ThreatLocker Administration Guide

Does Your MSP Provide Zero Trust Security?

Businesses today are actively looking for robust cybersecurity protection to keep up with the rapidly evolving cybersecurity landscape.

Many small-to-medium-sized ...

Read more

Australia Faces Wide Spread Cyber Attack

Prime Minister Scott Morrison has spoken about a major cyber attack.

The cyber attacks were widespread, covering "all levels of government" as ...

Read more

MSPs: How To Stand Out In A Crowded Marketplace

Uptime and productivity are important to your customers, and you are constantly hard at work monitoring and managing their network to prevent any issues ...

Read more

Why Threat Detection Isn't Enough

One of the biggest challenges IT Professionals face today is establishing the right security foundation for their organization.

Read more

Visibility and Control at the Application Layer

In the past, the axiom, “humans are the weakest link,” was the battle cry of many cyber security professionals. Users, that is, non-security employees, ...

Read more

How Insider Threats Pose A Major Security Risk

Historically, data breaches that make the news are typically carried out by outside attacks, however; the frequency and cost of insider-related cyber ...

Read more

Maze Ransomware Attacks Are Increasing

A new strain of ransomware known as Maze is disrupting organizations around the world.

Maze occurs when a cybercriminal steals data before encrypting ...

Read more

How to Protect Remote Workers From Cyber Threats

Over the last month, we have observed a major shift in the way businesses and organizations communicate internally. As millions of new users are introduced ...

Read more

Beware of Federal Stimulus Package Scams

The FBI has issued a public service announcement warning citizens to be wary of email and malware scams that continue to circulate in tandem with ...

Read more

How Safe is Zoom?

Earlier this week, a new vulnerability in Zoom was discovered. If you aren’t familiar with this tool, it is currently one of the leading video conferencing ...

Read more

The Hidden Dangers of Chrome Extensions

While I.T. professionals fully understand the dangers of allowing users to choose what software is permitted to run, few have given any thought to what ...

Read more

Hardening Windows 7 after January 14th, 2020

The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to ...

Read more

Deploy ThreatLocker using Group Policy

ThreatLocker MSI download
Download ThreatLocker MSI from https://portal.threatlocker.com

Login using your administrator details and create/select ...

Read more

ThreatLocker® User Guide

ThreatLocker® User Guide

What is ThreatLocker®
ThreatLocker® gives your I.T. department control over what software can run, and storage devices can ...

Read more

ThreatLocker User Guide for Administrators

ThreatLocker User Guide for Administrators

About ThreatLocker
ThreatLocker® puts your business ahead in the fight against malware and exploits by combining ...

Read more

ThreatLocker® Storage Policy Approval

ThreatLocker® Storage Policy Approval

Request and Permitting Access to a Storage Device from the ThreatLocker Tray
To request permissions, a policy ...

Read more