Trusted device list is a technique that is used to provide privileged access for removable devices to access your corporate data. Device Control Plus works on the principle of zero trust based device intrusion prevention. Hence, no device unless trusted can ever access your computer.
Your enterprise may allow a multitude of devices to access your computers. Imagine if an employee tries to copy your sensitive data for his gain into his personal device. Without being able to distinguish between your corporate devices and personal devices your data cannot be stalled from being stolen.
Because privileged access allows users to have direct contact with sensitive information, attackers these days are cashing in on such users to steal the data.
Trusting a device, means granting privileged access to that device. You can create a trusted device list by adding the devices to the trusted device list. To add the devices, follow the steps given below:
Instead of specifying individual Device Instance Paths, a common wildcard pattern can be used to trust a group of similar devices. In order to trust devices using wildcard pattern,
To create a wildcard pattern,
Device Instance Path of a USB storage device:
Device: JetFlash Transcend 2GB
Wildcard pattern with an asterisk "*":
Description: All USB storage devices will be classified as trusted, irrespective of the string of characters in the Device Instance Paths after "USBSTOR".
Wildcard pattern with question mark"?" and asterisk "*":
Description: JetFlash Transcend USB storage devices of memory 2, 4, or 8 GB will be classified as trusted, irrespective of the string of characters after "USBSTOR\DISK&VEN_JETFLASH&PROD_TRANSCEND_(2,4,or 8)GB&REV_8.07\".
After adding the device instance path of the devices, click Save to save the trusted device list and use it while creating policies. Else, click Save as draft to save the policy locally and publish it when required.