Register for Zero Trust World 25!

Configuration Manager

ThreatLocker Configuration Manager enables IT professionals to set best practice configuration policies across their environment from a single central console.

Why Is Configuration Manager Important?

Traditionally, companies require components of group policy from Active Directory (AD) to set Windows configurations, requiring users to be on the network or using an AD domain. Today's business network isn't always isolated to a single AD domain, making setting and enforcing configurations difficult. ThreatLocker Configuration Manager allows IT admins to set standardized Windows configurations, such as automatic lock policies, disabling Universal Plug and Play, and disabling autoplay, or blocking SMB v1 from one central location, whether or not the computers are connected to an AD domain.

Vector Graphic of ThreatLocker Configuration Manager policy list

How Does Configuration Manager Work?

ThreatLocker Configuration Manager provides a centralized, policy-driven portal where IT admins can set configuration policies per individual endpoint, computer group, organization, or across multiple organizations. Admins can quickly manage important security configurations from a single pane of glass.

Graphic of ThreatLocker Configuration Manager  Updating Existing Policies

Features

Vector Graphic of ThreatLocker Configuration Manager Centralized Password Policy Config Feature Icon

Centralized Password Policy Configuration

Set password requirements such as length, complexity, and change frequency from a single policy, across an entire organization, or across multiple organizations from a central location.

Vector Graphic of ThreatLocker Configuration Manager User Account Management Feature Icon

User Account Management

Rename local administrator accounts and apply a unique rotating password to each computer for their local admin account, making it more challenging for credentials to be compromised.

Vector Graphic of ThreatLocker Configuration Manager  Set Boundaries for MS Office Feature Icon

Set Boundaries for MS Office

Provides access to disable all downloaded macros and OLE in MS Office documents.

Vector Graphic of ThreatLocker Configuration Manager Control User Social Media Access

Control User Social Media Access

Select which social media platforms are acceptable or disable all the common platforms to keep employees productive and protect their business environment.

More ThreatLocker® Solutions