Svg Vector Icons : http://www.onlinewebfonts.com/icon Return to Glossary

What is Denylisting?

Denylisting is a security capability that reduces harmful security attacks by denying access to listed elements.

Let’s Define Denylisting

Denylisting is defined as a basic access control mechanism that allows through all elements except those explicitly mentioned on a “deny” list. Therefore, those items on the list are denied access.

Denylists can be applied at various points in a security architecture i.e. host, web proxy, DNS servers, firewalls, etc. Denylisting examples may include a company preventing a list of software from running on its network, unapproved apps or blocked websites.



How Effective is Denylisting?

While denylisting is being touted as a security essential, it is only one of many tools that provide complete and comprehensive endpoint security.

When it is combined with other advanced techniques like behavioral analysis and machine learning, denylisting is a significant contributor to blocking and preventing malicious attacks.

As an example, a security team may discover some malware hidden in seemingly legitimate software or apps. Creating a denylist helps keep track of these malicious elements from penetrating your defenses, network and users.



The Answer to Denylisting: Real-Time Dynamic Allowlisting

In today’s high-risk cyber world, it’s critical to have a complete endpoint security solution that includes allowlisting so that sensitive data is continually protected. Based on strict policies of allowable activities, allowlisting and application control allows for critical system lockdowns in real time that automatically prevent all untrusted files, applications, and processes from executing. With these sophisticated capabilities, companies can:


Stop Attacks by allowing only approved software to run

Automate Software approvals and updates via IT and cloud-driven policies

Prevent Unwanted Change to system configuration at the kernel and user mode levels

Power Device Control and file integrity monitoring and control (FIM/FIC) capabilities

Meet IT Risk and audit controls across major regulatory mandates


Related Topics
Application Management
Threat Intelligence


VMware Security Products and Solutions

Protect Your Apps and Data with Intrinsic Security

A New Security Approach - Intrinsic security is a fundamentally different approach to securing your business.


VMware NSX Service-defined Firewall

Rely on a distributed, stateful Layer 7 internal firewall, built on NSX, to secure data center traffic across virtual, physical, containerized, and cloud workloads.


Modern Digital Workspace Platform

Simply and securely deliver and manage any app on any device with VMware Workspace ONE, an intelligence-driven digital workspace platform.