Learn about the ThreatLocker® approval process and why it's essential for both IT professionals and business operations.
You can read more about requesting access and permitting software on our knowledge base article, or you can contact us directly through our support page. We look forward to helping you!
An approval process is a set workflow, made up of sequences and steps that must be followed in order for an item(s) to be approved. Implementing an approval process helps businesses to streamline requests and processes, whilst helping to standardize workflows.
The purpose of Allowlisting is to allow what's needed to run and block everything else by default. One of the challenges of implementing Allowlisting has always been the time it takes and the complexity of permitting new applications to run. Permitting new applications with ThreatLocker is a seamless process. A blocked file can be requested, evaluated, approved, and allowed to run within 60 seconds.
This approval process can be summarized as follows; an execution is blocked, a request is sent by the user, it’s evaluated by the administrator, and if permitted, within 60 seconds it can run.
When a file gets blocked by ThreatLocker, the user can request permission from an administrator.
Once the user clicks the 'Request Access' button, the request window will populate.