Whitelisting every app that can run - that's a lot to cover ...what are the basics about attempting that?
You are right it is a lot to cover. But if you don't do it how do you know that what's running is authorized to run on your network? This will also help in s/w licensing audits.
There are multiple pieces involved in this project, starting out with the basics look at your perimeter firewall what do you allow through it from an application standpoint?
Do you have a list of software that is allowed to run? Bounce that off any channels allowed from an application standpoint in your firewall. Is there an opportunity for closing down channels that are not used by your organization?
Getting Upper Management buy-in is going to be key, without it you are fighting an uphill battle.
I'd recommend you take a look at the SANS top 20 critical controls,
http://www.sans.org/critical-security-controls/
specifically relating to this control objective is critical control 2 inventory of authorized and unauthorized software.
http://www.sans.org/critical-security-controls/control.php?id=2
This doesn't happen overnight but this is a good control to start on!
Some others may be able to chime in on this project that have been there done that...would like to hear their thoughts as well.
p.s. you could also look at NIST 800.53 Recommended Security Controls but to be honest just looking at the implementation of the process is overwhelming. Look at the SANS document first unless you have a compliance reason to stick with 800.53.