Register today for Zero Trust World 2025!

Network Control

Network Control is an endpoint firewall solution that gives control over all network traffic, so you don’t leave devices or data vulnerable and exposed to cyber threats.

What is Network Control (Network access control)?

ThreatLocker® Network Control is a firewall for endpoints and servers that can be managed centrally. It provides complete control over network traffic, which helps to protect your devices. Custom-built policies are used to grant access to the network based on IP address, specific keywords, agent authentication, or dynamic ACLs. This network access security tool allows granular control over access to the network.

Illustration of Network Control Policy List

Why Network Control?

The local network is no more. Neither is the corporate firewall. Users are not only working from the office but also remotely, meaning the network we utilize has quickly become the internet, leaving devices and data vulnerable to cyber threats. This dissolution of the business perimeter makes network access controls essential to protect your devices and, by extension, your data.

The ThreatLocker network access control solution helps protect business assets whether employees are in the office or remote. ThreatLocker Network Control provides a direct connection between the client and server, as opposed to a VPN that goes through a central point.

Illustration of ThreatLocker Network Control configuration window

ThreatLocker Whitepaper: Network Control

Discover how ThreatLocker® Network Control fortifies your network security while seamlessly integrating with the full ThreatLocker® Zero Trust Endpoint Protection Platform.

How does Network Control work?

ThreatLocker network security tools help you manage firewall policies and port control for all devices from one place. Traditional firewalls rely on static ACLs to control access to network assets, requiring IT intervention to make changes. Employees who travel or change locations frequently need the IT department to adjust the firewall for each new location.

ThreatLocker uses dynamic ACLs to adjust the firewall without user interaction. Create custom policies to open ports on demand for approved devices and users, no matter where they connect from.

Once an authorized device no longer uses the open port, it will automatically close within 5 minutes. Unapproved devices will not be able to connect to or have visibility of the open port.

Illustration Graphic of ThreatLocker Network Control Dynamic ACLs

Frequently asked questions

How does Network Control work with VPNs?

Network Control can work in conjunction with VPNs to ensure that users are only logging in to the VPN client on an approved, ThreatLocker-protected endpoint. This ensures threat actors cannot simply compromise credentials and have access to ThreatLocker-protected resources on the network.

Can we replace VPNs with Network Control?

You can replace your VPN with Network Control if you only need to securely allow a connection from an endpoint(s) to another endpoint(s) across a network. If you are relying on tunneling or encryption, you will want to use Network Control in conjunction with that VPN.

Does Network Control supersede or work alongside Windows Firewall?

Network Control can both supersede or work alongside Windows Firewall, depending on your implementation. Speak to your Solutions Engineer or schedule a demo for more information.

How is Network Control different from a firewall?

Network Control provides a central point of management for the host-based firewall across all of your endpoints. It also utilizes a Dynamic ACL rather than a static list of IPs/Domain, making Network Control easier to manage than a traditional Windows Firewall.

Can we use Network Control to block access to websites/services?

Yes. The outbound Network Control policies can be used to block access to any site/service or even more in line with Zero Trust principals, you can limit access to only the sites/services needed for those endpoints.

How does Network Control affect users that take their endpoints home?

Network Control can be implemented to keep ports closed for devices on any network that are not ThreatLocker protected. This blocks devices like unprotected/unmanaged computers, IoT devices, etc., from communicating with your home user's company resource.

Does Network Control disable Windows Firewall? Will we fail our pen test(s) as a result?

While Network Control can functionally replace your Windows Firewall, it will not disable the Windows Firewall. It will not cause you to fail your test due to insufficient firewall controls.

The ThreatLocker® difference

Traditional NAC security solutions focus on broader network access control. ThreatLocker Network Control focuses on controlling and securing individual endpoints.

The ability for such granular control empowers enterprises to allow or deny specific applications or processes from running, communicating over the network, or accessing particular resources. Network security monitoring tools make enforcing your security policies easier and protect your data no matter where your employees work.

Network Control features

Configurable updates - White Icon

Configurable

Using global and granular policies, NAC security allows users to configure network access to endpoints.

ThreatLocker Network Control: Cloud-based Feature Icon

Cloud-based

The cloud-managed solution provides customers with a centralized view of endpoint policies and network traffic across your organization.

Dynamic Icon

Dynamic

NAC enables users to deny all traffic to published servers while only allowing a single computer by IP address or dynamically using a keyword. This is great for a user who is often traveling.

Enhance Network Security Icon

Enhanced security

Ensure rogue devices on your network cannot access your servers or endpoints with Dynamic ACLs.

More ThreatLocker® solutions

Harness the Power of ThreatLocker Community

Community

See solution
ThreatLocker Elevation Control Logo

Elevation Control

See solution
ThreatLocker Storage Control Logo

Storage Control

See solution

Take control of your organization's security

Request your 30-day trial to the entire ThreatLocker platform today.

Try ThreatLocker