You must be signed in to the ConnectWise University.
After signing in, we'll redirect you back here.

Sign In to Connectwise University

You must be signed in to the ConnectWise University to continue purchase.
After signing in, we'll redirect you back here.

Sign In to Connectwise University

Product Overview

Third Wall policies provide essential protection, locking down vulnerable protocols, limiting end user access to dangerous functions, preventing data theft and phishing, even watching for ransomware attacks. Emergency action buttons let you Isolate or Annihilate compromised computers, and critical reports give your clients logon and audit information.

Third Wall's 56 policies can be deployed protection across a single Location, across an entire Client, or across all of your managed computers. Monitors run every 5 minutes, auto-correcting if needed and notifying you of any discrepancies. Some policies, such a Monitor for Ransomware, have hair-trigger monitors that immediately detect issues and initiate instant response to mitigate damage and prevent spread of malware. At a glance, you can see the status of every policy, and can easily change settings, apply temporary policy suspensions, even make exceptions to any computer. Third Wall makes cybersecurity protection simple for you.

Third Wall captures critical Logon data for every client, giving you a full month look-back for every User logon, logoff, computer unlock and computer lock event. Sorted by User / Domain / Computer / Time, this report gives your clients a full record of all activity, and can show not only if someone was logged on, but also if they were working. This information is necessary for any audit compliance. The accompanying Dataview allows you to quickly answer the client question - "was someone in the office after hours last night?" Your clients want this information.

Third Wall makes you the Operational Cybersecurity expert in minutes. With powerful policies, quick-acting emergency response buttons, and indispensable reports, you and your clients need this protection. Way too much gets past firewalls and antivirus, and the primary ways in are closed off by Third Wall. Data theft by employees and contractors is rampant, but Third Wall shuts that down. Your clients are worried - as they should be - and you can be the hero who provides the best protection. Start a free, unlimited use 30-day trial at today, find out what it can do for you.


ConnectWise Automate


Only registered users can view documentation.
After signing in, we'll redirect you back here.

Login to Connectwise University


Third Wall's ConnectWise Automate Plugin is certified via the ConnectWise Invent Program. If you need assistance with plugin implementation, please reach out to Third Wall.

User Reviews

  • Alan Edwards, Computerware Inc
    Many clients no longer have a local AD for Group Policy settings, and Azure GP lacks functionality. Many endpoints are now remote to their office. ThirdWall still allows granular control resulting in fewer support calls and lower client support costs. Easily Control a wide range of security and operational features in Windows. It also sets them back to what you want them to be after a Microsoft Update which often reverts settings to default.
    Date: 4/12/2022 10:33 AM
    Was this review helpful? Yes No (0/0)
  • Chris Lewis, Chris Lewis, 1 Up Tech, LLC
    By far the easiest and most useful tool to enhance Windows security with or without a domain. With a simple and intuitive design all it takes is a flip of a switch to enhance your security. Or build out custom templates and apply to a site from a simple drop down. Adding an exception can be done on a per device basis or temporarily suspend a policy for the entire site. An excellent product and exceptional service.
    Date: 11/5/2021 11:36 AM
    Was this review helpful? Yes No (0/0)
  • Erik Herrera, Geek 3, Inc.
    Exceptional plugin for Automate. We've been able to considerably reduce what we do in client's group policy thanks to this plugin. We can manage locations, make exceptions and even have real-time ransomware action to kill network access if a bait file is tripped. An exceptional plugin
    Date: 3/31/2020 9:38 PM
    Was this review helpful? Yes No (0/0)

Share your thoughts with other Partners

Only registered users can write reviews.
After signing in, we'll redirect you back here.

Sign In to Connectwise University

Third Wall

Complete the form below to download a PDF on Third Wall's cyber security solution

Please complete the form below to begin your download.

  • Submit