Enforce Device Control for Secure Endpoint Management

In this article, you'll learn about

Device control policies are essential for managing and restricting the use of peripheral devices within an organization's IT environment. Defining these policies is a critical step in ensuring comprehensive device security and establishing precise, granular control over device usage and access.

Create Data Rules

To view the list of supported devices, click here

Creating Device Access Control Policy for Windows

Navigate to Policies -> Policy Creation -> Create Policy -> Select Windows

Create Data Rules

  1. Policy name:
    Enter a name for the policy to be created.
  2. Description (optional):
    Add a description to clarify the policy's purpose or Key details

Control Options

Device Access Control allows you to manage and restrict peripheral device usage to enhance security.

  1. Allow: Permits full functionality of peripheral devices, with additional controls available in advanced settings for specific devices.
  2. Block: Restricts all functions of peripheral devices. For Removable Storage and CD-ROM devices, advanced controls allow blocking specific connection types, such as USB or SCSI.
  3. Allow Trusted Devices: Enables admins to specify a list of trusted devices that are permitted access, while blocking others.
    For instructions on creating a trusted devices list, click here.
  4. No Change: Ensures that the agent does not enforce any block or allow policies on endpoints, ideal when Group Policy Object (GPO) has been applied.
  5. Read Only: Allows users to view data but blocks any transfer or modification of the data on the device.

Advanced Settings

While control options apply to all devices, some devices offer an "Advanced Settings" option for configuring granular controls.

Removable Storage Devices

The "Removable Storage Devices" enables control over the behavior of USB drives, external hard drives, and virtual drives.

When "Allow" or "Allow Trusted Devices" is selected, the admin can access advanced settings for more granular control over device configurations.

Create Data Rules

  • File Access settings
    1. Restrict file transfer from removable storage device: Controls file transfer from a connected removable storage device to a computer
    2. Restrict Modifications and Transfer of Files to Removable Storage Device: Allows administrators to enable or disable permissions for modifying files on removable storage devices, preventing changes to file content and restricting transfers from the computer to the storage device.
    3. Administrators can allow file transfers to removable storage devices based on specific file extensions and corresponding file sizes.
  • Device Access Settings
    1. Disable Auto-Run: Blocks auto-run functionality when a removable storage device is connected.
    2. Allow Only BitLocker-Encrypted Devices: Ensures only removable storage devices encrypted with BitLocker are allowed to connect and function
  • File shadow Settings
    1. Administrators have the capability to enable or disable file shadowing as needed.
    2. If file shadowing is enabled, specify the path for the remote network shared folder.
    3. Select credentials for authorized users to access the network share where shadowed file copies are stored.
    4. Set the maximum file size eligible for file shadowing.
    5. The maximum file size supported for file shadowing is 1 GB. If a value of 0 is entered, 1 GB will be used as the default.

    6. File extensions listed under "Exclude Extensions" will be excluded from file shadowing.

CD-ROM

The CD-ROM controls access to CD/DVD drives, allowing you to set permissions, restrict write functions, and enforce read-only access to secure data.
When "Allow" is selected, admin can access advanced settings to enable or disable auto-run functionality.

Create Data Rules

Bluetooth Adapters

The Bluetooth Adapters manages access to Bluetooth devices, enabling you to set permissions and restrict file transfers to protect data.
When "Allow" is selected, admin can enable or block file transfer to functionality

Create Data Rules

Creating Device Access Control Policy for Mac

Navigate to Policies -> Policy Creation -> Create Policy -> Select Mac

Create Data Rules

  1. Policy name:
    Enter a name for the policy to be created.
  2. Description (optional):
    Add a description to clarify the policy's purpose or Key details

Control Options

Device Access Control allows you to manage and restrict peripheral device usage to enhance security.

  1. Allow: Permits full functionality of peripheral devices, with additional granular controls available in advanced settings for specific devices.
  2. Block: Blocks all functions of peripheral devices. For Removable Storage and CD-ROM devices, advanced controls allow blocking specific connection types, such as USB or SCSI.
  3. Allow Trusted Devices: Enables admins to specify a list of trusted devices that are permitted access, while all other devices are blocked.
    For instructions on creating a trusted devices list, click here.
  4. No Change: Ensures that the agent does not enforce any block or allow policies on endpoints, ideal when an administrator has applied a Group Policy Object (GPO).
  5. Read Only: Allows users to view data but blocks any transfer or modification of the data on the device.

Advanced Settings

While control options apply to all devices, some devices offer an "Advanced Settings" for configuring granular controls.

Removable Storage Devices

For macOS, the "Removable Storage Devices" provides essential controls over USB drives, external hard drives, and virtual drives, allowing administrators to restrict file modifications and transfers to removable storage devices.

Create Data Rules

The "Restrict Modifications and Transfer of Files to Removable Storage Device" allows administrators to enable or disable permissions for modifying files on removable storage devices. Enabling this option prevents changes to file content within the removable storage device and restricts file transfers from the computer to the storage device.

Configure Device Audit Settings

Device audit settings lets admins configure audit parameters and settings related to generating audit reports to maintain compliance and security. This helps admins get a clear insight on device interactions across the network.

Create Data Rules

  1. Monitor All Device Activities enables comprehensive auditing and tracking of all device activities.

    Note: Disabling this setting will stop all device activity audits.

  2. Admins can configure the frequency at which the agent generates audit reports
  3. Enabling the "Send Blocked Device Details to Server Immediately" ensures blocked device reports are sent to the server in real-time. When disabled, the reports are sent during the next scheduled agent report period.

Alert Settings

Alert settings let admins configure notifications for users when a blocked device is connected.

Create Data Rules

  1. Off: Users receive no alert indicating that their device has been blocked.
  2. Default Notification: Users receive a standard message informing them that their device has been blocked.
  3. Create Data Rules

  4. Custom Notification: Admins can define a unique alert title and message that users see when inserting a blocked device. Additionally, admins can enable a "temporary access request" option, allowing users to request temporary permission to use a blocked device.

    Create Data Rules