# Blacklist and Whitelist

In the realm of software and application security, two key concepts arise: blacklisting and whitelisting. Though seemingly opposite, these methods play crucial roles in safeguarding your system from unwanted programs and vulnerabilities.&#x20;

## **What is blacklisting?**&#x20;

Blacklisting operates on the principle of exclusion. A blacklist is a curated list of programs deemed undesirable, malicious, or unauthorized. Software identified on the blacklist is then blocked from installation or execution on a system.&#x20;

Here are some common reasons why software might be blacklisted:&#x20;

* Known malware or viruses: These programs are designed to harm your system, steal data, or disrupt operations.&#x20;
* Unwanted applications: Some software might be disruptive or inappropriate for certain environments.&#x20;
* Pirated software: Using illegal copies of software can be harmful and is often blacklisted.&#x20;
* Vulnerable applications: Programs with known security flaws pose a risk and might be blacklisted until patched.&#x20;

## **What is whitelisting?**&#x20;

Whitelisting, on the other hand, takes the opposite approach. Instead of listing what's bad, it defines what's good. A whitelist is a curated list of programs explicitly permitted to be installed or run on a system. Any software not on the whitelist is automatically restricted.&#x20;

Whitelisting offers several advantages:&#x20;

* Enhanced security: Only authorized and vetted software can run, significantly reducing the risk of malware and unauthorized access.&#x20;
* Simplified management: Administrators have complete control over what software is allowed, making it easier to maintain a secure environment.&#x20;
* Improved compliance: Whitelisting can help organizations comply with specific security regulations or internal policies.&#x20;

### **Steps to add the configuration**&#x20;

* Go to Infraon Portal -> Infraon Configuration -> IT Operations -> Blacklist and Whitelist.&#x20;
* On the top right corner of the page, navigate to the ‘Add’ button to add a new configuration.&#x20;
* Enter the below details in the respective dialog boxes.&#x20;

<table data-header-hidden><thead><tr><th width="187"></th><th width="268"></th><th></th></tr></thead><tbody><tr><td><strong>Label</strong> </td><td><strong>Action</strong> </td><td><strong>Description</strong> </td></tr><tr><td>Type </td><td>Select the appropriate from the drop-down box below. </td><td>Example – Software, etc. </td></tr><tr><td>Profile </td><td></td><td>Enter a profile name to the configuration. </td></tr><tr><td>Description </td><td></td><td>Enter a brief description about the configuration. </td></tr><tr><td>Blacklist </td><td>Select the appropriate from the drop-down box below. </td><td></td></tr><tr><td>Whitelist </td><td>Select the appropriate from the drop-down box below. </td><td></td></tr></tbody></table>
