Guide to Using the Reports Page

5 min. readlast update: 08.30.2023
Note: This article contains directions for both the ThreatLocker Portal and the ThreatLocker Legacy Portal. If you are using the Legacy Portal, you can find the appropriate directions by scrolling down in the article.

ThreatLocker provides reports to help clients view relevant data in an easy and usable form. If a report does not currently exist which presents the desired data, or if you would like to schedule daily/weekly automated delivery of a report, please contact the Cyber Heroes.  

 To access these reports, navigate to the Reports page

undefined

Here you will see 2 dropdown menus: Category and Report. Report will display all available reports by default, unless first filtered using the Category dropdown. 

Categories

  • All – this will show you all the report options
  • 3CX – this will show you applications or files that contain 3CX files or hashes
  • API Reports – this will allow you to pull active licenses by organizations
  • Applications – this is the location of your application reports
  • Approval – this will show you your approval request report options
  • Audit – this is where you access your blocked file reports and process count
  • Computers – this populates a list of computer reports you can run
  • Cyber Hero Management – this will provide the approvals processed by Cyber Heroes
  • Log4j – this will show you applications containing old Log4j files
  • Network Access Control – this will show active Network Access Control (now know as Network Control) policies
  • Organizations – this will provide a list of your organizations
  • Policies – this provides your policy reports
  • Spring Framework – this will show you applications containing old Spring Framework files
  • Storage Control – this shows deleted file reports and processes accessing a UNC report
  • Storage Devices – this will give you a report of your USB Serial Numbers
  • Support – this will provide a report of applications with custom rules containing two unnecessary “*” asterisk wildcards next to each other
  • Users – this will populate a list of users  

Report

undefined

The Report dropdown menu allows you to select the specific report you would like to generate. The name of the report typically signifies the data the report will generate.

Selecting ‘All’ as the category will show all possible reports under the Report dropdown. Selecting a specific category will narrow down the possible reports. 

Once you select a report, click ‘Generate’ to populate the report. Some reports may require specific details, such as a start/end date, and fields for these will be generated if necessary. 

undefined

This will populate the report below the input fields. Each column allows sorting via the up/down arrows and searching via the filter button, which will generate a popup to define granular search parameters to filter that column. 

undefined

The entire report can be searched, all applied filters can be cleared, and results can be exported to .xlsx, .pdf, or .csv by clicking the corresponding button on the right-hand side of the page. 

undefined

Legacy Portal

ThreatLocker has incorporated some very useful reports to help our clients consolidate needed information into an easy and useable form. To access these reports, navigate to the Reports page.

undefined

Here you will see 2 dropdown menus: Category and Report.

Category

undefined

  • All – this will show you all the report options
  • 3CX – this will show you applications or files that contain 3CX files or hashes
  • API Reports – this will allow you to pull active licenses by organizations
  • Applications – this is the location of your application reports
  • Approval – this will show you your approval request report options
  • Audit – this is where you access your blocked file reports and process count
  • Computers – this populates a list of computer reports you can run
  • Cyber Hero Management – this will provide the approvals processed by Cyber Heroes
  • Log4j – this will show you applications containing old Log4j files
  • Network Access Control – this will show active Network Access Control (now know as Network Control) policies
  • Organizations – this will provide a list of your organizations
  • Policies – this provides your policy reports
  • Spring Framework – this will show you applications containing old Spring Framework files
  • Storage Control – this shows deleted file reports and processes accessing a UNC report
  • Storage Devices – this will give you a report of your USB Serial Numbers
  • Support – this will provide a report of applications with custom rules containing two unnecessary “*” asterisk wildcards next to each other
  • Users – this will populate a list of users 

Report

undefined

The Report dropdown menu allows you to select the specific report you would like to generate. The name of the report typically signifies the data the report will generate.

Selecting ‘All’ as the category will show all possible reports under the Report dropdown. Selecting a specific category will narrow down the possible reports. 

Once you select a report, click ‘Generate’ to populate the report.

undefined

This will populate the report within the ThreatLocker Platform. Reports can be exported to PDF or CSV by clicking the corresponding icon on the right-hand side of the page.

undefined

Was this article helpful?