General

Preventing the Exploitation of 3CX Preventing the Exploitation of CVE-2023-23397Microsoft Peer-to-Peer UpdatesThreatLocker Endpoint Security Quality GuaranteeEaglesoft and ThreatLocker Computers Not Checking InPreventing the Exploitation of CVE-2022-30190 (Follina)Applying Policies to Users or Active Directory GroupsBlocking and Permitting USB DrivesChanges to Adobe 6/8/2021 Computer failing to updateCreate a Computer Group that does not learnCreating a New AdministratorDefault Computer Group PoliciesDeploying PoliciesDiagnosing an Application with an issueEmail Parsing Rules in ConnectWise ManageEvent Log Error KeyExcluded ProcessesGetting your Unique Identifier from ThreatLockerHermetic Wiper: ThreatLocker Recommended PolicyLog4J VulnerabilityManaging Application DefinitionsManaging Application PoliciesMerging Application DefinitionsNotifications for RequestsPermitting All Signed Files in a DirectoryPermitting Blocked FilesPermitting Software from the Approval CenterPermitting Software From the Computers PagePreventing BCDEdit From Being WeaponizedPreventing Bitlocker from being WeaponizedResponse to Reports of Webroot Compromised FileRestarting the ThreatLocker AgentSetting the ThreatLocker Agent Update Channel Setting Up SMS Alerts for ThreatLocker RequestsSetting up the Active Directory Sync ServiceThreatLocker Application Control Agent Data CollectionThreatLocker Override CodesThreatLocker Popup is not happening when something is blockedThreatLocker Portal Performance ThreatLocker Stub InstallerTrusting an Application by a CertificateUninstalling the ThreatLocker AgentUpdating the ThreatLocker Version on a Single ComputerUpdating ThreatLocker to the Latest VersionUser Permissions Using Learning Mode to Track Installed Files from an RMM or Software Deployment ToolUsing the Console App to Verify the ThreatLocker MAC Agent is RunningUsing the ThreatLocker Unified AuditUsing ThreatLocker to Mitigate CVE-2021-40444Why is an application that matches a built-in application being blocked?Windows 11 Upgrade and ThreatLocker ThreatLocker Security and PrivacyTrial ExpiryThe ThreatLocker Testing EnvironmentAllowing ThreatLockerService to Retrieve your AD GroupsCustomer Deal RegistrationThreatLocker Mitigation and GoAnywhereMFT Zero-Day ExploitPreventing the Exploitation of CVE-2023-2033Rubber Ducky Data Exfiltration | Google BucketPreventing the Exploitation of MOVEit Vulnerability (CVE-2023-34362)Changes to Elevation in ThreatLocker Version 8.2Browser Extensions Affecting the ThreatLocker Testing EnvironmentRetrieving Your Computer IDThreatLocker Agent TrayProtecting Fileservers While Allowing Remote Machines to Access Shared Files Browser Extensions Affecting ThreatLocker Portal PerformanceHow to Use .NET Regex Within ThreatLockerSSL InspectionWindows Built-InsThreatLocker Health Center and Health ReportPortal 2.0.1 Maintenance Mode Permission ChangesGuide to the TLProxyTester ApplicationConfiguring Defender Virus & Protection Settings using Configuration ManagerControlling Access to M365 Resources Using Conditional Access and Named Locations