Register today for Zero Trust World 2026!

ThreatLocker® User Store

A whole new level of application approval.

What is ThreatLocker® User Store?

The ThreatLocker® User Store is a catalog of pre-approved applications that lets your users run the apps they need—without compromising your cybersecurity stance. Once you set up your library, you can easily manage license keys and counts there as well. Best of all, you save time, reduce frustrations, and keep your security framework strong without extra effort as users install new apps.

How does ThreatLocker® User Store work?

Fact: Zero Trust is the most robust and secure approach to cybersecurity.

Also a fact: It can introduce user experience challenges—authentication fatigue, access delays, and added complexity.

At the core of our Zero Trust solutions, we’ve tackled these challenges head-on with Cyber Hero® 60-second response times and a streamlined application approval process. Now, we’re raising the bar even higher with the new ThreatLocker User Store application. A user needs to install an application on their machine. The requested application is not on your current Allowlist. This is how the ThreatLocker User Store comes to the rescue.

1. Instead of denying the request, we offer a list of compatible pre-approved apps from the ThreatLocker User Store. If the requested app is in the ThreatLocker User Store, we present it directly—no alternatives needed.

2. The user chooses the application option, and the rest is a breeze:

  • They are free to install the pre-approved application without requesting approval.
  • The pre-approved application comes with optional temporary elevation to install on user’s device and we’ll automatically create a new Allowlisting policy for the application.
  • Plus, based on your pre-approved settings, we could immediately harden your environment with additional Ringfencing™ policies to restrict access to other applications, files, the internet, and the registry.

Your users now have a new application on their device with minimal disruption to their project. They feel empowered and in control, and you didn’t have to do anything to maintain your secure Zero Trust environment.

ThreatLocker User Store Screenshot

FREQUENTLY ASKED QUESTIONS

How will users access the ThreatLocker User Store?

When users try to run an application that is not permitted, the blocked item popup they receive will also show the option to View Available Applications if there are similar applications published in the User Store.

The ThreatLocker tray will also hold a View Available Applications option that will bring the user to the User Store.

What software can be included in the ThreatLocker User Store?

Any built-in applications and custom applications that you have created in ThreatLocker can be included in the User Store.

Will I be able to control which computers/departments have access to install different software?

Yes.  Policies in the User Store can be set for the Entire Organization, any group, or individual computers. Once policies are published, the items will only display for the specified computers.

How will license compliance be managed for software installed from the ThreatLocker User Store?

In the User Store, policies can be set to restrict and count the number of installs. You can insert a license key if it is needed for the installation. Each computer that downloads the application will reduce the license count by 1, and when there are no more licenses available, the application will no longer be accessible to end users.

The User Store is specifically for your organization, and no outside organizations have access to your User Store.

Will users still be able to request software that is not included in the ThreatLocker User Store?

Yes. Users will still be able to Request Access when software is blocked.

Do I have to create permit policies for software that is listed in the ThreatLocker User Store?

No. The ThreatLocker User Store will create computer-level policies on the fly at the time an end user installs software from the Store.

Will the ThreatLocker User Store include a process to handle applications that require admin permissions to be installed?

Yes. When setting up User Store policies, you can apply temporary Elevation on applications that require it. Once the Elevation expires, the application will run with standard user permissions, making it convenient to allow the Elevated permissions for installation while enforcing the application to run under the standard user context.

THREATLOCKER USER STORE BENEFITS

allowlisting clipboard

Reduce your organization's risks of shadow IT.

Quickly offer safe app alternatives protected by Allowlisting and Ringfencing™. This way, you reduce the risk of unsafe alternatives.

Firewall illustration

Improve user experience. Reduce your workload.

Users gain swift access to the apps they need. And you don’t need to put in ongoing extra effort to make it happen.

illustration of hourglass window

Maintain a strong cybersecurity posture.

Permit access to applications for a specified amount of time. Automatically block the application after the policy has expired.

SEE WHAT CUSTOMERS SAY

TAKE CONTROL OF YOUR ORGANIZATION'S SECURITY

Request your 30-day trial to the entire ThreatLocker platform today.

Try ThreatLocker