ThreatLocker
  • 04 Apr 2024
  • 1 Minute to read
  • Dark
    Light
  • PDF

ThreatLocker

  • Dark
    Light
  • PDF

Article summary

ThreatLocker is a zero-trust endpoint protection platform.

This adapter fetches the All Computers report.

Types of Assets Fetched

This adapter fetches the following types of assets:

  • Devices

Parameters

  1. Host Name or IP Address (required, default: https://api.threatlocker.com/) - The hostname or IP address of the ThreatLocker server.

    Note:

    ThreatLocker has different API URLs depending on your region. Your specific regional API URL should be provided when you receive your API keys from ThreatLocker.

  2. Auth Key (required) - Specify the user authentication key associated with a user account that has permissions to fetch assets. Contact ThreatLocker to obtain the API key. Axonius needs the "Report" API key for this parameter.

  3. Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.

  4. HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.

  5. HTTPS Proxy User Name (optional) - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.

  6. HTTPS Proxy Password (optional) - The password to use when connecting to the server using the HTTPS Proxy.

To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.

ThreatLocker2

Supported From Version

Supported from Axonius version 6.0



Was this article helpful?

What's Next