How to Use the Arguments File for Mac Installer Settings, Including Multiple Proxies

2 min. readlast update: 05.07.2026

If you need to override the default settings when installing the ThreatLocker Mac Agent, you can create a ThreatLockerInstallerArguments.txt file and place it in the same directory as the ThreatLockerInstaller.pkg file.

This file allows you to provide custom installer parameters, such as the install key, company name, instance, and proxy server settings.

Supported Parameters

The following parameters can be used in the ThreatLockerInstallerArguments.txt file:

InstallKey=000000000000000000000000
Key=00000000-0000-0000-0000-000000000000
Company=MyCompany
Instance=api
ProxyServers="http://192.168.0.200:8080|http://192.168.0.91:8080"

You can have one or more parameters in the ThreatLockerInstallerArguments.txt file.

InstallKey or Key

You can use either InstallKey or Key in the ThreatLockerInstallerArguments.txt file.

Only one of these values is required. You do not need to include both.

Multiple Proxy Server Configuration

To specify multiple proxy servers, use the ProxyServers parameter and separate each proxy server with a pipe character |. These proxy settings will be used for the installation process only.

Example:

ProxyServers="http://192.168.0.200:8080|http://192.168.0.91:8080"


After installation, the ProxyServers argument will not be used again. To allow continued communication with ThreatLocker through a proxy, you need to enable the Proxy Settings Advanced Setting for setting up a proxy. For more information on how to set up the Proxy Settings Advanced Setting, see the associated KB article here

Example Configuration

Your ThreatLockerInstallerArguments.txt file may look like this:

 
InstallKey=000000000000000000000000
Key=00000000-0000-0000-0000-000000000000
Company=MyCompany
Instance=api
ProxyServers="http://192.168.0.200:8080|http://192.168.0.91:8080"
 

Installation Steps

  1. Place ThreatLockerInstaller.pkg and ThreatLockerInstallerArguments.txt in the same directory.
  2. Confirm the required parameters are added to ThreatLockerInstallerArguments.txt.
  3. Run the ThreatLockerInstaller.pkg installer.
  4. The installer will read the custom arguments from the text file during installation.
Was this article helpful?