How to end the learning mode manually?

How to end the learning mode manually? This document outlines the step-by-step process of how to end the learning mode manually in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 04 – Learning and Training Mode. Introduction ThreatLocker’s Learning Mode (Training Mode) is designed to observe application behavior on […]

How to end the learning mode manually? Read Post »

How to use ThreatLocker Suggested Policies?

How to use ThreatLocker Suggested Policies? This document outlines the step-by-step process of how to use ThreatLocker suggested policies. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction ThreatLocker automatically generates Suggested Policies based on observed behavior during learning mode. These policies help administrators

How to use ThreatLocker Suggested Policies? Read Post »

How to apply policies by device group?

How to apply policies by device group? This document outlines the step-by-step process of how to apply policies by device group in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction In ThreatLocker, policies can be applied not just globally, but also

How to apply policies by device group? Read Post »

How to Manage Scheduled Policy Activations in ThreatLocker?

How to Manage Scheduled Policy Activations in ThreatLocker? This document outlines the step-by-step process of how to manage scheduled policy activations in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction In some scenarios, security policies need to be active only during

How to Manage Scheduled Policy Activations in ThreatLocker? Read Post »

How to create an elevation policy?

How to create an elevation policy? This document outlines the step-by-step process of how to create an elevation policy in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction What is an Elevation Policy? An Elevation Policy in ThreatLocker allows users to

How to create an elevation policy? Read Post »

Scroll to Top