Register for Zero Trust World 25!
Back to Blogs Back to Press Releases
Blog header graphic of What Is the ThreatLocker Unified Audit
January 16, 2023
Product

What is the ThreatLocker Unified Audit?

Table of Contents

Introduction 

A solid cybersecurity program includes very detailed logging; logging network activity, logging file access, logging user activity, logging security events, and the list continues. Correlating and analyzing these logs can be an arduous task.   When investigating a specific event, finding what you're looking for can be overwhelming.  Being able to view all relevant information in a single, organized location is crucial. This is what makes the Unified Audit so important.

What Is the ThreatLocker Unified Audit? 

The ThreatLocker Unified Audit is a centralized location where all audited information is displayed. It will show information from the different ThreatLocker modules being utilized across the entire business environment in a single pane of glass. When using ThreatLocker Application Control, information about executables, scripts, and libraries are recorded and indexed in near real-time. ThreatLocker Storage Control displays information about files that have been accessed, changed, or deleted in any monitored storage location, including USB drives, file shares, and the local drives where an explicit policy was created to monitor or control that folder. Network Control logs all network activity, including source and destination IP addresses, port numbers, users, and processes. All Unified Audit activity is filterable and searchable, to make parsing the information easy.

Why Is the ThreatLocker Unified Audit Important? 

Having the ability to view all your data in one streamlined place is crucial in more ways than one.  The Unified Audit allows you to search specific date ranges. If you are researching an incident and you have a timeframe, you can narrow your search down by date and time to help filter out any unnecessary information, and drill down to specific incidents with ease.  It also allows you to search by policy name, path, process, hostname, username, certificate, hash, serial number, action, interface, and many other unique variables, providing granular control over how to view and interact with your data.

Conclusion 

The ThreatLocker Unified Audit provides a centralized view of the data collected by all ThreatLocker modules across an environment. It creates a comprehensive overview that streamlines log analysis by providing all necessary information in one place.  Cut down on the amount of time spent sifting through multiple logs by including the ThreatLocker Unified Audit in your security strategy.  

If the ThreatLocker Unified Audit sounds like something you need to help document data access, then you should consider adding ThreatLocker to your cybersecurity program. ThreatLocker has been helping companies with securing their endpoints for years and can help implement a personalized plan for you.  For more on Zero Trust cybersecurity, schedule a call to learn how the ThreatLocker Endpoint Protection Platform could be the perfect fit for your business.

Author:
Contributor: