How to restrict elevated access to specific users in ThreatLocker?

How to restrict elevated access to specific users in ThreatLocker?

This document outlines the step-by-step process of how to restrict elevated access to specific users in ThreatLocker Dashboard.

This article is a part of our ThreatLocker How-to Guides series, Chapter 07 – Elevation Control (Privilege Management).

Introduction

While ThreatLocker’s Elevation Control feature enables applications to run with administrator privileges, it is equally crucial to limit elevation access to trusted users only. Doing so helps prevent unauthorized use of powerful tools such as the Command Prompt (CMD).

This guide outlines the steps to block elevated CMD access for a specific user by configuring a custom elevation control policy.

Implementation

Step 1: Access the Application Control Module

  1. Log in to the ThreatLocker Portal.
  2. Navigate to Modules > Application Control
  3. Click Create Policy
How to restrict elevated access to specific users in ThreatLocker?

Step 2: Create the Elevation Policy

  1. Fill the policy form:
  • In the Details section:
    • Name: Elevation Control – CMD
    • Description: Block running CMD as administrator for Sofiane
How to restrict elevated access to specific users in ThreatLocker?
  • In the Applied To section:
    • Select the target computer or computer group where the policy should apply
    • Choose Selected Users and Groups
      • Add the specific user (e.g., sofiane)
How to restrict elevated access to specific users in ThreatLocker?
  • In the Condition section:
    • Select the application: Command Prompt (CMD)
    • Choose All Interfaces
    • Select “No Policy Expiration” to ensure the rule remains active indefinitely.
  • In the Action section:
    • Enable “Assist with programs that require local administrator privileges”
      • Enable “Force the program to run as a standard user”

2. Once all fields are completed, click ‘Create’ to save and activate the policy.

How to restrict elevated access to specific users in ThreatLocker?

Step 3: Deploy the Policy to restrict elevated access to specific users in ThreatLocker

Deploy the policy from the policy list to enforce it on the target devices

Conclusion

By restricting elevation based on specific users, you reduce the risk of privilege misuse while maintaining flexibility for authorized personnel.ThreatLocker’s fine-grained controls allow you to enforce Zero Trust principles by ensuring only the right people have the right access at the right time.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top