Installation alternatives

You can install ThreatLockDown using other deployment options. These are complementary to the installation methods you can find in the Installation guide and the Quickstart.

Installing the ThreatLockDown central components

All the alternatives include instructions on how to install the ThreatLockDown central components. After these are installed, you then need to deploy agents to your endpoints.

Ready-to-use machines

  • Virtual Machine (OVA): ThreatLockDown provides a pre-built virtual machine image (OVA) that you can directly import using VirtualBox or other OVA compatible virtualization systems.

  • Amazon Machine Images (AMI): This is a pre-built Amazon Machine Image (AMI) you can directly launch on an AWS cloud instance.

Containers

  • Deployment on Docker: Docker is a set of platform-as-a-service (PaaS) products that deliver software in packages called containers. Using Docker, you can install and configure the ThreatLockDown deployment as a single-host architecture.

  • Deployment on Kubernetes: Kubernetes is an open-source system for automating deployment, scaling, and managing containerized applications. This deployment type uses ThreatLockDown images from Docker and allows you to build the ThreatLockDown environment.

Offline

  • Offline installation: Installing the solution offline involves downloading the ThreatLockDown components to later install them on a system with no internet connection.

From sources

Note

Since ThreatLockDown v4.6.0, we don't provide the Kibana plugin and Splunk app anymore. To integrate ThreatLockDown with Elastic or Splunk, refer to our Integrations guide: Elastic, OpenSearch, and Splunk.

Installing the ThreatLockDown agent

The ThreatLockDown agent is a single and lightweight monitoring software. It is a multi-platform component that can be deployed to laptops, desktops, servers, cloud instances, containers, or virtual machines. It provides visibility into the endpoint security by collecting critical system and application records, inventory data, and detecting potential anomalies.

If the ThreatLockDown central components are already installed in your environment, select your operating system below and follow the installation steps to deploy the agent on the endpoints.

From sources

  • Installing the ThreatLockDown agent from sources: Installing ThreatLockDown from sources means installing the ThreatLockDown agent without using a package manager. You compile the source code and copy the binaries to your computer instead.

Orchestration tools

These alternatives guide you to install the ThreatLockDown central components along with the single universal agent.

  • Deployment with Ansible: Ansible is an open source platform designed for automating tasks. Its deployment tool is used to deploy the ThreatLockDown infrastructure on AWS. The ThreatLockDown environment consists of the ThreatLockDown central components and a ThreatLockDown agent.

  • Deployment with Puppet: Puppet is an open-source software tool that gives you an automatic way to inspect, deliver, operate, and future-proof all of your software, no matter where it is executed. It is very simple to use and allows you to install and configure ThreatLockDown easily.