Note: This article contains directions for both the ThreatLocker Portal and the ThreatLocker Legacy Portal. If you are using the Legacy Portal, you can find the appropriate directions by scrolling down in the article.
ThreatLocker provides reports to help clients view relevant data in an easy and usable form. If a report does not currently exist which presents the desired data, or if you would like to schedule daily/weekly automated delivery of a report, please contact the Cyber Heroes.
To access these reports, navigate to the Reports page
Here you will see 2 dropdown menus: Category and Report. Report will display all available reports by default, unless first filtered using the Category dropdown.
Categories
- All – this will show you all the report options
- 3CX – this will show you applications or files that contain 3CX files or hashes
- API Reports – this will allow you to pull active licenses by organizations
- Applications – this is the location of your application reports
- Approval – this will show you your approval request report options
- Audit – this is where you access your blocked file reports and process count
- Computers – this populates a list of computer reports you can run
- Cyber Hero Management – this will provide the approvals processed by Cyber Heroes
- Log4j – this will show you applications containing old Log4j files
- Network Access Control – this will show active Network Access Control (now know as Network Control) policies
- Organizations – this will provide a list of your organizations
- Policies – this provides your policy reports
- Spring Framework – this will show you applications containing old Spring Framework files
- Storage Control – this shows deleted file reports and processes accessing a UNC report
- Storage Devices – this will give you a report of your USB Serial Numbers
- Support – this will provide a report of applications with custom rules containing two unnecessary “*” asterisk wildcards next to each other
- Users – this will populate a list of users
Report
The Report dropdown menu allows you to select the specific report you would like to generate. The name of the report typically signifies the data the report will generate.
Selecting ‘All’ as the category will show all possible reports under the Report dropdown. Selecting a specific category will narrow down the possible reports.
Once you select a report, click ‘Generate’ to populate the report. Some reports may require specific details, such as a start/end date, and fields for these will be generated if necessary.
This will populate the report below the input fields. Each column allows sorting via the up/down arrows and searching via the filter button, which will generate a popup to define granular search parameters to filter that column.
The entire report can be searched, all applied filters can be cleared, and results can be exported to .xlsx, .pdf, or .csv by clicking the corresponding button on the right-hand side of the page.
Legacy Portal
ThreatLocker has incorporated some very useful reports to help our clients consolidate needed information into an easy and useable form. To access these reports, navigate to the Reports page.
Here you will see 2 dropdown menus: Category and Report.
Category
- All – this will show you all the report options
- 3CX – this will show you applications or files that contain 3CX files or hashes
- API Reports – this will allow you to pull active licenses by organizations
- Applications – this is the location of your application reports
- Approval – this will show you your approval request report options
- Audit – this is where you access your blocked file reports and process count
- Computers – this populates a list of computer reports you can run
- Cyber Hero Management – this will provide the approvals processed by Cyber Heroes
- Log4j – this will show you applications containing old Log4j files
- Network Access Control – this will show active Network Access Control (now know as Network Control) policies
- Organizations – this will provide a list of your organizations
- Policies – this provides your policy reports
- Spring Framework – this will show you applications containing old Spring Framework files
- Storage Control – this shows deleted file reports and processes accessing a UNC report
- Storage Devices – this will give you a report of your USB Serial Numbers
- Support – this will provide a report of applications with custom rules containing two unnecessary “*” asterisk wildcards next to each other
- Users – this will populate a list of users
Report
The Report dropdown menu allows you to select the specific report you would like to generate. The name of the report typically signifies the data the report will generate.
Selecting ‘All’ as the category will show all possible reports under the Report dropdown. Selecting a specific category will narrow down the possible reports.
Once you select a report, click ‘Generate’ to populate the report.
This will populate the report within the ThreatLocker Platform. Reports can be exported to PDF or CSV by clicking the corresponding icon on the right-hand side of the page.