This document will explain you on the following:
The Secure USB configuration is used for both users and computers to block or unblock the use of the USB devices. This configuration is applicable to users irrespective of the computers they use.
Using this configuration, you can block or unblock the following devices:
Mouse
Disk drives (for example: USB drives and external hard-disk drives)
CD ROMs
Portable devices (for example: mobile phones, digital cameras and portable media players)
Floppy disks
Bluetooth devices
Images (for example: USB cameras and scanners)
Printers
Modems
Apple USB devices (for example: iPhone, iPad and iPod touch)
You can also exclude devices using the Device Instance ID assigned to each device.
When you create the Secure USB configuration to block or unblock devices for users, you can set actions to take place once the user logs off. These actions enable you to retain or remove the settings that you make, using the Secure USB configuration, once the user logs off. The actions that you can set include the following:
Don't alter device status: Use this option to retain the settings you have made, even after the user has logged off.
For example, if you use this option, the settings that you have made to block or unblock the usage of USB devices will apply to all users who log on.
Disable all devices excluding mouse: Use this option to remove the settings you have made, even after the user has logged off.
When you apply the Secure USB configuration to both computers and users, the settings made for computers will be applied before the settings made for users. For example, assume that you have made the following settings:
Settings configured for users
Administrator: You have unblocked the usage of the disk drive
Other users (excluding the administrator): You have not deployed any configurations
Settings configured for computers : You have blocked the usage of portable devices and disk drives
The following actions will take place:
Computer startup: The Secure USB configuration settings made for the computer are applied when the computer is started. This means that no portable devices and disk drives can be used.
Administrator logon: The Secure USB configuration for the computer is applied. However, it is over written by the settings made for the administrator. This means that the administrator can use disk drives.
Other users (excluding the administrator) log on: The Secure USB configuration made for the computer is applied.
Other users (excluding the administrator)log off: The log off-action settings made for users are applied when a user logs off. If the log off-action setting is set to Don't alter device status, then the settings made will apply to the next user who logs on, provided that the user does not have any settings that apply to them.
Note: Block USB, represents to block the access to use any USB device. |
As an administrator, you can create a configuration block or unblock specific USB devices. You can also exclude specific devices, if required.
To create a configuration to secure USB devices for users, follow the steps given below:
Click the Configurations tab
Click Configuration
In the User Configurations section click Secure USB
Enter a name and description for the configuration
Click Add to apply restrictions
To add restrictions, select the devices, choose to block or unblock devices.
Select the required log-off action
Specify the required execution settings
Click Deploy
You have created configurations to secure USB devices. These configurations will be applied when the user logs in to the computer.
When you block a device you can exclude certain devices from being blocked. This can be done, by using Vendor ID or the Device Instance ID assigned to each device. You can exclude devices only when you have blocked a device. To exclude devices, follow the steps given below:
Click the Exclude Devices link against a device
Enter the Device Instance ID for the device. You can also choose to block all the devices, from the specified vendor. You will have to specify the Device Instance ID using which, Endpoint Central will fetch the vendor instance ID and exclude all devices from the specific vendor.
You can choose to exclude All Encrypted devices/encrypted devices from the list of specified devices. Devices that are encrypted using bit locker can be added to the exclusion list. This is applicable only for Disk Drives and the target computer supports bit locker.
Click Close
You have excluded a device from being blocked.
Every USB device has a unique ID. This ID is assigned to devices by the system to identify them easily. You can identify the Device Instance ID of a Device by following the steps mentioned below:
Right-click My Computer
Click Properties
Click Device Manager (Refer to the figure below)
From the list of devices, expand the list of devices for which you want the Device Instance ID.
(For example : if you want to identify the Device Instance ID of a mobile phone that you have connected to the computer, expand portable devices and follow the next step.)
Figure 1: Device Manager
Right-click on the name of a specific device and click Properties (Refer to the figure below)
Figure 2: Properties
Click the Details tab
In the drop-down box, select Device Instance ID or Device Instance Path (Refer to the figure below)
Figure 3: Device Instance ID
In computers which have the operating system Windows Vista (and later versions), the Device Instance ID is called the Device Instance Path. You can copy the Device Instance Path from the Properties property sheet of the Device Manager.
|
You can now view and copy the Device Instance ID for a specific device.
Administrators can choose to revoke all USB related restrictions which are applied to the user.
To create a configuration, in order to revoke all USB related restrictions for users, follow the steps given below:
Click the Configurations tab
Click Configuration
In the User Configurations section click Secure USB
Enter a name and description for the configuration
Click Remove to revoke all restrictions applied to the user
Select the required log-off action
Make the required execution settings
Click Deploy
You have created configurations to secure USB devices. These configurations will be applied when the user logs in to the computer.
Note: Administrators can choose to revoke/remove restrictions applied for specific USB devices, by clicking "Add" as mentioned in step.5 and choose to unblock the specific restrictions which needs to be revoked. |