Skip to content
ThreatLocker How-to Guides
1. Installation & Deployment
- 1.1 How to install the ThreatLocker Windows agent?
- 1.2 How to install the ThreatLocker agent on Linux?
- 1.3 How to perform a silent installation of the ThreatLocker agent?
- 1.4 How to deploy the agent using Group Policy (GPO)?
- 1.5 How to deploy ThreatLocker using an RMM tool?
- 1.6 How to uninstall the ThreatLocker agent?
- 1.7 How to update the ThreatLocker agent?
- 1.8 How to verify successful agent installation?
- 1.9 How to install ThreatLocker on a remote workstation?
-
2. Zero Trust Policies (Application Control)
- 2.1 How to enable application control in ThreatLocker?
- 2.2 How to create a new application policy?
- 2.3 How to approve a blocked application?
- 2.4 How to block a specific application?
- 2.5 How to create a policy for a single user?
- 2.6 How to create a policy for a user group?
- 2.7 How to whitelist an executable file?
- 2.8 How to deny software based on publisher?
- 2.9 How to allow software by path?
- 2.10 How to use ringfencing for applications?
- 2.11 How to modify application allow/deny policies?
- 2.12 How to create an elevation policy?
- 2.13 How to apply temporary application policies?
- 2.14 How to manage scheduled policy activations?
- 2.15 How to apply policies by device group?
-