How to audit ringfencing activity in ThreatLocker?

How to audit ringfencing activity in ThreatLocker? This document outlines the step-by-step process of how to audit ringfencing activity in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction Ringfencing is a powerful feature in ThreatLocker that restricts how applications interact with files, […]

How to audit ringfencing activity in ThreatLocker? Read Post »

How to Prevent Applications from Launching Other Apps in ThreatLocker?

How to Prevent Applications from Launching Other Apps in ThreatLocker? This document outlines the step-by-step process of how to prevent applications from launching other apps in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction Some applications, such as Command Prompt (CMD), can

How to Prevent Applications from Launching Other Apps in ThreatLocker? Read Post »

How to allow internet-only access for apps in ThreatLocker?

How to allow internet-only access for apps in ThreatLocker? This document outlines the step-by-step process of how to allow internet-only access for apps in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction In some cases, you may want to allow an application

How to allow internet-only access for apps in ThreatLocker? Read Post »

How to Block Applications from Accessing File Shares in ThreatLocker?

How to Block Applications from Accessing File Shares in ThreatLocker? This document outlines the step-by-step process of how to block applications from accessing file shares in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction Some applications should not be allowed to access

How to Block Applications from Accessing File Shares in ThreatLocker? Read Post »

How to log network activity for applications in ThreatLocker?

How to log network activity for applications in ThreatLocker? This document outlines the step-by-step process of how to log network activity for applications in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction Monitoring network activity is essential for understanding how applications interact

How to log network activity for applications in ThreatLocker? Read Post »

How to prevent lateral movement via network control in ThreatLocker?

How to prevent lateral movement via network control in ThreatLocker? This document outlines the step-by-step process of how to prevent lateral movement via network control in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction Lateral movement occurs when attackers gain access to

How to prevent lateral movement via network control in ThreatLocker? Read Post »

How to ringfence Microsoft Office applications in ThreatLocker?

How to ringfence Microsoft Office applications in ThreatLocker? This document outlines the step-by-step process of how to ringfence Microsoft Office applications in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction Microsoft Office applications like Word, Excel, and PowerPoint are commonly used in

How to ringfence Microsoft Office applications in ThreatLocker? Read Post »

How to Allow Network Access for an Application in ThreatLocker?

How to Allow Network Access for an Application in ThreatLocker? This document outlines the step-by-step process of how to allow network access for an application in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction In some cases, an application previously isolated from

How to Allow Network Access for an Application in ThreatLocker? Read Post »

How to isolate an application from the network in ThreatLocker?

How to isolate an application from the network in ThreatLocker? This document outlines the step-by-step process of how to isolate an application from the network in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction Isolating an application from the network is a

How to isolate an application from the network in ThreatLocker? Read Post »

How to enable network ringfencing in ThreatLocker?

How to enable network ringfencing in ThreatLocker? This document outlines the step-by-step process of how to enable ringfencing in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing. Introduction What is Network Ringfencing? Network Ringfencing is a security technique that allows you to control

How to enable network ringfencing in ThreatLocker? Read Post »

Scroll to Top