ThreatLocker Administration Guide

Why Threat Detection Isn't Enough

One of the biggest challenges IT Professionals face today is establishing the right security foundation for their organization.

Read more

Visibility and Control at the Application Layer

In the past, the axiom, “humans are the weakest link,” was the battle cry of many cyber security professionals. Users, that is, non-security employees, ...

Read more

How Insider Threats Pose A Major Security Risk

Historically, data breaches that make the news are typically carried out by outside attacks, however; the frequency and cost of insider-related cyber ...

Read more

Maze Ransomware Attacks Are Increasing

A new strain of ransomware known as Maze is disrupting organizations around the world.

Maze occurs when a cybercriminal steals data before encrypting ...

Read more

How to Protect Remote Workers From Cyber Threats

Over the last month, we have observed a major shift in the way businesses and organizations communicate internally. As millions of new users are introduced ...

Read more

Beware of Federal Stimulus Package Scams

The FBI has issued a public service announcement warning citizens to be wary of email and malware scams that continue to circulate in tandem with ...

Read more

How Safe is Zoom?

Earlier this week, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is currently one of the leading video conferencing ...

Read more

The Hidden Dangers of Chrome Extensions

While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what ...

Read more

Hardening Windows 7 after January 14th, 2020

The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to ...

Read more

Deploy ThreatLocker using Group Policy

ThreatLocker MSI download
Download ThreatLocker MSI from https://portal.threatlocker.com

Login using your administrator details and create/select ...

Read more

ThreatLocker® User Guide

ThreatLocker® User Guide

What is ThreatLocker®
ThreatLocker® gives your I.T. department control over what software can run, and storage devices can ...

Read more

ThreatLocker User Guide for Administrators

ThreatLocker User Guide for Administrators

About ThreatLocker
ThreatLocker® puts your business ahead in the fight against malware and exploits by combining ...

Read more

ThreatLocker® Storage Policy Approval

ThreatLocker® Storage Policy Approval

Request and Permitting Access to a Storage Device from the ThreatLocker Tray
To request permissions, a policy ...

Read more

ThreatLocker® Storage Control Storage Devices

ThreatLocker® Storage Control Storage Devices

How to add a storage device?
There are multiple ways of adding a storage device.
Add a storage device ...

Read more

ThreatLocker® Storage Control Audit

ThreatLocker® Storage Control Audit

What is Storage Control Audit?
It does not matter what the storage device, ThreatLocker® keeps a full audit ...

Read more

Storage Control Guide

Storage Control Guide

What is ThreatLocker® Storage Control?
ThreatLocker® takes storage control beyond just blocking USB hard drives and gives ...

Read more

Dual factor authentication with DUO

Dual factor authentication with DUO

DUAL FACTOR AUTHENTICATION WITH DUO
ThreatLocker can be integrated with dual factor authentication from DUO. To ...

Read more

Organizations

Organizations
With ThreatLocker, when receiving the administrator credentials, your organization is already created. If you have subdivisions within ...

Read more