
ThreatLocker Allowlisting ensures only approved software runs on your network, blocking unauthorized applications and malware. This robust security measure operates by default-denying any unlisted software, significantly reducing the risk of cyber threats and enhancing endpoint protection.
Vendor
ThreatLocker
Company Website

Application Allowlisting
Allow only the software you need, and block everything else - including ransomware.
What is Application Whitelisting (Allowlisting)?
Application Allowlisting, previously known as "Application Whitelisting," works by a simple rule: if it's not expressly permitted, it's blocked. This robust form of access control prevents untrusted software, including all types of malware and ransomware, from running. It's a key part of endpoint security that ensures only specific, safe applications operate on your network.
Why Allowlisting?
Considered a top-tier security strategy, Application Allowlisting gives you control over which software, scripts, and libraries run on your devices and servers. It's more effective than traditional antivirus or EDR solutions. Application Whitelisting blocks not just malicious software but also any unauthorized applications. This greatly reduces the chances of cyber threats and rogue programs affecting your network, protecting your sensitive data.
How does Application Whitelisting (Allowlisting) work?
When the agent is first installed, it operates in Learning Mode. This phase involves cataloging every application and its dependencies currently on the system. It creates a list of these applications, forming the basis of your allowlist. Post Learning Mode, the IT admin reviews this list, removing non-essential apps to enhance security. Once secured, any executable file, script, or library not on the allowlist is automatically blocked. The user can request new software from the IT administrator, and it can be approved in 60 seconds.