The usage of USB devices is inevitable in any organization. Data portability perks come as a package with the threat of data theft and malware injection. Hence, blocking the usage of USB devices fortifies the network from incidents of data breach.
Endpoint Central offers several configurations to help you safeguard the Linux machines in your network. This document provides you with steps on preventing the usage of unauthenticated storage devices and obtaining a report on the same by executing custom script configuration.
Download the applicable tool from below. You'll need the contents of this file for both block and unblock operations.
Note: All USB storage devices will be blocked
All USB storage devices have been blocked successfully
All USB storage devices have been unblocked successfully.
To generate the report, copy the query text here and go to Reports > Query Reports > New Query Report. Paste the text in the query field and Run the report. This will show you the list of blocked and unblocked devices.