ThreatLocker
When ThreatLocker detects what could be malicious software being installed or executed, it will present you with the prompt below.
- Click the Request Access button if you are trying to run or install a legitimate program.

Once you click Request Access button, you will be presented with a second prompt.
- Fill in the information below and hit Send Request. HOT IT technicians will be notified that there is a request for software installation and make the necessary approvals. If any program is questionable they will reach out to you before approving.

If you have any questions please don’t hesitate to call or email us with any questions! We love hearing from you, especially when it is about how we are keeping you and your company secure.