How to manage organizations and child organizations in ThreatLocker?

How to manage organizations and child organizations in ThreatLocker? This document outlines the step-by-step process of how to manage organizations and child organizations in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 09 – User and Device Management. Introduction ThreatLocker allows administrators to manage multiple organizations, including parent and […]

How to manage organizations and child organizations in ThreatLocker? Read Post »

How to monitor user activity in ThreatLocker?

How to monitor user activity in ThreatLocker? This document outlines the step-by-step process of how to monitor user activity in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 09 – User and Device Management. Introduction Monitoring user activity is essential for tracking changes, access attempts, and policy-related actions within

How to monitor user activity in ThreatLocker? Read Post »

How to rename devices in ThreatLocker?

How to rename devices in ThreatLocker? This document outlines the step-by-step process of how to rename devices in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 09 – User and Device Management. Introduction Renaming devices in ThreatLocker helps maintain clarity and consistency in your inventory. Assigning meaningful names makes

How to rename devices in ThreatLocker? Read Post »

How to create User Role in ThreatLocker?

How to create User Role in ThreatLocker? This document outlines the step-by-step process of how to create user role in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 09 – User and Device Management. Introduction Creating custom user roles in ThreatLocker allows you to define specific permissions for different

How to create User Role in ThreatLocker? Read Post »

Scroll to Top