In Symantec Endpoint Protection (SEP) Application Control policies, applications are managed
through lists: an Allowed list (applications approved for use) and a Blocked list (applications
restricted or prohibited). When a user encounters an application that is not explicitly on either the
Allowed or Blocked list, it falls into a neutral category.
For accessing this application, the typical process includes:
Requesting an Override: The user can initiate a request to temporarily or permanently allow access
to the application. This process usually involves contacting the administrator or following a specified
override protocol to gain necessary permissions.
Administrator Review: Upon receiving the override request, the administrator evaluates the
application to ensure it aligns with organizational security policies and compliance standards.
Override Approval: If deemed safe, the application may be added to the Allowed list, granting the
user access.
This request mechanism ensures that unlisted appli