Application Allow-listing
What it is
Application allow-listing (aka “only these apps may run”) is a safety rule for your devices. You create a small, approved list of programs—and everything else is blocked by default. If it’s not on the list, it doesn’t launch.
Why it matters
-
Stops malware cold: unknown files can’t execute.
-
Shrinks attack surface: fewer ways in, fewer surprises.
-
Raises trust: every running app is known and vetted.
How it works (30-second version)
-
You approve apps by path, publisher signature, or file hash.
-
The system checks each launch against the policy.
-
Updates are handled with rules (e.g., allow signed updates from the vendor).
Where it shines
-
Servers, admin workstations, POS/kiosks, shared school or library PCs.
-
Teams handling sensitive data or high-risk roles.
Gotchas (plan for these)
-
Updates break if rules are too strict—build an update path.
-
Power users/dev tools may need exceptions or a “developer mode.”
-
Shadow IT gets surfaced—have a fast request/approval workflow.
Rollout quick plan
-
Audit what actually runs (baseline your fleet).
-
Draft rules: prefer vendor signature + known paths; hash for high-risk tools.
-
Pilot in monitor mode to see blocks without enforcing.
-
Enforce gradually; review requests and tune.
Glossary (A–Z)
Related Articles
Fileless Attacks
What it is A fileless attack runs malicious code directly in memory or abuses built-in tools (PowerShell, WMI, Office macros) so there’s little or nothing written to disk. That stealth lets it slip past traditional antivirus and move quickly inside a ...
Data Execution Prevention
What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
Malware
What it is Malware is any software made to harm your device or data. It can steal passwords, lock your files, spy on activity, or hijack your browser. For a quick primer and examples, see our malware explainer. How it spreads Phishing emails and fake ...
EDR (Endpoint Detection and Response)
What it is EDR is your always-on security team for laptops and servers. It watches what’s happening on each device, spots attacks in progress, and helps you respond fast - quarantine, investigate, and clean up. For details on capabilities and use ...
Fileless Malware
What it is Fileless malware runs from memory instead of dropping obvious files on your disk. It often abuses built-in tools (like PowerShell or WMI) and trusted apps, making it harder for traditional antivirus to spot. How it works You visit a ...