Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Exception policy. . .this approach is a good initial step when rolling out policies as often times you don’t know what applications are actually exceptions. A policy will be created to blacklist or deny any policies that didn’t meet the Whitelist or Orangelist criteria. Prevent unnecessary helpdesk calls, create a custom message for the blacklist policy. 

Blacklisting options:

  • Application attributes
  • File hash
  • Location
  • Untrusted applications