Policies and Control
- Manage control policies by logging hosts with the required groups.
- Statistics tab to provide visualization capabilities, time-series analytics and application monitoring.
- Block all new USB devices post-installation.
- Device blacklisting / whitelisting through the centralized Command and Control(C2) server.
- Built on top of widely used USB Guard.
- Permission control logs to view previously used actions for any host.
- Define device control policies for endpoint groups, allow/block USB devices by class, manufacturer ID, product ID, and serial number.
- Rules can be applied individually or as a group by selecting the active hosts from the client list.