All Products
Search
Document Center

Security Center:Automatic access blacklist and whitelist

Last Updated:Mar 31, 2026

Access rules control which server processes connect to Application Protection in automatic access mode. Use a blocklist to exclude specific processes from protection, or an allowlist to protect only a defined set of processes. This topic explains the rule priority model, configuration procedures, and the automatic full access option for Java processes.

How rules work

Access rules follow a fixed priority model:

  • Blocklist takes precedence over allowlist. If a process matches both a blocklist rule and an allowlist rule, the process is not connected.

  • Rules apply only to automatic access mode. Manual access mode is not affected.

  • When a rule takes effect depends on whether the process is already connected:

    • Rules configured before a process connects take effect immediately.

    • Rules configured after a process has connected take effect when the process restarts or during the next automatic access cycle.

    • Deleting a blocklist rule takes effect immediately, regardless of process state.

Choose a policy type

PolicyWhat it doesUse when
BlocklistExcludes specific processes from protection. Processes matching a blocklist rule are not connected to Application Protection. Requires RASP agent version 1.0.5 or later.Most processes need protection, but a few should be excluded — for example, databases, trusted system processes, processes with compatibility issues, or test environment processes.
AllowlistProtects only processes in a specified scope. Only processes matching an allowlist rule are connected. If no rules are configured, all processes on the asset connect automatically. Requires RASP agent version 0.9.4 or later.Only critical processes need protection — for example, payment gateways, user authentication services, or specific container workloads in multi-tenancy environments.
Automatic full accessConnects all Java processes on your assets automatically using the slow access method. Available when Application Protection is enabled on a pay-as-you-go basis without custom binding.Initial setup or when no processes have connected yet.

Add a blocklist or allowlist rule

The following steps use adding a blocklist as an example. Adding an allowlist follows the same procedure.

Prerequisites

Before you begin, ensure that the RASP agent version meets the minimum requirement: version 1.0.5 or later for a blocklist, or version 0.9.4 or later for an allowlist.

Steps

  1. Log on to the Security Center console.

  2. In the left navigation pane, choose Protection Configuration > Application Protection. In the upper-left corner, select the region where your asset is located: Chinese Mainland or Outside Chinese Mainland.

  3. On the Application Configurations tab, click Management Settings in the upper-right corner.

  4. On the Manage Access Rule tab of the Management Settings panel, click the Blacklist tab, and then click Add Blacklist.

  5. In the Add Blacklist dialog box, configure the following parameters and click OK.

    ParameterDescription
    Rule NameEnter a name for the blocklist rule.
    Rule SwitchEnabled by default.
    Effective Application TypeSelect Java or PHP.
    Match ConditionSelect a matching dimension. See Match conditions for details. Click Add Condition to add multiple conditions. Multiple conditions use AND logic — all conditions must be met.
    Match ModeSelect the matching method for the selected condition.
    Match FieldEnter the field to match. Required only when Match Condition is set to Environment Variables or -D parameter.
    Content to MatchEnter the matching content.
    Destination Application GroupsSelect the application groups to which this rule applies. The application type of the selected groups must match the Effective Application Type.
Rules configured after a process has connected take effect only after the process restarts or during the next automatic access cycle.

Match conditions

ConditionMatches onSupported match modesAvailability
cmdlineCommand-line parameters at process startupContains, does not contain, contains one of multiple values, does not contain any of the valuesJava and PHP
Environment VariablesEnvironment variables accessed by the processEqualsJava and PHP
-D parameterSystem properties set at Java startup via -D flagsEqualsJava only
Container NameName of the container the process belongs toContains, does not contain, contains one of multiple values, does not contain any of the valuesPHP only

Configuration examples:

Exclude processes whose startup parameters contain tomcat:

  • Match Condition: cmdline

  • Match Mode: Contains

  • Content to Match: tomcat

Exclude processes whose startup parameters do not contain apache or test:

  • Match Condition: cmdline

  • Match Mode: Does not contain any of the values

  • Content to Match: apache,test

Edit or delete a blocklist or allowlist rule

  1. Log on to the Security Center console.

  2. In the left navigation pane, choose Protection Configuration > Application Protection. In the upper-left corner, select the region where your asset is located: Chinese Mainland or Outside Chinese Mainland.

  3. On the Application Configurations tab, click Management Settings in the upper-right corner.

  4. On the Manage Access Rule tab, click the Blacklist or Application Access Whitelist sub-tab. In the Actions column for the target rule, click Edit or Delete.

Important

Delete only rules that are not applied to any application group. Before deleting a rule, detach all associated application groups from it.

Automatic full access (Java processes only)

If you enable Application Protection on a pay-as-you-go basis without custom binding, all Java processes on your assets connect to Application Protection automatically. The slow access method is used by default.

If Application Protection is enabled but no processes have connected, a dialog box appears with two options: Automatic Full Access and Custom Access. Selecting Automatic Full Access uses the slow access method by default. Click Configure Now to switch to a different access method.

Access methods

Access methodSuitable forInstallation time
Fast AccessFew processes, low stability requirementsShort
Regular AccessModerate number of processes, low stability requirementsMedium
Slow AccessMany processes, high stability requirementsLong

Stop automatic full access

To stop the accessing process, go to Protection Configuration > Application Protection > Application Analysis and click Stop Accessing in the prompt.

Important

After stopping, full access cannot be triggered again.

  • Servers with a status of Queuing will not be connected to Application Protection.

  • Servers with a status of In Progress will complete the current installation.

After stopping, click View Details in the prompt to check the access status of Java processes on your assets.