Managing devices

SES Evolution allows you to control access to all types of devices that can be connected to users' workstations, based on their type, trustworthiness, content, etc.

The following table sets out the list of protections that apply to each device type, and the security rules that allow them to be configured.

Device I’d like to: I need to use:
USB

Filter the use of some types of USB devices based on their characteristics, e.g., class, vendor, serial number, etc.

Example: Allow only wireless USB mice issued by the organization, or prohibit the connection of any USB key.

The access control rules for USB devices in the Policies menu, Devices > USB rules.

 

Block access to any unknown device that has never been monitored by a decontamination station.

 

  • The configuration of agent groups in Agents > Configuration > Trusted devices.

  • The control rules for storing data on USB devices in the Policies menu, Devices > USB storage rules.

  • The control panel for trusted USB devices in the Devices menu.

Filter access to data on a USB mass storage device.

Example: Allow access only to office files.

  • The access control rules for files in the Policies menu, ACL resources > File rules. Select the Removable option in the identifier’s volume type.

- or -

Filter the execution of an application from a removable mass storage device.

Example: Allow only a specific software program from the IT department to run.

- or -

   
Bluetooth

Filter the use of some types of Bluetooth devices based on their class.

Example: Allow only Bluetooth headsets issued by the organization.

The access control rules for Bluetooth devices in the Policies menu, Devices > Bluetooth rules.
CD/DVD Filter the use of CDs and DVDs. The access control rules for general devices in the Policies menu, Devices > General rules.
Floppy disk Filter the use of floppy disks.
Serial port Filter the use of devices on serial ports.