ThreatLocker

ThreatLocker

ThreatLocker Cyber Security 

About: ThreatLocker is a powerful Zero Trust cybersecurity solution built to safeguard your computer by tightly controlling application access and managing network traffic. Unlike traditional security models, ThreatLocker operates on a "deny-by-default" approach, automatically blocking any unknown or unauthorized applications and connections unless explicitly approved. This proactive method of verifying every action before granting access helps create a highly secure and well-governed computing environment, making ThreatLocker an essential component of a strong cybersecurity posture. 
 
Accessing and Requesting Application Approval in ThreatLocker 

The ThreatLocker security application runs silently in the background and can be accessed from the system tray near the system clock. In most cases, this icon requires no interaction. 
 

However, there may be instances where a software update is flagged or a new application needs to be installed. When an unrecognized .exe file is run for the first time, ThreatLocker will display a toast notification with an option to “Request Access.” 
 
Clicking “Request Access” will open a short form for you to complete. This form allows you to explain what you’re trying to install and why. 
 

After submitting the request, an alert is immediately sent to our team for review. If the application is deemed safe, without suspicious behavior or security concerns, Voipcom will approve it and allow access not just for you, but for the rest of your office. You’ll then receive a notification confirming that your request has been approved and the software is now allowed to run. 

Live example of the request forum (Below)  
 

 
If you happen to miss the initial popup notification from ThreatLocker, don’t worry, there’s another way to submit a request.  

Simply locate the ThreatLocker icon in your system tray (near the clock), right-click it, and select “Blocked Items” from the menu. 
 
 
The Blocked Items report will display a list of recently blocked applications or actions. Next to each blocked item, you’ll see a “View” button. Clicking “View” will open the same request form used in the initial popup, allowing you to provide details and submit the application for review.  

Once submitted, the request is sent to our team for evaluation. If no issues are found, the application will be approved and access will be granted across your office.