Register today for Zero Trust World 2026!

ThreatLocker® User Store

A whole new level of application approval.

What is ThreatLocker® User Store?

The ThreatLocker® User Store is a catalog of pre-approved applications that lets your users run the apps they need—without compromising your cybersecurity stance. Once you set up your library, you can easily manage license keys and counts there as well. Best of all, you save time, reduce frustrations, and keep your security framework strong without extra effort as users install new apps.

How does ThreatLocker® User Store work?

Fact: Zero Trust is the most robust and secure approach to cybersecurity.

Also a fact: It can introduce user experience challenges—authentication fatigue, access delays, and added complexity.

At the core of our Zero Trust solutions, we’ve tackled these challenges head-on with Cyber Hero® 60-second response times and a streamlined application approval process. Now, we’re raising the bar even higher with the new ThreatLocker User Store application. A user needs to install an application on their machine. The requested application is not on your current Allowlist. This is how the ThreatLocker User Store comes to the rescue.

1. Instead of denying the request, we offer a list of compatible pre-approved apps from the ThreatLocker User Store. If the requested app is in the ThreatLocker User Store, we present it directly—no alternatives needed.

2. The user chooses the application option, and the rest is a breeze:

  • They are free to install the pre-approved application without requesting approval.
  • The pre-approved application comes with optional temporary elevation to install on user’s device and we’ll automatically create a new Allowlisting policy for the application.
  • Plus, based on your pre-approved settings, we could immediately harden your environment with additional Ringfencing™ policies to restrict access to other applications, files, the internet, and the registry.

Your users now have a new application on their device with minimal disruption to their project. They feel empowered and in control, and you didn’t have to do anything to maintain your secure Zero Trust environment.

ThreatLocker User Store Screenshot

FREQUENTLY ASKED QUESTIONS

How will users access the ThreatLocker User Store?

When users try to run an application that is not permitted, the blocked item popup they receive will also show the option to View Available Applications if there are similar applications published in the User Store.

The ThreatLocker tray will also hold a View Available Applications option that will bring the user to the User Store.

What software can be included in the ThreatLocker User Store?

Any built-in applications and custom applications that you have created in ThreatLocker can be included in the User Store.

Will I be able to control which computers/departments have access to install different software?

Yes.  Policies in the User Store can be set for the Entire Organization, any group, or individual computers. Once policies are published, the items will only display for the specified computers.

How will license compliance be managed for software installed from the ThreatLocker User Store?

In the User Store, policies can be set to restrict and count the number of installs. You can insert a license key if it is needed for the installation. Each computer that downloads the application will reduce the license count by 1, and when there are no more licenses available, the application will no longer be accessible to end users.

The User Store is specifically for your organization, and no outside organizations have access to your User Store.

Will users still be able to request software that is not included in the ThreatLocker User Store?

Yes. Users will still be able to Request Access when software is blocked.

Do I have to create permit policies for software that is listed in the ThreatLocker User Store?

No. The ThreatLocker User Store will create computer-level policies on the fly at the time an end user installs software from the Store.

Will the ThreatLocker User Store include a process to handle applications that require admin permissions to be installed?

Yes. When setting up User Store policies, you can apply temporary Elevation on applications that require it. Once the Elevation expires, the application will run with standard user permissions, making it convenient to allow the Elevated permissions for installation while enforcing the application to run under the standard user context.

Request more information

THREATLOCKER USER STORE BENEFITS

allowlisting clipboard

Reduce your organization's risks of shadow IT.

Quickly offer safe app alternatives protected by Allowlisting and Ringfencing™. This way, you reduce the risk of unsafe alternatives.

Firewall illustration

Improve user experience. Reduce your workload.

Users gain swift access to the apps they need. And you don’t need to put in ongoing extra effort to make it happen.

illustration of hourglass window

Maintain a strong cybersecurity posture.

Permit access to applications for a specified amount of time. Automatically block the application after the policy has expired.

HEAR FROM OUR CUSTOMERS

Build your application allowlist without lifting a finger.

Learning mode helped us to figure out what is our allowlist, and it built it for us without us having to do much of anything at all. Once we had that allowlist, then we were able to further benefit to know what our inventory of software was across departments.

Brian Perkinson

Network Engineer

City of Champaign, IL

See everything running in your environnment, instantly.

Within the first week of implementing ThreatLocker, we were able to view our entire inventory of applications—something my team always had to do manually. Within an hour or two were able to see every learned application on our system... that doesn't happen very often.

Ismael Hernandez

Vice President of IT

TLG Peterbilt

Get a clear view of application usage and exposure.

The advantage of using ThreatLocker in our organization is we now have a much better understanding of the applications that run on our estate and the potential risks of using those applications. And it helps us inform our risk score as an enterprise.

Jeremy Parsons

Technical Architect

Heathrow Airport

Get real peace of mind for your IT team.

With ThreatLocker, we have the ability to centralize disparate elements in the security stack, and support from the Cyber Hero team is bar none. Leveraging ThreatLocker allows me to sleep soundly at night because I know that I'm always one step ahead of threat actors.

Jack Thompson

Director of Information Security

Indianapolis Colts

Stop lateral movement inside your network.

Our servers were vulnerable once someone gained access to the network. ThreatLocker was the solution we needed. The platform makes me more conscious of what's coming in and out of our network... It gave me an opportunity to look behind the scenes.

Pierre Anyansi

Network Engineer

Advanced Medical Transport

Go beyond what an antivirus could ever do.

The ThreatLocker solution was perfect for us.  With ThreatLocker Unified Audit, we get a clear description of what is allowed or denied on our network, and why. If I had a choice between an antivirus and ThreatLocker, I'd take ThreatLocker all day long.

Jack Harbut

IT and Systems Manager

Stampede Meats

Control risk across your entire organization.

Before ThreatLocker, we had a lot of risk that we just couldn't control. Now, we're doing a better of a job of providing a secure environment for our patients, doctors, and manufacturers. We want to make sure we're really protecting our network. ThreatLocker lets us do that very well.

Greg Gootee

CISO / SVP of Information Security

Asembia

Customize your security to fit your environment.

What we liked about ThreatLocker was how each tool built on the last, allowing us to control exactly how granular we wanted to get with locking down our environment. We had explored other options, but wWith ThreatLocker, we were able to get everything we needed from one place.

Jeff Lutes

Executive Vice President of Technology

Orlando Magic

Revolutionize your cybersecurity with powerful best-in-class tools.

Prior to ThreatLocker, we didn’t have a solution in place to help with application whitelisting. Implementing it into our environment was truly game-changing because we’d never used anything like it before. It came in, took control, and significantly reduced our threat landscape.

Trixy Otieno

Global Cybersecurity Manager

Seaboard Overseas Trading Group

start Your path to stronger defenses

Get a trial

Try ThreatLocker free for 30 days and experience full Zero Trust protection in your own environment.

Book a demo

Schedule a demo customized to your environment and explore how ThreatLocker aligns with your security goals.

Ask an expert

Just starting to explore our platform? Find out what ThreatLocker is, how it works, and how it’s different.