Get a FREE Software Audit - Including Risks and Countries of Origin

Configuration Manager

ThreatLocker® Configuration Manager enables IT professionals to set best practice configuration policies across their environment from a single central console.

Why Is Configuration Manager Important?

Traditionally, companies require components of group policy from Active Directory (AD) to set Windows configurations, requiring users to be on the network or using an AD domain. Today's business network isn't always isolated to a single AD domain, making setting and enforcing configurations difficult. ThreatLocker® Configuration Manager allows IT admins to set standardized Windows configurations, such as automatic lock policies, disabling Universal Plug and Play, and disabling autoplay, or blocking SMB v1 from one central location, whether or not the computers are connected to an AD domain.

Vector Graphic of ThreatLocker Configuration Manager policy list

How Does Configuration Manager Work?

ThreatLocker® Configuration Manager provides a centralized, policy-driven portal where IT admins can set configuration policies per individual endpoint, computer group, organization, or across multiple organizations. Admins can quickly manage important security configurations from a single pane of glass.

Graphic of ThreatLocker Configuration Manager  Updating Existing Policies


Centralized Password Policy Configuration Icon

Centralized Password Policy Configuration

Set password requirements such as length, complexity, and change frequency from a single policy, across an entire organization, or across multiple organizations from a central location.

User Account Management Icon

User Account Management

Rename local administrator accounts and apply a unique rotating password to each computer for their local admin account, making it more challenging for credentials to be compromised.

Set Boundaries for MS Office Icon

Set Boundaries for MS Office

Provides access to disable all downloaded macros and OLE in MS Office documents.

Control Social Media Access Icon

Control User Social Media Access

Select which social media platforms are acceptable or disable all the common platforms to keep employees productive and protect their business environment.

More ThreatLocker® Solutions

ThreatLocker Network Control logo

Network Control

See Solution
ThreatLocker Elevation Control Logo

Elevation Control

See Solution
ThreatLocker Storage Control Logo

Storage Control

See Solution