How to use ThreatLocker API?

How to use ThreatLocker API? This document outlines the step-by-step process of how to use ThreatLocker API. This article is a part of our ThreatLocker How-to Guides series, Chapter 12 – Integration & Third-party Tools. Introduction The ThreatLocker API allows you to programmatically interact with your ThreatLocker environment. This can be used for automation, integration

How to use ThreatLocker API? Read Post »

How to integrate ThreatLocker with Microsoft 365?

How to integrate ThreatLocker with Microsoft 365? This document outlines the step-by-step process of how to integrate ThreatLocker with Microsoft 365. This article is a part of our ThreatLocker How-to Guides series, Chapter 12 – Integration & Third-party Tools. Introduction Integrating ThreatLocker with Microsoft 365 allows you to sync and manage users, groups, and directory

How to integrate ThreatLocker with Microsoft 365? Read Post »

How to whitelist unknown publishers in ThreatLocker?

How to whitelist unknown publishers in ThreatLocker? This document outlines the step-by-step process of how to whitelist unknown publishers in ThreatLocker. This article is a part of our ThreatLocker How-to Guides series, Chapter 11 – Maintenance and Troubleshooting. Introduction Whitelisting an application from an unknown publisher allows it to run in your environment while maintaining

How to whitelist unknown publishers in ThreatLocker? Read Post »

How to escalate a technical issue to ThreatLocker?

How to escalate a technical issue to ThreatLocker? This document outlines the step-by-step process of how to escalate a technical issue in ThreatLocker. This article is a part of our ThreatLocker How-to Guides series, Chapter 11 – Maintenance and Troubleshooting. Introduction If a technical problem cannot be resolved, it may be escalated to ThreatLocker’s support

How to escalate a technical issue to ThreatLocker? Read Post »

Scroll to Top