Trusted device list is a technique that is used to provide privileged access for removable devices to access your corporate data. Device Control Plus works on the principle of zero trust based device intrusion prevention. Hence, no device unless trusted can ever access your computer.
Your enterprise may allow a multitude of devices to access your computers. Imagine if an employee tries to copy your sensitive data for his gain into his personal device. Without being able to distinguish between your corporate devices and personal devices your data cannot be stalled from being stolen.
Because privileged access allows users to have direct contact with sensitive information, attackers these days are cashing in on such users to steal the data.
Trusting a device, means granting privileged access to that device. You can create a trusted device list by adding the devices to the trusted device list. To add the devices, follow the steps given below:
Instead of specifying individual Device Instance Paths, a common wildcard pattern can be used to trust a group of similar devices. In order to trust devices using wildcard pattern,