Advanced

ThreatLocker at scale

Multi-tenant operations, baseline templating, custom Cyber Hero workflows, Network Control + Detect at scale, audit evidence, and endpoint / customer offboarding.

~63 min total · 6 lessons · Final quiz
6 lessons

Lessons

  1. 01
    Organisation hierarchy and computer groups at scale

    How parent / child organisations, computer groups, and per-org module enablement compose. What inherits across the tree, what doesn't, and the cross-tenant errors that cost MSPs incidents.

  2. 02
    Baseline templates and policy governance

    Designing per-vertical baselines, version-controlling them, propagating updates without breaking customers, and the deployment-queue mechanics behind every policy change.

  3. 03
    Customising Cyber Hero workflows

    Approval categories, who-approves-what assignment at scale, the escalation seam from Cyber Hero to MSP to customer, and the audit trail that holds the whole flow together.

  4. 04
    Network Control and ThreatLocker Detect at scale

    Host-firewall-as-policy across many customers, designing Detect rules from real telemetry, and tying Detect signals to response actions without flooding the on-call channel.

  5. 05
    Audit and compliance reporting

    Pulling reports for Essential Eight, NIST 800-171, cyber-insurance questionnaires, and customer audits, plus the policy-decision documentation that makes audits defensible.

  6. 06
    Endpoint and customer offboarding

    A ThreatLocker offboarding runbook for endpoints, Tamper Protection, Cyber Hero routing, stale policy cleanup, audit exports, API credentials, and customer cancellation handoff.

  7. Final quiz

    Test what you learned. Wrong answers are explained on the spot.