The Hidden Dangers of Chrome Extensions

While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what extensions users can add to Google Chrome. Most assume that Chrome extensions are nothing more than a combination of JavaScript and HTML files that run for our convenience.

Read more

Hardening Windows 7 after January 14th, 2020

The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to protect themselves, facing the inability to carry out security updates.

Read more

Deploy ThreatLocker using Group Policy

ThreatLocker MSI download Download ThreatLocker MSI from https://portal.threatlocker.com Login using your administrator details and create/select the computer group you want to deploy ThreatLocker to, download and save the MSI package. Create a shared folder The first step in deploying an MSI through GPO is to create a distribution point on the publishing server.

Read more

ThreatLocker Deployment Script for ConnectWise Automate

ThreatLocker Deployment Script for ConnectWise Automate Requirements: The Company name in Automate must exactly match the Organization name in ThreatLocker PowerShell 3.0 or greater on the target device Integration Key from ThreatLocker DOWNLOAD THE XML SCRIPT FILE Within ConnectWise Automate, navigate to System > General > Import > XML Expansion.

Read more

ThreatLocker® User Guide

ThreatLocker® User Guide What is ThreatLocker® ThreatLocker® gives your I.T. department control over what software can run, and storage devices can be used in your organization. This control reduces the risk of a cyber-breach. If you have ThreatLocker installed on your computer, you will notice a small icon in the tray with a lock.

Read more

ThreatLocker Deployment Script for Solarwinds RMM

ThreatLocker Deployment Script for Solarwinds RMM First, download the .amp files for the script. 64 – BIT 32 – BIT Then, edit the .amp file replacing XXX with the install key for the ThreatLocker Group you wish to install into. Log into your Solarwinds RMM, and open Scrip Manager Select “New” Input a “Name” – […]

Read more

ThreatLocker User Guide for Administrators

ThreatLocker User Guide for Administrators About ThreatLocker ThreatLocker® puts your business ahead in the fight against malware and exploits by combining Application Whitelisting and RingFencing together into our Application Control. ThreatLocker® enables your business to control not just the Applications, but also the Storage.

Read more

ThreatLocker® Storage Policy Approval

ThreatLocker® Storage Policy Approval Request and Permitting Access to a Storage Device from the ThreatLocker Tray To request permissions, a policy must be set to “Allow the user to request permission when blocked.” (see How to add a Storage Policy? – point 6). How to request permission: When a storage device is blocked, the Threatlocker […]

Read more

ThreatLocker® Storage Control Storage Devices

ThreatLocker® Storage Control Storage Devices How to add a storage device? There are multiple ways of adding a storage device. Add a storage device from the Audit page: Select the add storage icon; Fill in Device name*; Fill in optional fields Manufacturer** and Owner**; and Select the Save button to finish adding the storage device.

Read more

ThreatLocker® Storage Control Audit

ThreatLocker® Storage Control Audit What is Storage Control Audit? It does not matter what the storage device, ThreatLocker® keeps a full audit of every action that users take. We log, and store reads write, delete and moves in a simple[DJ9] [CM10] to use secure cloud portal.

Read more

Storage Control Guide

Storage Control Guide What is ThreatLocker® Storage Control? ThreatLocker® takes storage control beyond just blocking USB hard drives and gives you granular control over what happens on external storage devices, including network attached storage, USB drives and even secondary hard drives directly connected to your computer.

Read more