
Strengthening Endpoint Security with ThreatLocker
To better protect your organization’s data and resources, we have implemented ThreatLocker, a powerful software restriction and application control solution, across all machines accessing company systems.
Why ThreatLocker?
Cyber threats are constantly evolving — with malware and ransomware attacks becoming more sophisticated and dangerous. ThreatLocker helps us stay ahead by proactively blocking unauthorized software from running, significantly reducing the risk of infection.
-
Malware can automatically execute if you unknowingly open a harmful file or program.
-
Ransomware can encrypt not just your local files, but also any network data you have access to — causing significant operational disruption.
How It Works
ThreatLocker uses zero trust application control to ensure that only approved software can run. Any application, file, or update not explicitly allowed will be automatically blocked, protecting your device and the entire network.
Requesting Access or Approving Updates
From time to time, you may need to install a new program or run an update. Since ThreatLocker may not recognize the newly updated version, you will need to request temporary access.
Here’s how:
-
When an application is blocked, a ThreatLocker pop-up will appear on your screen.
-
Click on the “Request Access” icon.
-
In the request window:
-
Provide a brief description of the software or task.
-
Enter your email address.
-
Click “Send Request”.
-
Our support team will review and approve the request if it meets security standards. For planned software installations or updates, you can also submit a ticket in advance so we can prepare accordingly.
ThreatLocker is one of many layers we use to ensure your systems stay secure and operational. If you have any questions or need assistance, don’t hesitate to reach out via ticket or contact our support team.
Quick-Reference Guide: Using ThreatLocker
🔐 What ThreatLocker Does:
-
Blocks unapproved software from running
-
Stops malware and ransomware attacks before they start
-
Ensures only safe, authorized programs are allowed
🛑 What Happens If a Program is Blocked?
You’ll see a ThreatLocker pop-up.
✅ How to Request Access:
-
Click “Request Access” on the pop-up
-
Enter a brief reason for the request
-
Input your email address
-
Click “Send Request”
Our team will review and approve legitimate requests.
💡 Planning to install or update software?
Submit a support ticket in advance so we can whitelist it beforehand.