Intermediate

ThreatLocker policy design and rollout

Designing application policies, ringfences, storage and elevation rules, and the Learning-to-Secured cutover for a single customer. The next layer past helpdesk fundamentals.

~48 min total · 5 lessons · Final quiz
5 lessons

Lessons

  1. 01
    Application policy design

    How permit policies stack and resolve, the four levels of scope (global / org / group / computer), and the trade-off between built-in applications and custom application definitions.

  2. 02
    Ringfencing design

    The four ringfencing levers (application, file, network, registry), how to design a sensible ringfence for Office and browsers, and the most common mistakes in initial Ringfence rollouts.

  3. 03
    Storage Control and Elevation Control design

    USB / file-share access patterns that pay off, granular elevation rules versus blanket UAC, and the tray-app workflow that holds both together.

  4. 04
    Rollout and the Learning-to-Secured cutover

    Phased deployment, the maintenance modes you'll use along the way, the cutover playbook, and the rollback path when things break.

  5. 05
    PSA integration and the Cyber Hero workflow

    How approval requests become tickets, what changes when the customer subscribes to Cyber Hero, and how to report ThreatLocker activity back to the customer.

  6. Final quiz

    Test what you learned. Wrong answers are explained on the spot.