T

ThreatLocker

Default-deny zero-trust endpoint protection.

ThreatLocker is a zero-trust endpoint platform built around application allowlisting, ringfencing, and storage / elevation / network controls. Where EDR products spot malicious behaviour after it runs, ThreatLocker prevents anything that isn't explicitly permitted from running in the first place. MSPs deploy it to harden customers against ransomware and unsanctioned software, with a 24/7 Cyber Hero approval service handling end-user requests so the helpdesk isn't drowning in approvals.

Vendor website ↗
Beginner
Live

ThreatLocker helpdesk fundamentals

The mental model and console moves a new helpdesk hire needs to triage ThreatLocker tickets confidently, from the Response Center through approval requests, the Unified Audit, and Learning Mode.

~38 min · 5 lessons
5 lessons
Start course
Intermediate
Live

ThreatLocker policy design and rollout

Designing application policies, ringfences, storage and elevation rules, and the Learning-to-Secured cutover for a single customer. The next layer past helpdesk fundamentals.

~48 min · 5 lessons
5 lessons
Builds on: Beginner
Start course
Advanced
Live

ThreatLocker at scale

Multi-tenant operations, baseline templating, custom Cyber Hero workflows, Network Control + Detect at scale, audit evidence, and endpoint / customer offboarding.

~63 min · 6 lessons
6 lessons
Builds on: Intermediate
Start course