The Applications page is where all the permitted applications in your organization will be listed. As every organization has its own appetite for risk, the Applications page provides information about potential vulnerabilities. Administrators can use this knowledge to guage the potential impact permitting applications to run can have on their security posture.
Main Grid
- The OS column holds the operating system the application is associated with.
- The Application Name column holds the name of the application, the date the application was created or a Built-In label for the ThreatLocker Built-In apps, and green labels for the different categories the application belongs in,
- The Rating column shows the rating the ThreatLocker Labs have assigned to the app.
- Risk - how much risk is associated with the application (on a scale of 1-10)
- Business- the business value of the application (on a scale of 1-10)
- Combined - using a complex algorithm, this rating weighs the risk score against the business value of the application.
- The Computers column shows the total number of computers this application applies to.
- The Policies column shows the total number of policies the application applies to. Here you can see computer-level policies, group-level policies, and organization-level policies. (Please note: Global policies will not be visible on the main page)
- The Access column shows the level of access the ThreatLocker Labs have concluded that the application can potentially have. For areas that can be protected with Ringfencing, the icon will change to having a blue shield. All policies for that application will need Ringfencing applied in the specified area before the icon will change from an exclamation to a shield. (Please see the icon legend located below)
- The Countries column displays flags for the countries of the application's origin. You can hover over the flag to view the name of the country.
Although not all risks can be mitigated using Ringfencing, it is important to have knowledge of them to accurately weigh the risk versus value.
In an abundance of caution, applications that do not have any ThreatLocker Labs research information will display all 6 icons.
Icon Legend
Application's access to interact with other applications is limited by Ringfencing. There are no policies for this application in the organization without application Ringfencing applied.
There is at least 1 policy for this application in the organization without application Ringfencing applied.
Application's access to interact with files is limited by Ringfencing. There are no policies for this application in the organization without file Ringfencing applied.
There is at least 1 policy for this application in the organization without file Ringfencing applied.
Application's access to interact with the internet is limited by Ringfencing. There are no policies for this application in the organization without internet Ringfencing applied.
There is at least 1 policy for this application in the organization without internet Ringfencing applied.
Application's access to interact with the Registry is limited by Ringfencing. There are no policies for this application in the organization without Registry Ringfencing applied.
There is at least 1 policy for this application in the organization without Registry Ringfencing applied.
Application has access to interact with web data. Currently, there is no Ringfencing protection available for web data access.
Application has access to interact with passwords. Currently, there is no Ringfencing protection available for password access.
Multi-Select Options
Selecting the checkbox next to at least 1 application will reveal the multi-select buttons. Applications can be deleted by selecting the checkbox next to at least one application and then pressing the red 'Delete' button. Please note: Applications that have a policy pointing to them can't be deleted without first deleting the associated policy.
Applications can be merged together. Select the checkbox next to an application name and then press the 'Merge Applications' button. In the popup window that populates, select the name of the application to merge the selected application into. Once confirmed, both applications' files and custom rules will be combined into the Target Application.