Log in to the ThreatLocker Portal.
Navigate to the Network Control section and select Network Control Policies.

Select the 'New Policy' button in the top left corner.

The Create Secure Network Policy window will open, where you can select which type of policy to create.

Select 'Custom Firewall Policy' to create a host-based firewall policy to permit or deny traffic on specified ports or protocols to or from devices on your network.
The Custom Firewall Policy wizard will open.

1. Service: The box labeled 'Service' is a type-searchable dropdown holding a list of known services, along with an option for 'Custom' if you are creating a policy for a custom service. Select the desired service that the policy will govern.
2. Ports: Once a Service is selected, the port or port range will populate in the 'Ports' box. If custom was selected as the service, then you will need to manually enter the port or port range.
3. Protocol: By default, the 'Protocol' will be TCP/UDP. This can be changed to one or the other using the dropdown.
4. Route: In the Route dropdown, select the appropriate Secure Network Server.
Please Note: If UDP is selected in the protocol field and Permit access through ZTNA is also selected, a cautionary message will appear informing you of how traffic will be routed, overwriting your selected option.
5. Expiration: Select the checkbox next to 'Expiration' to set an expiration date/time for the policy. Leave unchecked to allow the policy to never expire.
6. Schedule: Select the checkbox next to 'Schedule' to set a schedule of select days and or times this policy will be active. Leave unselected to allow the policy to remain active all the time.
7. Source: The Source dropdown contains a list of all your Organizations, Computer Groups, Computers, and Mobile Devices. IPv4 and IPv6 addresses can also be inserted here. Add as many sources as desired, and they will show in the 'Source' box.
8. Destination: The Destination dropdown contains a list of all your Organizations, Computer Groups, Computers, and Mobile Devices. IPv4 and IPv6 addresses can also be inserted here. Add as many destinations as desired, and they will show in the destination box.
9. Applications: By default, 'All Applications' will be selected. If you wish to limit this policy to specific local applications, find and select the desired application or applications in the type-searchable dropdown.
10. Users and Groups: By default, 'Everyone' is selected. If you wish to scope access to specific users/groups, input the desired local Users and Groups. Once set, only the specified Users and Groups will be permitted to initiate the connection defined in this policy.
Once all fields are configured, select the blue 'Next' button. The Secure Network Policy Summary window will open to provide an overview of your selections, with the ability to make any necessary edits.

A. Log in the Unified Audit: By default, this will be selected. Deselect if you don't want to log to the Unified Audit when this policy is matched.
B. Permit | Deny : By default, Permit is selected, but you can choose the deny icon to change this to an explicit deny policy.
When any necessary adjustments have been made, press the blue 'Create' button to add this policy to your Secure Network policy list.
Zero Trust Network Access (ZTNA) and Zero Trust Cloud Access (ZTCA) Frequently Asked Questions
Help Center