Contents
Configuring Device Control in the Administration Console
In the Administration Console, you can configure Device Control settings in the policy properties (Security Controls→ Device Control).
Device Control settings
Setting |
Description |
---|---|
Enable Device Control |
This check box enables or disables Device Control. The check box is selected by default. |
Trusted devices |
This group of settings contains the Configure button. Clicking this button opens the Trusted devices window. In this window, you can add a device to a list of trusted devices by the device ID or by selecting it from the list of devices detected on the client devices. |
Device Control operating mode |
Response to attempts to access a device that is restricted according to Device Control rules:
|
Device Control settings |
This group of settings contains buttons that open windows where you can configure access mode for devices by type and connection buses. |
Trusted devices window
The table contains a list of trusted devices. The table is empty by default.
Trusted device settings
Setting |
Description |
---|---|
Device ID |
ID of a trusted device. |
Device name |
Name of a trusted device. |
Device type |
Trusted device type (for example, Hard drive or Smart card reader). |
Host name |
Name of the client device the trusted device is connected to. |
Comment |
Comment related to a trusted device. |
You can add a device to the list of trusted devices by ID or by mask or by selecting the required device in the list of devices detected on the user device.
You can edit and delete trusted devices in the table.
You can also import the list of devices from a file by clicking Advanced -> Import and export the list of added devices to a file in JSON format by clicking Advanced -> Export selected or Advanced -> Export all. When importing, you will be prompted to replace the list of trusted devices or add the devices to the existing list.
Page topTrusted device window
In this window, you can add a device to the list of trusted devices by its identifier.
Adding device by ID
Setting |
Description |
---|---|
Device ID |
The field for entering the identifier or the identifier mask of the device that you want to add to the list of trusted devices. To specify an identifier, you can use the following wildcards: * (any sequence of characters) or ? (any single character). For example, you can specify the USBSTOR* mask to allow access to all USB drives. |
Find on hosts |
Clicking the button displays the devices found on the connected client devices using the specified ID or mask. The button is available if the Device ID field is not empty. |
Devices found |
The table contains the following columns:
|
Comment |
The field for entering a comment for the device that you want to add to the list of trusted devices (optional). |
Device window on client devices
In this window you can add a device to the list of trusted devices by selecting it in the list of existing devices detected on client devices.
Information about existing devices is available only if there is an active policy and there has been synchronization with the Network Agent (performs within the limits specified in the Network Agent policy, 15 minutes by default). If you create a new policy and there are no other active ones, the list will be empty.
Adding device from list
Setting |
Description |
---|---|
Host name |
Field for entering the name or the name mask for the managed device for which you want to find connected devices. The default mask is * – all managed devices. |
Device type |
In this drop-down list, you can select the type of connected device to search for (for example, Hard drives or Smart card readers). The All devices option is selected by default. |
Device ID |
Field for entering the identifier or identifier mask for the device you want to find. The default mask is * – all devices. |
Find on hosts |
When you click this button, the application searches the device with the specified settings. The search results are displayed in the table below. |
Device type window
In this window, you can configure access mode for various types of devices.
Access mode for device types
Setting |
Description |
---|---|
Device type |
Device type (for example, Hard drives, Printers). |
Access mode |
Device access mode. Right-clicking with the mouse opens a context menu where you can select one of the following options:
|
You can configure access rules and schedules in the Configure device access rule window, which opens when you double-click the device type.
Page topConfigure device access rule window
In this window, you can configure access rules and schedules for the selected device type.
This window is opened by double-clicking the device type in the Device type window.
Device access rules and schedules
Setting |
Description |
---|---|
Users and/or user groups |
The list contains users and groups for which you can configure access schedule. By default, the table contains the \Everyone item (all users). You can add, edit, and delete users or user groups. |
Device access rules |
This table contains access schedules for users and user groups. It consists of the following columns:
You can configure schedules only for hard drives, removable drives, floppy disks, and CD/DVD drives. By default, the table contains the Default access schedule, which provides all users with full access to devices (the \Everyone item is selected in the Users and/or user groups list) at any time if access via the connection bus is allowed for this type of device. You can add, edit, and delete access schedules for selected users. The Default schedule cannot be modified or removed. |
User or group window
In this window, you can specify a user or group of users to which the device access rule applies.
Configure device access rule
Setting |
Description |
---|---|
Type |
The User or Group to which the Application Control rule applies. |
User or group name |
Name of a local or domain user (without specifying the full name with the domain, if the system allows entering user names in this format, or in the < |
Access schedule window
In this window, you can configure the device access schedule.
Schedule for access to devices
Setting |
Description |
---|---|
Name |
Entry field for the access schedule name. |
Time intervals |
The table where you can select time intervals for the schedule (days and hours). Intervals highlighted in green are included to the schedule. To exclude an interval from the schedule, click the corresponding cells. Intervals excluded from the schedule are highlighted in gray. By default, all intervals (24/7) are included to the schedule. |
Connection buses window
In this window, you can configure access mode for connection buses.
Access mode for connection buses
Setting |
Description |
---|---|
Connection bus |
Connection bus used by devices to connect to the client device:
|
Access mode |
Connection bus access mode. Right-clicking opens a context menu where you can select one of the following options:
|