Policies and Control
- Manage control policies by logging hosts with the required groups.
 - Statistics tab to provide visualization capabilities, time-series analytics and application monitoring.
 - Block all new USB devices post-installation.
 - Device blacklisting / whitelisting through the centralized Command and Control(C2) server.
 - Built on top of widely used USB Guard.
 - Permission control logs to view previously used actions for any host.
 - Define device control policies for endpoint groups, allow/block USB devices by class, manufacturer ID, product ID, and serial number.
 - Rules can be applied individually or as a group by selecting the active hosts from the client list.