How to investigate policy violations in ThreatLocker?

How to investigate policy violations in ThreatLocker? This document outlines the step-by-step process of how to investigate policy violations in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction Investigating policy violations in ThreatLocker helps identify unauthorized access attempts and determine whether additional […]

How to investigate policy violations in ThreatLocker? Read Post »

How to monitor USB device usage in ThreatLocker?

How to monitor USB device usage in ThreatLocker? This document outlines the step-by-step process of how to monitor USB device usage in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction Monitoring USB device usage is essential for maintaining security and preventing unauthorized

How to monitor USB device usage in ThreatLocker? Read Post »

How to use the ThreatLocker dashboard?

How to use the ThreatLocker dashboard? This document outlines the step-by-step process of how to use the ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction The ThreatLocker Dashboard (Health Center) provides a central overview of your organization’s security posture. It displays the

How to use the ThreatLocker dashboard? Read Post »

How to Set Up Alert Notifications in ThreatLocker?

How to Set Up Alert Notifications in ThreatLocker? This document outlines the step-by-step process of how to set up alert notifications in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction ThreatLocker allows administrators to configure alert notifications so they are instantly informed

How to Set Up Alert Notifications in ThreatLocker? Read Post »

How to review audit logs in ThreatLocker?

How to review audit logs in ThreatLocker? This document outlines the step-by-step process of how to review audit logs in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction The Unified Audit feature in ThreatLocker provides detailed visibility into all actions across your

How to review audit logs in ThreatLocker? Read Post »

How to export event logs in ThreatLocker?

How to export event logs in ThreatLocker? This document outlines the step-by-step process of how to export event logs in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction ThreatLocker allows you to export event logs from the Unified Audit for reporting, investigation,

How to export event logs in ThreatLocker? Read Post »

How to view blocked application attempts in ThreatLocker?

How to view blocked application attempts in ThreatLocker? This document outlines the step-by-step process of how to view blocked applications attempts in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 10 – Monitoring, Logs and Reports. Introduction In ThreatLocker, the Unified Audit feature allows administrators to review all blocked

How to view blocked application attempts in ThreatLocker? Read Post »

Scroll to Top