Logo
Sign in
Product Logo
Configuration ManagerThreatLocker

ThreatLocker Configuration Manager allows IT professionals to set standardized Windows configurations from a central console. It simplifies the management of security policies, such as automatic lock policies and disabling autoplay, across multiple endpoints, ensuring consistent and secure configurations regardless of network domain.

Vendor

Vendor

ThreatLocker

643d9b0adca0e4ca994682bc_ThreatLockerConfig Manager Dashboard-p-1080.png
Product details

Configuration Manager

ThreatLocker® Configuration Manager enables IT professionals to set best practice configuration policies across their environment from a single central console.

Why is Configuration Manager important?

Traditionally, companies require components of group policy from Active Directory (AD) to set Windows configurations, requiring users to be on the network or using an AD domain. Today's business network isn't always isolated to a single AD domain, making setting and enforcing configurations difficult. ThreatLocker Configuration Manager allows IT admins to set standardized Windows configurations, such as automatic lock policies, disabling Universal Plug and Play, and disabling autoplay, or blocking SMB v1 from one central location, whether or not the computers are connected to an AD domain.

How does Configuration Manager work?

ThreatLocker Configuration Manager provides a centralized, policy-driven portal where IT admins can set configuration policies per individual endpoint, computer group, organization, or across multiple organizations. Admins can quickly manage important security configurations from a single pane of glass.

Features

Centralized password policy configuration

Set password requirements such as length, complexity, and change frequency from a single policy, across an entire organization, or across multiple organizations from a central location.

User account management

Rename local administrator accounts and apply a unique rotating password to each computer for their local admin account, making it more challenging for credentials to be compromised.

Set boundaries for MS Office

Provides access to disable all downloaded macros and OLE in MS Office documents.

Control user social media access

Select which social media platforms are acceptable or disable all the common platforms to keep employees productive and protect their business environment.

Find more products by segment
EnterpriseB2BView all
Find more products by category
Security SoftwareView all