ThreatLocker’s Amanda Makowsky: Exclusive ZTW Executive Interview
Endpoint Hardening in Minutes: A Simplified Approach
In a recent presentation at Zero Trust World 2026, Amanda Makowsky of ThreatLocker outlined a streamlined method for hardening endpoints using Configuration Manager.
A Simplified Approach to Endpoint Hardening
This approach eliminates the need for an Active Directory server, making it well-suited for remote and hybrid work environments. Additionally, it renders the gpupdate command obsolete.
Makowsky’s technique enables organizations to rapidly enhance their endpoint security posture without requiring extensive technical expertise. By leveraging Configuration Manager, users can efficiently implement robust security configurations across their endpoint devices.
The Importance of Endpoint Hardening
This simplified approach to endpoint hardening is particularly relevant in today’s threat landscape, where attackers frequently target vulnerabilities in endpoint configurations. By ensuring that endpoint devices are properly hardened, organizations can significantly reduce their attack surface and minimize the risk of compromise.
