Setup Instructions
Log in to your ThreatLocker instance and navigate to Modules > Application Control.
Tap on the New Policy at the top.
Complete the application policy field requirements.
Policy Name - set a name of your choice; we used ConnectSecure
Description - set a name of your choice; we used ConnectSecure
Click the "Applies to" dropdown and select the organization level to apply the policy. We are using the Entire Organization in our example.
Tap the ‘Application Name’ field under the Conditions section, and search for ‘ConnectSecure’. You should use the BUILT-IN\ConnectSecure CyberCNS application for selecting.
Tap on ‘Create’ to create and save the policy.
Ringfencing
Search in Application Control for ‘PowerShell’ and verify if you see the blue key-shield icon under the Windows PowerShell Language Mode, as shown in the screenshot below at #3.
Tap on the application.
Tap on Existing Policies
Any of the policies listed may need to be updated. This varies depending on your system’s configuration. The default two options are policies for PowerShell Ringfenced on Workstations and Servers.
Tap into a policy (as shown above)
Scroll down to the File Access Exceptions section and tap on Tags
Under Internet restrictions, select the "Tags"
Tap the Tag dropdown and search for "ConnectSecure"
Tap on the 'Threatelocker\ConnectSecure (Built-In) option as shown below.
Tap on the blue plus sign button to add this to the permit status.
Tap on Save to finish.
Need Support?
You can contact our support team by emailing support@connectsecure.com or visiting our Partner Portal, where you can create, view, and manage your tickets.
https://cybercns.freshdesk.com/en/support/login
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article