How to view current policy status in ThreatLocker?

How to view current policy status in ThreatLocker? This document outlines the step-by-step process of how to view current policy status in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 08 – Policy Management. Introduction Monitoring the status of your policies is essential to ensure that security controls are […]

How to view current policy status in ThreatLocker? Read Post »

How to revoke elevation access in ThreatLocker?

How to revoke elevation access in ThreatLocker? This document outlines the step-by-step process of how to revoke elevation access in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction Elevation policies in ThreatLocker grant temporary administrator privileges to approved applications. However, there may

How to revoke elevation access in ThreatLocker? Read Post »

How to Request Elevation Approval as a User in ThreatLocker?

How to Request Elevation Approval as a User in ThreatLocker? This document outlines the step-by-step process of how to request elevation approval as a user in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction With ThreatLocker Elevation Control, users can request temporary

How to Request Elevation Approval as a User in ThreatLocker? Read Post »

How to create time-limited elevation policies in ThreatLocker?

How to create time-limited elevation policies in ThreatLocker? This document outlines the step-by-step process of how to create time-limited elevation policies in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction ThreatLocker Elevation Control allows administrators to grant temporary administrator privileges to approved

How to create time-limited elevation policies in ThreatLocker? Read Post »

How to deny elevation for specific processes in ThreatLocker?

How to deny elevation for specific processes in ThreatLocker? This document outlines the step-by-step process of how to deny elevation for specific processes in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction To reduce the risk of privilege abuse, you can explicitly

How to deny elevation for specific processes in ThreatLocker? Read Post »

How to log elevated activity in ThreatLocker?

How to log elevated activity in ThreatLocker? This document outlines the step-by-step process of how to log elevated activity in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction ThreatLocker allows administrators to monitor all actions that require elevated privileges. By reviewing elevation

How to log elevated activity in ThreatLocker? Read Post »

How to create elevation policies for installers in ThreatLocker?

How to create elevation policies for installers in ThreatLocker? This document outlines the step-by-step process of how to create elevation policies for installers in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction Some applications require administrator rights to install properly. Instead of

How to create elevation policies for installers in ThreatLocker? Read Post »

How to restrict elevated access to specific users in ThreatLocker?

How to restrict elevated access to specific users in ThreatLocker? This document outlines the step-by-step process of how to restrict elevated access to specific users in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction While ThreatLocker’s Elevation Control feature enables applications to

How to restrict elevated access to specific users in ThreatLocker? Read Post »

How to allow an application to run with admin rights in ThreatLocker?

How to allow an application to run with admin rights in ThreatLocker? This document outlines the step-by-step process of how to allow an application to run with admin rights in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction Some applications require administrator

How to allow an application to run with admin rights in ThreatLocker? Read Post »

How to enable elevation control in ThreatLocker?

How to enable elevation control in ThreatLocker? This document outlines the step-by-step process of how to enable elevation control in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management). Introduction What is Elevation Control? Elevation Control is a security feature in ThreatLocker that allows

How to enable elevation control in ThreatLocker? Read Post »

Scroll to Top