How to apply policies by device group?

This document outlines the step-by-step process of how to apply policies by device group in ThreatLocker Dashboard.

This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control).

Introduction

In ThreatLocker, policies can be applied not just globally, but also to specific groups of devices.
This allows administrators to tailor security rules based on department, function, or role, for example, applying stricter controls to servers and more flexible ones to user laptops.
This guide explains how to apply application policies to one or more Device Groups.

Implementation

Step 1: Access the Application Control Module

  1. Log in to the ThreatLocker Portal.
  2. Navigate to Modules > Application Control > Policies.
  3. Click “Create Policy,” or locate an existing policy that you want to edit.
    • In this example, we’ll modify the policy for PowerShell.
  4. Click on the policy to open the configuration panel.
Manage Scheduled Policy Activations in ThreatLocker

Step 2: Configure the “Apply To” Section

  1. 1. In the policy editor, click on the “Applied To” field to expand it and display all available devices and device groups.
apply policies by device group
  • 2. A list of available computer groups will now appear in the selection pane.
apply policies by device group
  • 3. Select the desired Computer Group (e.g., Microsoft Windows) to which you want to apply the policy.
apply policies by device group
  • 4. After selecting the appropriate group, click “Save” to apply your changes.
apply policies by device group

Step 2: Deploy to apply policies by device group

After making your changes, click the “Deploy” button to apply the updated policy to all relevant endpoints.

Manage Scheduled Policy Activations in ThreatLocker

Once deployed, the policy will appear in the list of active policies.

Conclusion

Applying application control policies by device group in ThreatLocker enables precise and scalable security management.

This method ensures that only the intended machines receive the right permissions or restrictions. It enhances both administrative control and operational clarity. By grouping devices logically (e.g., by OS, role, or department) and assigning policies accordingly, you maintain a clean and efficient Zero Trust architecture. 

Remember to review and adjust groups regularly as your environment evolves.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top