How to restrict read/write access to external drives in ThreatLocker?

How to restrict read/write access to external drives in ThreatLocker? This document outlines the step-by-step process of how to restrict read/write access to external drives in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 05 – Storage Control. Introduction External drives such as USB sticks and portable HDDs pose […]

How to restrict read/write access to external drives in ThreatLocker? Read Post »

How to Monitor File Copy Activity in ThreatLocker?

How to Monitor File Copy Activity in ThreatLocker? This document outlines the step-by-step process of how to monitor file copy activity in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 05 – Storage Control. Introduction Monitoring file copy activity is crucial for detecting data exfiltration, unauthorized transfers, and ensuring

How to Monitor File Copy Activity in ThreatLocker? Read Post »

How to enforce encryption on removable storage in threatLocker?

How to enforce encryption on removable storage in threatLocker? This document outlines the step-by-step process of how to enforce encryption on removable storage in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 05 – Storage Control. Introduction Allowing only encrypted USB devices is a powerful way to reduce the

How to enforce encryption on removable storage in threatLocker? Read Post »

How to Log USB Device Activity in ThreatLocker?

How to Log USB Device Activity in ThreatLocker? This document outlines the step-by-step process of how to log USB device activity in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 05 – Storage Control. Introduction Monitoring USB activity is essential for auditing, incident response, and compliance.Using ThreatLocker’s Unified Audit

How to Log USB Device Activity in ThreatLocker? Read Post »

How to create storage policies for specific users in ThreatLocker?

How to create storage policies for specific users? This document outlines the step-by-step process of how to create storage policies for specific users in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 05 – Storage Control. Introduction Sometimes, it’s necessary to apply storage control rules to a specific user

How to create storage policies for specific users in ThreatLocker? Read Post »

How to block access to external hard drives in ThreatLocker?

How to block access to external hard drives in ThreatLocker? This document outlines the step-by-step process of how to block access to external hard drives in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 05 – Storage Control. Introduction External hard drives and removable media can introduce serious security

How to block access to external hard drives in ThreatLocker? Read Post »

How to whitelist USB devices by serial number in ThreatLocker?

How to whitelist USB devices by serial number in ThreatLocker? This document outlines the step-by-step process to whitelist USB devices by Serial Number in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 05 – Storage Control. Introduction USB storage devices present a significant risk to endpoint security, from data

How to whitelist USB devices by serial number in ThreatLocker? Read Post »

Scroll to Top