How to use ThreatLocker Suggested Policies?

How to use ThreatLocker Suggested Policies? This document outlines the step-by-step process of how to use ThreatLocker suggested policies. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction ThreatLocker automatically generates Suggested Policies based on observed behavior during learning mode. These policies help administrators […]

How to use ThreatLocker Suggested Policies? Read Post »

How to apply policies by device group?

How to apply policies by device group? This document outlines the step-by-step process of how to apply policies by device group in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction In ThreatLocker, policies can be applied not just globally, but also

How to apply policies by device group? Read Post »

How to Manage Scheduled Policy Activations in ThreatLocker?

How to Manage Scheduled Policy Activations in ThreatLocker? This document outlines the step-by-step process of how to manage scheduled policy activations in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction In some scenarios, security policies need to be active only during

How to Manage Scheduled Policy Activations in ThreatLocker? Read Post »

How to create an elevation policy?

How to create an elevation policy? This document outlines the step-by-step process of how to create an elevation policy in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction What is an Elevation Policy? An Elevation Policy in ThreatLocker allows users to

How to create an elevation policy? Read Post »

How to Modify Application Allow/Deny Policies in ThreatLocker?

How to Modify Application Allow/Deny Policies in ThreatLocker? This document outlines the step-by-step process of how to modify allow/deny policies in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction In ThreatLocker, Application Control Policies determine which applications are permitted or blocked

How to Modify Application Allow/Deny Policies in ThreatLocker? Read Post »

How to use ringfencing for applications?

How to use ringfencing for applications? This document outlines the step-by-step process of how to use ringfencing for applications in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction Ringfencing is a powerful feature in ThreatLocker that allows administrators to control how

How to use ringfencing for applications? Read Post »

How to allow software by path?

How to allow software by path? This document outlines the step-by-step process of how to create a allow a software by path in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction ThreatLocker lets administrators allow applications based on various conditions, including

How to allow software by path? Read Post »

How to deny software based on Publisher?

How to deny software based on Publisher? This document outlines the step-by-step process of how to deny software based on publisher in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction ThreatLocker’s Application Control module allows administrators to block or allow software

How to deny software based on Publisher? Read Post »

How to whitelist an executable file?

How to whitelist an executable file? This document outlines the step-by-step process of how to whitelist and executable file in ThreatLocker Dashboard. This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control). Introduction The Application Control module in ThreatLocker is designed to block all unknown or

How to whitelist an executable file? Read Post »

Scroll to Top