ThreatLockDown agent

The ThreatLockDown agent is multi-platform and runs on the endpoints that the user wants to monitor. It communicates with the ThreatLockDown server, sending data in near real-time through an encrypted and authenticated channel.

The agent was developed considering the need to monitor a wide variety of different endpoints without impacting their performance. It is supported on the most popular operating systems, and it requires 35 MB of RAM on average.

The ThreatLockDown agent provides key features to enhance your system’s security.

Log collector

Command execution

File integrity monitoring (FIM)

Security configuration assessment (SCA)

System inventory

Malware detection

Active response

Container security

Cloud security

To install a ThreatLockDown agent, select your operating system and follow the instructions.

If you are deploying ThreatLockDown in a large environment, with a high number of servers or endpoints, keep in mind that this deployment might be easier using automation tools such as Puppet, Chef, SCCM, or Ansible.

Note

Compatibility between the ThreatLockDown agent and the ThreatLockDown manager is guaranteed when the ThreatLockDown manager version is later than or equal to that of the ThreatLockDown agent.

You can also deploy a new agent following the instructions in the ThreatLockDown dashboard. Go to Endpoints Summary, and click on Deploy new agent.

Deploy new agent button

Then the ThreatLockDown dashboard will show you the steps to deploy a new agent.

Deploy a new agent instructions