Deploying ThreatLocker

2 min. readlast update: 09.05.2023


ThreatLocker is cloud-based but requires a local agent to be installed on your endpoints. The ThreatLocker agent runs at the kernel level, allowing it to stop threats such as WannaCry, malware, or malicious software pushed out through your RMM.

For minimum system requirements, please see ThreatLocker Supported OS Builds | ThreatLocker Help Center ( 

The 'Install Computer' Button

After you have verified that your organization and computer group settings are configured as desired, select the 'Install Computer' Button to begin the deployment process.


The 'Download Installer' popup will appear. 


First, use the initial dropdown menu to select your method of deployment. Your selection here will affect the rest of the options/selections in the popup.

Manual Deployment

Selecting 'Manual Deployment' will allow you to choose the desired Computer Group and installation file.


ThreatLocker recommends using the Stub Installer when doing a manual installation.  

Stub installers will always download the latest installer with the most current stable version of the ThreatLocker Agent. It also includes the Health Service that will repair or restart the ThreatLocker Service, if necessary.  

RMM Deployment

Selecting your RMM from the initial dropdown menu in the 'Download Installer' popup will allow you to download the script you need to run and provide a link to the associated step-by-step directions posted on our KnowledgeBase.


For more information about deployment, please see our ThreatLocker University Course, Deploying the ThreatLocker Agent, or visit the Deployment Center section of our KnowledgeBase, Deployment | ThreatLocker Help Center (

Was this article helpful?