You can also exclude specific devices, if required. No Change, represents that no change has been made to the current settings.Īdding Restrictions to secure USB DevicesĪs an administrator, you can create a configuration block or unblock specific USB devices. Unblock USB, represents to re-enable the access to the USB devices that has been blocked. Note: Block USB, represents to block the access to use any USB device. If the log off-action setting is set to Don't alter device status, then the settings made will apply to the next user who logs on, provided that the user does not have any settings that apply to them. Other users (excluding the administrator)log off: The log off-action settings made for users are applied when a user logs off. Other users (excluding the administrator) log on: The Secure USB configuration made for the computer is applied. This means that the administrator can use disk drives. However, it is over written by the settings made for the administrator. This means that no portable devices and disk drives can be used.Īdministrator logon: The Secure USB configuration for the computer is applied. Settings configured for computers : You have blocked the usage of portable devices and disk drivesĬomputer startup: The Secure USB configuration settings made for the computer are applied when the computer is started. Other users (excluding the administrator): You have not deployed any configurations For example, assume that you have made the following settings:Īdministrator: You have unblocked the usage of the disk drive When you apply the Secure USB configuration to both computers and users, the settings made for computers will be applied before the settings made for users. The actions that you can set include the following:ĭon't alter device status: Use this option to retain the settings you have made, even after the user has logged off.įor example, if you use this option, the settings that you have made to block or unblock the usage of USB devices will apply to all users who log on.ĭisable all devices excluding mouse: Use this option to remove the settings you have made, even after the user has logged off.Īpplying Secure USB Settings to Computers and Users These actions enable you to retain or remove the settings that you make, using the Secure USB configuration, once the user logs off. When you create the Secure USB configuration to block or unblock devices for users, you can set actions to take place once the user logs off. You can also exclude devices using the Device Instance ID assigned to each device. Images (for example: USB cameras and scanners)Īpple USB devices (for example: iPhone, iPad and iPod touch) Portable devices (for example: mobile phones, digital cameras and portable media players) ![]() Using this configuration, you can block or unblock the following devices:ĭisk drives (for example: USB drives and external hard-disk drives) This configuration is applicable to users irrespective of the computers they use. ![]() The Secure USB configuration is used for both users and computers to block or unblock the use of the USB devices. ![]()
0 Comments
Leave a Reply. |