Managing Secure Network Beneficiaries

2 min. readlast update: 04.06.2026

The Beneficiaries feature allows administrators to control which organizations can use a Secure Network server.

This is commonly used to:

  • Share Secure Network infrastructure across multiple organizations

  • Restrict access to specific Secure Network servers


What Are Beneficiaries?

Beneficiaries are organizations that are allowed to use a Secure Network server.

When an organization is added as a beneficiary:

  • Its users and devices can leverage the assigned Secure Network server

  • It can access resources according to configured policies


Common Use Cases

Managed Service Providers (MSPs)

  • Allow all sub-organizations to use a shared Secure Network server

  • Centralize Secure Network infrastructure across customers


Enterprise Environments

  • Assign different Secure Network servers to different business units or regions

  • Control access between environments (e.g., production vs development)


Configure Beneficiaries

  1. Sign in to the ThreatLocker Portal.

  2. Navigate to:
    Network Policies > Hamburger Menu > Organization Beneficiaries

  3. Select the Secure Network server from the dropdown.

  4. Add the organizations that should be allowed to use the server.

  5. Your changes will be saved automatically.


How It Works

  • Each Secure Network server can be shared with one or more organizations

  • Only organizations listed as beneficiaries can use that server

  • Access is enforced when Secure Network (ZTNA) connections are established


Best Practices

  • Only add organizations that require access to the Secure Network server

  • Use separate servers for different environments (e.g., production, testing)

  • Regularly review beneficiary assignments to ensure proper access control

Was this article helpful?