Knowledge Base
Browse Docs
  • Introduction
    1. DefensX
    2. DNS & Web Filtering
    3. Zero Trust Files
    4. Zero Trust Credentials
    5. ADWare Protection
    6. Remote Browser Isolation
    7. Secure Browser Extension
    8. Secure Mobile Browser
  • Management
    1. Role-Based Access Control
  • Deployment
    1. Deployment via RMM
    2. Operating System Agent
    3. Deployment via GPO
    4. Deployment via Intune
    5. VDI and Terminal Servers
    6. Windows Manual Deployment
    7. Mac MDM Deployment
    8. Mac Manual Deployment
    9. Network Deployment
    10. Secure Mobile Browser
    11. Bypass Option
    12. AI Protections
    13. SaaS Restrictions
    14. Bookmark Manager
  • Secure Access (ZTNA)
    1. Configuration
  • Integrations
    1. Azure AD
    2. Identity Providers
    3. SIEM
  • Policy Management
    1. Configuring Policies
    2. Configuring Consents
  • Questions & Answers
    1. Licensing
    2. Incognito Mode
    3. Onboarding
    4. Active Directory
    5. Group Synchronization
    6. Agent
    7. Conflicting Softwares
    8. Reporting
    9. Virtual Desktops
    10. Using the Backend
    11. DNS & Web Filtering
  • Training Videos
    1. Onboarding Videos
    2. Attack Scenarios
    3. MSP Admin Training Series
  • MSP Automation
    1. Overview
    2. External Notifications
    3. Integrations
    4. Partner API
ONLINE DOCUMENTATION

Using with ThreatLocker

ThreatLocker’s software allows organizations to control and restrict which applications can run on their systems, helping to prevent unauthorized or malicious software from executing. By implementing application control and ringfencing policies, ThreatLocker aims to enhance security by reducing the attack surface and preventing unapproved software from compromising a system.

DefensX has already been integrated into the ThreatLocker ecosystem. The DefensX application is included in the list of known applications as DefensX (Built-In). You just need to add DefensX (Built-In) application into a policy for permitted applications.

If you don’t have any existing policies, you can create a new one by navigating to Modules → Application Control in the ThreatLocker menu.

threatlocker1

Then, click on the + New Policy button to create a policy:

threatlocker2
  • In the Conditions section, please type DefensX in the search box.

  • Select both the DefensX (Built-In) and Firefox Extension - DefensX (Built-In) rules

  • In the Actions section select Permit

  • Click on the Save button and deploy the policies.

Note
The DefensX Firefox extension operates under a dedicated rule within ThreatLocker. Conversely, when using the Chrome and Edge extensions, selecting additional rules is unnecessary; the DefensX (built-in) rule stands as the sole requirement.
www.defensx.com
Secure Industries, Inc 101 Avenue of The Americas, Floor 9 New York, NY 10013