How to use ThreatLocker Suggested Policies?

This document outlines the step-by-step process of how to use ThreatLocker suggested policies.

This article is a part of our ThreatLocker How-to Guides series, Chapter 03 – Zero Trust Policies (Application Control).

Introduction

ThreatLocker automatically generates Suggested Policies based on observed behavior during learning mode.

These policies help administrators quickly approve commonly used applications without manually building rules from scratch.

Using suggested policies improves efficiency, especially during initial deployment or onboarding of new devices.

Implementation

Step 1: Access the Application Control Module

  1. Log in to the ThreatLocker Portal.
  2. Navigate to: Modules > Application Control > Policies > Policy Management > ThreatLocker Suggested Policies
ThreatLocker Suggested Policies

Step 2: Suggested Policies Window

In the ThreatLocker Suggested Policies window, you’ll see a list of predefined policy recommendations. You can use the search bar or apply filters to narrow down the list, such as:

  1. Microsoft Recommended
  2. New Group Templates
  3. Ninite Bundles
  4. Recommended Policies for Meeting Applications
  5. Reference Templates

Click on any template to view the individual suggested policies it contains.

ThreatLocker Suggested Policies

Step 3: Apply a Suggested Policy

Once you’ve located the desired policy:

  1. Select the policy from the list
  2. In the upper-left corner, locate the Copy Policies section
  3. Select the target computer or device group where you want to apply the policy

Click “Add Suggested Policy” to apply it.

ThreatLocker Suggested Policies

Step 3: Deploy a Suggested Policy

The policy will be added and automatically deployed to the selected target devices.

ThreatLocker Suggested Policies

Conclusion

Using Suggested Policies in ThreatLocker provides an efficient way to deploy security rules based on real-world application behavior.

This approach:

  • Accelerates the implementation of a Zero Trust model
  • Ensures consistent policy enforcement across endpoints
  • Minimizes manual configuration errors

For optimal security, it’s recommended to review each suggested policy before approval to ensure it aligns with your organization’s strategic security objectives.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top