ThreatLocker MSI download Download ThreatLocker MSI from https://portal.threatlocker.com Login using your administrator details and create/select the computer group you want to deploy ThreatLocker to, download and save the MSI package. Create a shared folder The first step in deploying an MSI through GPO is to create a distribution point on the publishing server.
ThreatLocker Deployment Script for ConnectWise Automate Requirements: The Company name in Automate must exactly match the Organization name in ThreatLocker PowerShell 3.0 or greater on the target device Integration Key from ThreatLocker DOWNLOAD THE XML SCRIPT FILE Within ConnectWise Automate, navigate to System > General > Import > XML Expansion.
ThreatLocker® User Guide What is ThreatLocker® ThreatLocker® gives your I.T. department control over what software can run, and storage devices can be used in your organization. This control reduces the risk of a cyber-breach. If you have ThreatLocker installed on your computer, you will notice a small icon in the tray with a lock.
ThreatLocker Deployment Script for Solarwinds RMM First, download the .amp files for the script. 64 – BIT 32 – BIT Then, edit the .amp file replacing XXX with the install key for the ThreatLocker Group you wish to install into. Log into your Solarwinds RMM, and open Scrip Manager Select “New” Input a “Name” – […]
ThreatLocker User Guide for Administrators About ThreatLocker ThreatLocker® puts your business ahead in the fight against malware and exploits by combining Application Whitelisting and RingFencing together into our Application Control. ThreatLocker® enables your business to control not just the Applications, but also the Storage.
ThreatLocker® Storage Control Storage Devices How to add a storage device? There are multiple ways of adding a storage device. Add a storage device from the Audit page: Select the add storage icon; Fill in Device name*; Fill in optional fields Manufacturer** and Owner**; and Select the Save button to finish adding the storage device.
ThreatLocker® Storage Policy Approval Request and Permitting Access to a Storage Device from the ThreatLocker Tray To request permissions, a policy must be set to “Allow the user to request permission when blocked.” (see How to add a Storage Policy? – point 6). How to request permission: When a storage device is blocked, the Threatlocker […]
ThreatLocker® Storage Control Audit What is Storage Control Audit? It does not matter what the storage device, ThreatLocker® keeps a full audit of every action that users take. We log, and store reads write, delete and moves in a simple[DJ9] [CM10] to use secure cloud portal.
Storage Control Guide What is ThreatLocker® Storage Control? ThreatLocker® takes storage control beyond just blocking USB hard drives and gives you granular control over what happens on external storage devices, including network attached storage, USB drives and even secondary hard drives directly connected to your computer.
Organizations With ThreatLocker, when receiving the administrator credentials, your organization is already created. If you have subdivisions within your organization, or your a reseller or managed service provider you can provision organizations yourself.
Dual factor authentication with DUO DUAL FACTOR AUTHENTICATION WITH DUO ThreatLocker can be integrated with dual factor authentication from DUO. To Enable dual factor authentication with DUO: Select an organization to edit it; Select Yes radio button for “Would you like to enforce dual factor authentication with DUO” section; Enter Integration Key; Enter Secret Key; […]
Administrators Each organization defined inside ThreatLocker portal has at least one administrator. ThreatLocker offers the possibility to manage all administrators under your organization. To manage administrators, login to ThreatLocker portal using the credentials provided and open the Administrators page where you can: Add new administrators; Search for administrators; Edit administrators; and Delete administrators.