Long Arrow Right External Link angle-right Search Times Spinner angle-left

Deploying ThreatLocker with Continuum RMM

View in browser

  • Log into the Continuum Portal.
  • Navigate to 'Devices' > 'Computers' on the sidebar menu.
undefined
  • Select the desired organization you are looking to deploy to.
undefined
  • Select Run.
undefined
  • Select Command Prompt (CMD) Script from the drop-down menu.
undefined
  • Select the desired device(s) > Continue to Setup.
undefined

At the top of the script, you will see:

'Set "Identifier=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"

  • Replace the X's with your own Unique Identifier.

How to find your Unique Identifier:

The Key is provided to you by ThreatLocker and can be found by navigating to the Computers page, and selecting the 'Install New Computer' button. The Unique Identifier is the key required.

undefined

Note: Replace only the first set of X's in the script.

undefined
  • Select Save As Custom Task (Optional) for convenience.
undefined
  • In the following window, name the task and fill in the category as desired.
undefined
  • Select Save.
undefined

 You will receive confirmation: 

undefined

This task will now be saved for use later on.

  • Select Continue to Scheduling to push it out onto your machine(s).
undefined
  • Select if you would like to Run now, Run later, Run recurringly, or Run on trigger.
undefined
  • Select Run Task
undefined

Running this deployment script pulls the name from Continuum. If there is a match to an identifier in ThreatLocker, it will install the machine into that organization. If, however, there is no match, it will create a new organization within ThreatLocker under the parent account. Also, note that servers and workstations will be placed into their corresponding group.