
ThreatLocker Configuration Manager allows IT professionals to set standardized Windows configurations from a central console. It simplifies the management of security policies, such as automatic lock policies and disabling autoplay, across multiple endpoints, ensuring consistent and secure configurations regardless of network domain.
Vendor
ThreatLocker
Company Website

Configuration Manager
ThreatLocker® Configuration Manager enables IT professionals to set best practice configuration policies across their environment from a single central console.
Why is Configuration Manager important?
Traditionally, companies require components of group policy from Active Directory (AD) to set Windows configurations, requiring users to be on the network or using an AD domain. Today's business network isn't always isolated to a single AD domain, making setting and enforcing configurations difficult. ThreatLocker Configuration Manager allows IT admins to set standardized Windows configurations, such as automatic lock policies, disabling Universal Plug and Play, and disabling autoplay, or blocking SMB v1 from one central location, whether or not the computers are connected to an AD domain.
How does Configuration Manager work?
ThreatLocker Configuration Manager provides a centralized, policy-driven portal where IT admins can set configuration policies per individual endpoint, computer group, organization, or across multiple organizations. Admins can quickly manage important security configurations from a single pane of glass.
Features
Centralized password policy configuration
Set password requirements such as length, complexity, and change frequency from a single policy, across an entire organization, or across multiple organizations from a central location.
User account management
Rename local administrator accounts and apply a unique rotating password to each computer for their local admin account, making it more challenging for credentials to be compromised.
Set boundaries for MS Office
Provides access to disable all downloaded macros and OLE in MS Office documents.
Control user social media access
Select which social media platforms are acceptable or disable all the common platforms to keep employees productive and protect their business environment.