Deploying ThreatLocker

2 min. readlast update: 12.13.2024

Overview

ThreatLocker is cloud-based but requires a local agent to be installed on your endpoints. The ThreatLocker agent runs at the kernel level, allowing it to stop threats such as WannaCry, malware, or malicious software pushed out through your RMM.

For minimum system requirements, please see ThreatLocker Supported OS Builds | ThreatLocker Help Center (kb.help) 
Note: For organizations deploying to a large amount of endpoints, ThreatLocker recommends using a staggered deployment approach. Organizations that deploy to a large number of endpoints at once may experience increased bandwidth usage as Windows or macOS Core and application definitions are downloaded to each endpoint. QOS can be used to limit bandwidth to corecdn.threatlocker.com and apps.threatlocker.com on Windows computers, and macapps.threatlocker.com on macOS computers.

The 'Install Computer' Button

After you have verified that your organization and computer group settings are configured as desired, select the 'Install Computer' Button to begin the deployment process.

 

The 'Download Installer' popup will appear. 

undefined

 

First, use the initial dropdown menu to select your method of deployment. Your selection here will affect the rest of the options/selections in the popup.

Manual Deployment

Selecting 'Manual Deployment' will allow you to choose the desired Computer Group and installation file.

ThreatLocker recommends using the Stub Installer when doing a manual installation.  

Stub installers will always download the latest installer with the most current stable version of the ThreatLocker Agent. It also includes the Health Service that will repair or restart the ThreatLocker Service, if necessary.  

RMM Deployment

Selecting your RMM from the initial dropdown menu in the 'Download Installer' popup will allow you to download the script you need to run and provide a link to the associated step-by-step directions posted on our KnowledgeBase.

For more information about deployment, please see our ThreatLocker University Course, Deploying the ThreatLocker Agent, or visit the Deployment Center section of our KnowledgeBase, Deployment | ThreatLocker Help Center (kb.help).

 

Was this article helpful?