Securing USB devices| User Configuration
Table of Contents
What is secure USB configuration?
Users and computers can use the Secure USB setup to prevent unauthorized users or malicious devices from accessing any endpoints in the organization that stores sensitive data. No matter what type of computer a person uses, this setting is appropriate for them. In order to avoid hazards posed by unknown devices and booby-trapped USB drives that might damage your network and corrupt user accounts, you must configure Secure USB. Blocking and unblocking devices enhances USB security and fosters a secure environment for the organization.
How to enable the secure USB configuration?
- In Endpoint Central Console, navigate to Configurations tab --> Add Configurations --> Configurations--> Windows
- Select Secure USB configuration and choose User
- Specify the Name and Description for the configuration
- In the Select the Devices to be blocked/unblocked criteria, select the devices that you want to block and unblock. The devices that can be blocked/unblocked using this configuration are as follows:
You can also exclude devices from being blocked using the Device Instance ID assigned to each device.
Define the Target
Specify retry options if required and deploy the configuration.
You can also enable notifications to receive emails based on the specified frequency.
Click on the Deploy button to deploy the configuration in all the target machines.
To save the configuration as draft, click Save as
- Disk drives (for example: USB drives and external hard-disk drives)
- CD ROMs
- Portable devices (for example: mobile phones, digital cameras and portable media players)
- Floppy disks
- Bluetooth devices
- Images (for example: USB cameras and scanners)
- Apple USB devices(for example: iPhone, iPad and iPod touch)
You have successfully learnt to enable the Secure USB configuration in Windows machines