Application control/Whitelisting
Integrate with ThreatLocker to control what applications send or receive, lock down ports to the system.
"
Total endpoint control over what software can run, and what resources it can access. With simple to use, robust and policy-driven Application Whitelisting and Ringfencing.
Application Whitelisting has long been considered the gold standard in protecting businesses from viruses, ransomware, and other malicious software. Unlike antivirus, Application Whitelisting puts you in control over what software, scripts, executables, and libraries can run on your endpoints and servers. This "default deny" approach not only stops malicious software, but it also stops any other unpermitted applications from running.
Controlling what software can run should be the first line of defense in protecting yourself from malicious software. Ringfencing then adds the second line of defense for applications that are permitted. First, by defining how applications can interact with each other, and then controlling what resources applications can access, such as network, files, and registry. Ringfencing is an invaluable tool in the fight against fileless malware and software exploits.
Full granular audit of every executable, script, or library executed on your endpoints
Default deny application whitelisting approach to deny anything not trusted by your business
Thirty seconds single click approval
Stop fileless malware and limit damage from application exploits
Define how applications can integrate with other applications
ThreatLocker automatically adds new hashes when application and system updates are released
"
Nice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!