ThreatLocker policy design and rollout
Designing application policies, ringfences, storage and elevation rules, and the Learning-to-Secured cutover for a single customer. The next layer past helpdesk fundamentals.
Lessons
- 01 ~10 minApplication policy design
How permit policies stack and resolve, the four levels of scope (global / org / group / computer), and the trade-off between built-in applications and custom application definitions.
- 02 ~10 minRingfencing design
The four ringfencing levers (application, file, network, registry), how to design a sensible ringfence for Office and browsers, and the most common mistakes in initial Ringfence rollouts.
- 03 ~9 minStorage Control and Elevation Control design
USB / file-share access patterns that pay off, granular elevation rules versus blanket UAC, and the tray-app workflow that holds both together.
- 04 ~9 minRollout and the Learning-to-Secured cutover
Phased deployment, the maintenance modes you'll use along the way, the cutover playbook, and the rollback path when things break.
- 05 ~8 minPSA integration and the Cyber Hero workflow
How approval requests become tickets, what changes when the customer subscribes to Cyber Hero, and how to report ThreatLocker activity back to the customer.
- Final quiz
Test what you learned. Wrong answers are explained on the spot.