ThreatLocker How-to Guides

threatlocker how-to guides

1. Installation & Deployment

  • 1.1 How to install the ThreatLocker Windows agent?
  • 1.2 How to install the ThreatLocker agent on Linux?
  • 1.3 How to perform a silent installation of the ThreatLocker agent?
  • 1.4 How to deploy the agent using Group Policy (GPO)?
  • 1.5 How to deploy ThreatLocker using an RMM tool?
  • 1.6 How to uninstall the ThreatLocker agent?
  • 1.7 How to update the ThreatLocker agent?
  • 1.8 How to verify successful agent installation?
  • 1.9 How to install ThreatLocker on a remote workstation?

2. Zero Trust Policies (Application Control)

  • 2.1 How to enable application control in ThreatLocker?
  • 2.2 How to create a new application policy?
  • 2.3 How to approve a blocked application?
  • 2.4 How to block a specific application?
  • 2.5 How to create a policy for a single user?
  • 2.6 How to create a policy for a user group?
  • 2.7 How to whitelist an executable file?
  • 2.8 How to deny software based on publisher?
  • 2.9 How to allow software by path?
  • 2.10 How to use ringfencing for applications?
  • 2.11 How to modify application allow/deny policies?
  • 2.12 How to create an elevation policy?
  • 2.13 How to apply temporary application policies?
  • 2.14 How to manage scheduled policy activations?
  • 2.15 How to apply policies by device group?
Scroll to Top