Security ๐Ÿงช Community โœ“ Claude Code โœ“ Claude Desktop Standalone โ€ข Threatlocker

Threatlocker

ThreatLocker - zero-trust application allowlisting, approval triage, audit log investigation, computer inventory

Installation

Install this plugin individually:

/plugin marketplace add wyre-technology/msp-claude-plugins --plugin threatlocker

Or install all MSP plugins at once:

/plugin marketplace add wyre-technology/msp-claude-plugins

Features

  • Approval Requests
  • Audit Log
  • Computer Groups
  • Computer Management
  • Organization Management

Skills

This plugin provides 6 skills that teach Claude about Threatlocker:

Skill Description
approval-requests Use this skill when triaging ThreatLocker application approval requests โ€” the heart of day-to-day ThreatLocker operations.
audit-log Use this skill when investigating events in the ThreatLocker Action Log (the API name is "audit") โ€” building incident timelines, tracing a file's history across endpoints, identifying repeated denials, and correlating policy bypasses or audit-only matches with user/computer context.
computer-groups Use this skill when working with ThreatLocker computer groups โ€” the policy-scoping boundary that determines which allow/deny rules apply to which endpoints.
computers Use this skill when working with ThreatLocker-protected endpoints โ€” fleet inventory, identifying offline agents, drilling into a single computer's check-in history, and correlating computers across organizations and groups.
organizations Use this skill when working with the ThreatLocker MSP multi-tenant model โ€” enumerating child organizations, retrieving per-org auth keys, and identifying valid move targets when relocating computers between tenants.
api-patterns Use this skill when working with the ThreatLocker MCP tools โ€” raw-key authentication (NO Bearer prefix), multi-tenant routing via organizationId header, POST-heavy "GetByParameters" endpoints, pagination shape, and child-organization fan-out patterns.

Agents

This plugin provides 3 agents for autonomous task execution:

Agent Description
approval-triage-analyst Use this agent when reviewing the ThreatLocker pending approval queue, classifying application requests as high-confidence vs needs-review, recommending approve/deny decisions with documented reasoning, and escalating suspicious patterns.
fleet-health-auditor Use this agent when producing ThreatLocker fleet inventory and hygiene reports โ€” computer inventory by OS or group, offline-agent identification with check-in age tiering, computer-group hygiene analysis (orphans, oversized groups, OS-mismatched assignments), and multi-tenant pivots across child organizations.
threat-investigator Use this agent when investigating a ThreatLocker security event โ€” reconstructing a timeline around a host/user/file, tracing a file's history across the fleet, identifying repeated denials, and surfacing policy bypasses or audit-only matches that warrant new policy rules.

Commands

Available slash commands:

Command Description
/approval-triage Triage pending ThreatLocker approval requests with approve/deny recommendations
/audit-investigation Build a timeline of ThreatLocker audit events around a security incident
/computer-inventory Generate a ThreatLocker computer inventory report
/offline-agents Find ThreatLocker agents that have not checked in recently
/tenant-overview Multi-tenant ThreatLocker overview across child organizations

API Reference

Base URL
Authentication
Rate Limit
Documentation

Example Usage

Triage pending ThreatLocker approval requests with approve/deny recommendations

/approval-triage

Build a timeline of ThreatLocker audit events around a security incident

/audit-investigation

Generate a ThreatLocker computer inventory report

/computer-inventory

Find ThreatLocker agents that have not checked in recently

/offline-agents

Multi-tenant ThreatLocker overview across child organizations

/tenant-overview

Using Skills

/skill threatlocker:approval-requests

Use this skill when triaging ThreatLocker application approval requests โ€” the heart of day-to-day ThreatLocker operations.