ThreatLocker® User Guide
What is ThreatLocker®
ThreatLocker® gives your I.T. department control over what software can run, and storage devices can be used in your organization. This control reduces the risk of a cyber-breach.
If you have ThreatLocker installed on your computer, you will notice a small icon in the tray with a lock.
Application Control and Storage Control
When trying to run an unapproved application it will get blocked by ThreatLocker, you’ll receive a popup notification with the file or files which were blocked, a button to request permission and a button labeled “My Administrator is Present”.
Selecting “Request Permission” will send a request to your administrator requesting permission to the application.
Selecting “My Administrator is Present” will expand the pop-up with fields for administrators as:
- Username
- Password
- Application Name
- Permit For (choose from the computer, the group the entire organization or not to permit)
- Security Level (relaxed, moderate and/or strict)
- Enable Install Mode
- Permit Application button
- ThreatLocker Administration Guide
- Application Control > Getting Started
- Application Control > Policies
- Application Control > Applications
- Application Control > Installation Mode
- Application Control > Audit
- Splunk Integration
- Computers
- Computers > Working with Computer Baseline
- Computers > Manage Computers
- Computer Groups
- Administrators
- Organizations
- Organizations > Dual factor authentication with DUO
- Storage Control > Storage Policies
- Storage Control > Storage Audit
- Storage Control > Storage Devices
- Storage Control > Policy Approval
- ThreatLocker User Guide for Administrators
- ThreatLocker User Guide
- Integration: Solarwinds RMM Deployment
- Integration: ConnectWise Automate Deployment
- Who Does ThreatLocker Help?