Skip to main content

Whitelisting

How to Whitelist a User/Device in ThreatLens

Whitelisting allows trusted users or devices to continue accessing the application, even if they are flagged with certain threat indicators.

Step-by-Step Process

  1. Navigate to ThreatLens
    Open the ThreatLens module from your dashboard.
  2. Access Latest Threat Activity
    Go to the Latest Threat Activity section to view all detected threats.
  3. Identify the Target Device
    • Review the list of devices flagged with at least one threat or malicious indicator.
    • Use the search bar to quickly find a specific device by name or device ID.
  4. Select the Device
    Click on the device you want to whitelist.
  5. Review Threat Details
    Analyze the device information, including:
    • Threat ID.
    • Threat Group.
    • Timespan of detected activity.
  6. Initiate Whitelisting
    Click on the “Whitelist Device” button.
  7. Confirm Action
    The system will process the request and display a “Device Whitelisted Successfully” notification.
  8. Verification
    • The selected device is now whitelisted.
    • Updated status is reflected in the Latest Threat Activity dashboard.
    • You can also track the count of whitelisted vs non-whitelisted devices.

img

Technical Note

Whitelisting overrides automated threat enforcement for specific devices, so it should only be applied to verified and trusted users after proper validation.

img