ThreatLocker Administration Guide

Deploy ThreatLocker using Group Policy

ThreatLocker MSI download
Download ThreatLocker MSI from https://portal.threatlocker.com

Login using your administrator details and create/select ...

Read more

ThreatLocker® User Guide

ThreatLocker® User Guide

What is ThreatLocker®
ThreatLocker® gives your I.T. department control over what software can run, and storage devices can ...

Read more

ThreatLocker User Guide for Administrators

ThreatLocker User Guide for Administrators

About ThreatLocker
ThreatLocker® puts your business ahead in the fight against malware and exploits by combining ...

Read more

ThreatLocker® Storage Policy Approval

ThreatLocker® Storage Policy Approval

Request and Permitting Access to a Storage Device from the ThreatLocker Tray
To request permissions, a policy ...

Read more

ThreatLocker® Storage Control Storage Devices

ThreatLocker® Storage Control Storage Devices

How to add a storage device?
There are multiple ways of adding a storage device.
Add a storage device ...

Read more

ThreatLocker® Storage Control Audit

ThreatLocker® Storage Control Audit

What is Storage Control Audit?
It does not matter what the storage device, ThreatLocker® keeps a full audit ...

Read more

Storage Control Guide

Storage Control Guide

What is ThreatLocker® Storage Control?
ThreatLocker® takes storage control beyond just blocking USB hard drives and gives ...

Read more

Dual factor authentication with DUO

Dual factor authentication with DUO

DUAL FACTOR AUTHENTICATION WITH DUO
ThreatLocker can be integrated with dual factor authentication from DUO. To ...

Read more

Organizations

Organizations
With ThreatLocker, when receiving the administrator credentials, your organization is already created. If you have subdivisions within ...

Read more

Administrators

Administrators
Each organization defined inside ThreatLocker portal has at least one administrator. ThreatLocker offers the possibility to manage all ...

Read more

Computer Groups

Computer Groups
Before installing ThreatLocker to the organizations’ computers, you’ll have to define Computer Groups. A Computer Group is used to ...

Read more

Manage Computers

Manage Computers
ThreatLocker gives you the ability to manage organization computers.
How to edit a Computer?
To edit a computer:

Select a computer ...

Read more

Working with Computer Baseline

Working with Computer Baseline
Computer Baseline is what is installed on a computer when ThreatLocker agent is installed. You don’t need to manually ...

Read more

Computers

Computers
ThreatLocker offers the ability to manage all organization computers in one place, the ThreatLocker portal (https://portal.threatlocker.com).
Once ...

Read more

Splunk Integration

Splunk Integration
ThreatLocker offers the ability to send Application Control (Whitelisting), and Storage Control policy audit information to your Splunk ...

Read more

Using the ThreatLocker Audit

Using the ThreatLocker Audit
Every time an application or library is opened on a computer that is running ThreatLocker, an entry is logged into the ThreatLocker ...

Read more

Managing Applications

Managing Applications
Applications are lists of files, hashes, certificates or paths that are used to create policies. Applications are normally created ...

Read more

Application Control Policies

Application Control Policies
ThreatLocker® application control policies offer granular control of what applications can run in your environment. Unlike ...

Read more