Protocols White List Dialog Box (Regular/Offline Profile)


 

Use this dialog box to define, edit, export, import and delete the online (regular) or offline Protocols White List. 

 

The Protocols White List lets you selectively allow network communication over any supported protocol regardless of existing protocol blocking settings. The white list is most effective in "least privilege" scenarios when you block all protocol traffic and then specifically authorize only what is required for employees to perform their daily job duties.

 

NOTE: Audit and shadow copying are not performed for data transfers allowed by the Protocols White List while whitelisted connections are audited. 

 

The white list consists of rules associated with the specified protocol. Each rule specifies users or groups the rule applies to and contains a set of parameters associated with it. These parameters fall into two categories: 

 

 

 

You can define the following general parameters for a white list rule:

 

 

 

You can define the following protocol-specific parameters for a white list rule:

 

 

 

 

 

 

 

 

Multiple hosts must be separated by a comma (,) or semicolon (;). You can also press ENTER after each entry. You can specify multiple hosts in different formats described above (for example, www.microsoft.com; 12.13.14.15, 12.13.14.18-12.13.14.28). NOTES: When adding hosts to the white list, consider the following: 

 

If objects (images, scripts, video, Flash files, ActiveX, etc.) on a web page are downloaded from other hosts, you must add those hosts to the white list to load the web page correctly. 

 

If you specify hosts and do not specify ports, the hosts can be accessed through all available ports.

 

An application with an embedded SSL certificate (for example, Microsoft Office Communicator, Dropbox, iTunes Google contacts synchronization module, etc.) will fail to connect to its server when the NetworkLock module is active. The NetworkLock module becomes active when you define settings for protocols. To solve this issue, add the server host to the white list for SSL. You can use TcpView to look up the server host. Whitelisting a server host causes all SSL traffic between an application and the specified server host to bypass access control, audit, shadow copying and content filtering.

 

 

 

 

 

 

 

 

 

 

 

To define the Protocols White List

 

1. In the left pane of the Protocols White List dialog box, under Users, click Add. The Select Users or Groups dialog box appears.

 

2. In the Select Users or Groups dialog box, in the Enter the object names to select box, type the names of the users or groups for which you want to define the Protocols White List, and then click OK. The users and groups that you added are displayed under Users in the left pane of the Protocols White List dialog box. To delete a user or group, select the user or group, and then click Delete.

 

3. In the left pane of the Protocols White List dialog box, under Users, select the user or group. You can select multiple users or groups by holding down the SHIFT key or the CTRL key while clicking them.

 

4. In the right pane of the Protocols White List dialog box, under Rules, click Add. The Add Rule dialog box appears.  

 

5. In the Add Rule dialog box, specify general and protocol-specific parameters for this rule. 

 

6. Click OK. The rule you created is displayed under Rules in the right pane of the Protocols White List dialog box.

 

7. Click OK or Apply.

 

To edit a white list rule

 

1. In the left pane of the Protocols White List dialog box, under Users, select the user or group for which you want to edit the rule. By selecting users or groups, you can view the white list rules applied to them under Rules in the right pane of the dialog box.

 

2. In the right pane of the Protocols White List dialog box, under Rules, select the rule you want to edit, and then click Edit.

 

      - OR - 

 

      Right-click the rule, and then click Edit. The Edit Rule dialog box appears.

 

3. In the Edit Rule dialog box, modify the rule parameters as required to meet your needs.

 

4. Click OK to apply the changes.

 

To export the Protocols White List 

 

1. In the right pane of the Protocols White List dialog box, under Rules, click Save. The Save As dialog box appears.

 

2. In the Save As dialog box, in the Save in box, browse to the location where you want to save the .pwl file. When you export the Protocols White List, it is saved in a file with a .pwl extension.

 

3. In the File name box, type the file name you want.

 

4. Click Save.

 

To import the Protocols White List 

 

1. In the right pane of the Protocols White List dialog box, under Rules, click Load. The Open dialog box appears.

 

2. In the Open dialog box, in the Look in list, click the location that contains the file you want to import. 

 

3. In the folder list, locate and open the folder that contains the file.

 

4. Click the file, and then click Open. You can import only one .pwl file at a time. 

 

To delete a white list rule