April 3rd, 2020

How Safe is Zoom?

Earlier this week, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is currently one of the leading video conferencing software applications on the market. Over the last month, the use of this platform has spiked amid the Covid-19 pandemic as businesses,..

March 16th, 2020

The Hidden Dangers of Chrome Extensions

While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what extensions users can add to Google Chrome. Most assume that Chrome extensions are nothing more than a combination of JavaScript and HTML files..

January 8th, 2020

Hardening Windows 7 after January 14th, 2020

The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to protect themselves, facing the inability to carry out security updates.

January 7th, 2020

Why Small Businesses Have Become Targets of More Cyber-Attacks Than Large Enterprises

Thousands of computers that belong to customers of managed services providers (MSPS) have suffered from ransomware attacks over the last year. Often times, this begins with a phishing email that leads to a compromising installation of malware, or the bad guys find an open avenue to exploit on a..

September 8th, 2019

Deploy ThreatLocker using Group Policy

ThreatLocker MSI download Download ThreatLocker MSI from https://portal.threatlocker.com

August 26th, 2019

ThreatLocker Administration

ThreatLocker Administration

August 26th, 2019

Manage Computers

Manage Computers ThreatLocker gives you the ability to manage organization computers.

August 26th, 2019

Working with Computer Baseline

Working with Computer Baseline Computer Baseline is what is installed on a computer when ThreatLocker agent is installed. You don’t need to manually figure out what is running on the organization computers; ThreatLocker scans the computers, and then create policies automatically based on the..

August 26th, 2019

ThreatLocker Administration

ThreatLocker Administration

August 26th, 2019

Splunk Integration

Splunk Integration ThreatLocker offers the ability to send Application Control (Whitelisting), and Storage Control policy audit information to your Splunk Enterprise or Splunk cloud server. In order to use Splunk you must first request that Splunk integration is enabled on your account.

August 26th, 2019

ThreatLocker Administration

ThreatLocker Administration

August 26th, 2019

ThreatLocker Administration

ThreatLocker Administration
Prev 1 2 3 4 Next