ThreatLocker - How to interact with ThreatLocker on your computer

Overview:

This document aims to explain the features of the ThreatLocker interface on your computer.  Is it written for the Windows audience, but the Mac & Lunix clients are almost identical.

 

Process:

  1. Once ThreatLocker is installed, you will find an icon on your system tray that appears as the FSU logo:
    1. Uploaded Image (Thumbnail)
  2. Right clicking the icon will yield a menu of options, as shown:
    1. Uploaded Image (Thumbnail)
  3. You can use many of these including:
    1. Blocked Items - this will bring up a window that shows the history of denied files on your computer.
    2. Reset History - This will restore the "Request Access" popup when a file is denied *if* you have previously clicked "Don't Show Again"
    3. Rapid Check-in - ThreatLocker normally checks for updates every 60 seconds.  If you are working with a technician who may be pushing settings to your machine, this button will begin checking in every five seconds for five minutes after the next check for updates.
    4. Realtime Unified Audit - this will bring up a troubleshooting window that shows you every file and all network traffic that ThreatLocker scans in real-time.  You can watch to see if ThreatLocker is denying any file executions or network calls from this screen.
  4. Technicians can also utilize:
    1. Override - A special mode that disables blocking for very unique edge cases - this is unlikely to used at FSU.
    2. Maintenance Mode - This brings up a QR code that ThreatLocker administrators can scan to put the computer into special modes.