How to tag a policy and use it in a rule in ThreatLocker?

This document outlines the step-by-step process of how to tag a policy and use it in a rule in ThreatLocker Dashboard.

This article is a part of our ThreatLocker How-to Guides series, Chapter 08 – Policy Management.

Introduction

ThreatLocker allows you to create reusable tags (such as IP addresses or domains) that can be applied across multiple policies.

This improves efficiency and consistency, especially when managing network access control for trusted sources.

Implementation

Step 1: Create a Tag

  1. Log in to the ThreatLocker Portal.
  2. Navigate to Modules > Application Control > Tags
  3. Click New Tag to create a new one
tag a policy and use it in a rule in threatlocker

4. Fill out the Create Tag form:

  • Tag Name: e.g., Allow Trusted IPs
  • Tag Items:
    •  In the Type field, select Domain, IPv4, or IPv6

     Add the trusted value and click +

    tag a policy and use it in a rule in threatlocker

    Step 2: Create a Policy Using the Tag

    1. Navigate to Modules > Network Control
    2. Click New Policy
    tag a policy and use it in a rule in threatlocker

    3. Fill in the policy form:

      • Details Section
        • Policy Name: Allow Trusted IPs
        • Description: Allow inbound network traffic only from trusted IP addresses defined in the tag “Allow Trusted IPs”.
      • Applied To Section
        • Select the target computer or computer group
      tag a policy and use it in a rule in threatlocker
      • Direction Section
        • Choose Inbound or Outbound, depending on your need
      • Source Section
        • Choose Selected
        • Select Tag
      • Add the previously created tag: Allow Trusted IPs
      tag a policy and use it in a rule in threatlocker
      • Destination Section
        • Select All
        • Set Port to All
        • Choose the protocol: TCP/UDP
      • Condition Section
        • Select No Policy Expiration
      • Action Section
        • Select Permit

      4. When all fields are configured, click Create

      tag a policy and use it in a rule in threatlocker

      Step 3: Deploy to enforce changed to tag a policy and use it in a rule in ThreatLocker

      Click Deploy to apply the policy

      tag a policy and use it in a rule in threatlocker

      Conclusion

      Using tags in ThreatLocker makes your policies easier to manage and update, especially when controlling access from specific IPs or domains.

      By associating reusable tags with network rules, you ensure consistent enforcement while reducing manual configuration errors.

      Leave a Comment

      Your email address will not be published. Required fields are marked *

      Scroll to Top