Computer Groups
Before installing ThreatLocker to the organizations’ computers, you’ll have to define Computer Groups. A Computer Group is used to have multiple computers sharing a group storage policy and/or a group application policy.
On the Computer Groups page, an administrator can:
- Search for computer groups;
- Manage computer groups (create, edit, delete); and
- Download ThreatLocker agent for each group.
HOW TO SEARCH FOR A COMPUTER GROUP
To search for computer groups:
- Enter the computer group name or part of the computer group name;
- Select Search or hit Enter key from the keyboard; and
- A list of all computer groups matching the search terms is displayed.
HOW TO CREATE COMPUTER GROUPS
To create Computer Groups:
- Select New Computer Group;
- Enter the Computer Group Name;
- Select automatic create policies when a new baseline is uploaded option:
- Do not automatically create policies;
- Create computer policies only; or
- Create group policies.
- Select if you want to show blocked libraries in Tray;
- Enter the Refresh Policies interval in seconds.
HOW TO EDIT A COMPUTER GROUP
To edit Computer Groups:
- Select the Computer Group from the list;
- Select the pencil icon to edit;
- Make your changes; and
- Select Save
HOW TO DELETE A COMPUTER GROUP
To delete a computer group:
- Select the Computer Group from the list;
- Select the trash icon to delete a Computer Group; or
- Select the Delete button;
- Confirm deletion; and
- The selected Computer Group is deleted.
DOWNLOADING THE THREATLOCKER CLIENT
To download the ThreatLocker client:
- Select the Computer Group from the list;
- Select the download icon;
- When the download pop-up is opened;
- Select the installer you want to download (x64 or x86); and
- The selected installer is downloaded.
- ThreatLocker Administration Guide
- Application Control > Getting Started
- Application Control > Policies
- Application Control > Applications
- Application Control > Installation Mode
- Application Control > Audit
- Splunk Integration
- Computers
- Computers > Working with Computer Baseline
- Computers > Manage Computers
- Computer Groups
- Administrators
- Organizations
- Organizations > Dual factor authentication with DUO
- Storage Control > Storage Policies
- Storage Control > Storage Audit
- Storage Control > Storage Devices
- Storage Control > Policy Approval
- ThreatLocker User Guide for Administrators
- ThreatLocker User Guide
- Integration: Solarwinds RMM Deployment
- Integration: ConnectWise Automate Deployment
- Who Does ThreatLocker Help?