a system. Any software not on the whitelist is automatically restricted.

Whitelisting offers several advantages:

  • Enhanced security: Only authorized and vetted software can run, significantly reducing the risk of malware and unauthorized access.

  • Simplified management: Administrators have complete control over what software is allowed, making it easier to maintain a secure environment.

  • Improved compliance: Whitelisting can help organizations comply with specific security regulations or internal policies.

Steps to add the configuration

  • Go to Infraon Portal -> Infraon Configuration -> IT Operations -> Blacklist and Whitelist.

  • On the top right corner of the page, navigate to the ‘Add’ button to add a new configuration.

  • Enter the below details in the respective dialog boxes.

Label

Action

Description

Type

Select the appropriate from the drop-down box below.

Example – Software, etc.

Profile

Enter a profile name to the configuration.

Description

Enter a brief description about the configuration.

Blacklist

Select the appropriate from the drop-down box below.

Whitelist

Select the appropriate from the drop-down box below.

PreviousAdvance Resource ConfigurationNextCLI Jobs

Last updated 8 months ago

Was this helpful?