By using an allow list, you can control which applications run on your systems. Allow lists offer an effective solution to prevent users from installing and running unauthorized software (e.g. malware) on their workplace devices. Only applications that have been reviewed, tested, and approved are allowed to run.
Your organization can also use application allow lists for purposes beyond controlling application access. Some examples include the following:
- Software inventory: Keep an inventory of applications and application versions installed on each host so that your organization can identify unauthorized applications.
- End-point protection: Run the hash and compare against files on your system