Endpoint Whitelist: Sample Communication

The next phase in our Application Control rollout is to generate a whitelist based on the applications that are currently installed on your computer. Your computer will be scanned to identify all of the executable files, and these files will then form the initial whitelist for your computer.

To minimize the effect on your productivity while this scan takes place, we plan to conduct the scan off business hours if possible. The scan will be scheduled to take place this week. Please ensure that you leave your computer turned on and connected to the network when you leave the office.

If your computer is powered down before or during the scan, it will start over from the beginning once the computer is powered on. Depending on the size of your hard drive, the scan may take several hours to complete. While the scan is running, you may notice some slowdown for normal operations such as opening applications and copying files.

Once the scan has completed, your computer will continue to operate as normal. Your computer will be in audit mode, and your IT team will monitor your computer for application file changes. IT will also create and apply policies that enable trusted change to occur on your computer.