How to prevent lateral movement via network control in ThreatLocker?

This document outlines the step-by-step process of how to prevent lateral movement via network control in ThreatLocker Dashboard.

This article is a part of our ThreatLocker How-to Guides series, Chapter 06 – Network Control & Ringfencing.

Introduction

Lateral movement occurs when attackers gain access to one endpoint and attempt to move across the network to other systems. Blocking such movement is essential to contain attacks and safeguard critical resources.

With ThreatLocker Network Control, you can create policies that restrict access to sensitive ports and services commonly used for lateral movement, such as SMB, SSH, and Telnet.

This guide explains how to configure a network control policy to stop lateral movement across your infrastructure.

Implementation

Step 1: Access the Network Control Module

  1. Log in to the ThreatLocker Portal.
  2. Navigate to Modules > Network Control
  3. Click Create Policy
Prevent Lateral Movement via Network Control in ThreatLocker

Step 2: Create the Network Control Policy

  1. Fill the policy form
  • In the Details section
    • Name: Block Lateral Movement
    • Description: Prevent access to ports commonly used for internal lateral movement
  • In the Applied To section
    • Select the target computer or computer group where this policy will be applied
Prevent Lateral Movement via Network Control in ThreatLocker
  • In the Direction section
    • Choose Inbound to block incoming access to specific ports.

2. In the source section:

  • Select All to cover all potential originating devices
Prevent Lateral Movement via Network Control in ThreatLocker
  • In the Destination section
  • Select All
  • In the Port field, select “Selected” and specify the following ports:
    • 139 (SMB)
    • 445 (SMB)
    • 22 (SSH/SCP/SFTP)
    • 23 (Telnet)
  • Set Protocol to TCP
Prevent Lateral Movement via Network Control in ThreatLocker
  • In the Condition section
    • Select No Policy Expiration to ensure the rule remains active indefinitely
  • In the Action section
    • Select Deny to block all matching traffic

Once all fields are configured, click Create to save the policy

Prevent Lateral Movement via Network Control in ThreatLocker

Step 3: Deploy the policy to prevent lateral movement via network control in ThreatLocker

Then click Deploy to enforce the policy across the selected devices

Conclusion

By blocking internal network ports such as SMB, SSH, and Telnet using ThreatLocker Network Control, you significantly reduce the risk of lateral movement across your organization.

This approach helps contain threats, limits attacker mobility, and reinforces your Zero Trust strategy by controlling communication at the network level.

ThreatLocker makes it easier to define and enforce policies that stop lateral spread before it becomes a serious incident.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top