How to use the ThreatLocker dashboard?

How to use the ThreatLocker dashboard? This document outlines the step-by-step process of how to use the ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction The ThreatLocker Dashboard (Health Center) provides a central overview of your organization’s security posture. It displays the […]

How to use the ThreatLocker dashboard? Read Post »

How to Set Up Alert Notifications in ThreatLocker?

How to Set Up Alert Notifications in ThreatLocker? This document outlines the step-by-step process of how to set up alert notifications in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction ThreatLocker allows administrators to configure alert notifications so they are instantly informed

How to Set Up Alert Notifications in ThreatLocker? Read Post »

How to review audit logs in ThreatLocker?

How to review audit logs in ThreatLocker? This document outlines the step-by-step process of how to review audit logs in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction The Unified Audit feature in ThreatLocker provides detailed visibility into all actions across your

How to review audit logs in ThreatLocker? Read Post »

How to export event logs in ThreatLocker?

How to export event logs in ThreatLocker? This document outlines the step-by-step process of how to export event logs in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction ThreatLocker allows you to export event logs from the Unified Audit for reporting, investigation,

How to export event logs in ThreatLocker? Read Post »

How to view blocked application attempts in ThreatLocker?

How to view blocked application attempts in ThreatLocker? This document outlines the step-by-step process of how to view blocked applications attempts in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction In ThreatLocker, the Unified Audit feature allows administrators to review all blocked

How to view blocked application attempts in ThreatLocker? Read Post »

How to manage organizations and child organizations in ThreatLocker?

How to manage organizations and child organizations in ThreatLocker? This document outlines the step-by-step process of how to manage organizations and child organizations in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 09 – User and Device Management. Introduction ThreatLocker allows administrators to manage multiple organizations, including parent and

How to manage organizations and child organizations in ThreatLocker? Read Post »

How to monitor user activity in ThreatLocker?

How to monitor user activity in ThreatLocker? This document outlines the step-by-step process of how to monitor user activity in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 09 – User and Device Management. Introduction Monitoring user activity is essential for tracking changes, access attempts, and policy-related actions within

How to monitor user activity in ThreatLocker? Read Post »

Scroll to Top