How to monitor user activity in ThreatLocker?

This document outlines the step-by-step process of how to monitor user activity in ThreatLocker Dashboard.

This article is a part of our ThreatLocker How-to Guides series, Chapter 09 – User and Device Management.

Introduction

Monitoring user activity is essential for tracking changes, access attempts, and policy-related actions within the ThreatLocker environment. The User Audit feature allows administrators to review detailed logs of user actions, including logins, policy changes, and other interactions.

Implementation

Step 1: Access the Computer Management Section

  1. Log in to the ThreatLocker Portal.
  2. Navigate to Users > Audits
monitor user activity in threatlocker

Step 2: Monitor User Actions

  1. In the Audit Users section, use the available filters to narrow down the results:
  • Date Range: Set the Start and End Date
  • Username: Filter actions by a specific user
  • IP Address: Track actions from a specific IP
  • Details: Search for keywords related to the action
  • Action: Select types of activity to monitor (e.g., Create, Delete, Logon, Modify, Read)
  1. Once filters are configured, click Search to display the activity logs.
  • You will see entries with details such as:
    • Username
    • Organization
    • IP Address
    • Date/Time of the event
    • Action Type
    • Additional details
monitor user activity in threatlocker

Conclusion

The User Audit section provides a clear view of user-related events in your organization. By using filters effectively, you can monitor access attempts, configuration changes, and policy actions to maintain compliance and security visibility.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top