How to Modify Application Allow/Deny Policies in ThreatLocker?

How to Modify Application Allow/Deny Policies in ThreatLocker? This document outlines the step-by-step process of how to modify allow/deny policies in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction In ThreatLocker, Application Control Policies determine which applications are permitted or blocked […]

How to Modify Application Allow/Deny Policies in ThreatLocker? Read Post »

How to use ringfencing for applications?

How to use ringfencing for applications? This document outlines the step-by-step process of how to use ringfencing for applications in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction Ringfencing is a powerful feature in ThreatLocker that allows administrators to control how

How to use ringfencing for applications? Read Post »

How to allow software by path?

How to allow software by path? This document outlines the step-by-step process of how to create a allow a software by path in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction ThreatLocker lets administrators allow applications based on various conditions, including

How to allow software by path? Read Post »

How to deny software based on Publisher?

How to deny software based on Publisher? This document outlines the step-by-step process of how to deny software based on publisher in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction ThreatLocker’s Application Control module allows administrators to block or allow software

How to deny software based on Publisher? Read Post »

How to whitelist an executable file?

How to whitelist an executable file? This document outlines the step-by-step process of how to whitelist and executable file in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction The Application Control module in ThreatLocker is designed to block all unknown or

How to whitelist an executable file? Read Post »

How to create a policy for a user group?

How to create a policy for a user group? This document outlines the step-by-step process of how to create a policy for a user group in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction ThreatLocker enables administrators to enforce granular security

How to create a policy for a user group? Read Post »

How to block a specific application in ThreatLocker?

How to block a specific application in ThreatLocker? This document outlines the step-by-step process of how to block a specific application in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction With ThreatLocker’s Application Control module, administrators can block specific applications on

How to block a specific application in ThreatLocker? Read Post »

How to approve a blocked application in ThreatLocker?

How to approve a blocked application in ThreatLocker? This document outlines the step-by-step process of how to approve a blocked application in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction ThreatLocker provides an End User Request feature that allows users to

How to approve a blocked application in ThreatLocker? Read Post »

How to enable application control in ThreatLocker?

How to enable application control in ThreatLocker? This document outlines the step-by-step process of how to enable Application Control in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction Application Control in ThreatLocker allows you to define exactly which applications can or

How to enable application control in ThreatLocker? Read Post »

Scroll to Top