Managing devices

SES Evolution allows you to control access to all types of devices that can be connected to users' workstations, based on their type, trustworthiness, content, etc.

The following table sets out the list of protections that apply to each device type, and the security rules that allow them to be configured.

Device I’d like to: I need to use:
USB

Filter the use of some types of USB devices based on their characteristics, e.g., class, vendor, serial number, etc.

Example: Allow only wireless USB mice issued by the organization, or prohibit the connection of any USB key.

The access control rules for USB devices in the Security > Policies menu, Devices > USB rules.

 

Block access to any unknown device that has never been monitored by a decontamination station.

 

Filter access to data on a USB mass storage device.

Example: Allow access only to office files.

  • The access control rules for files in the Security > Policies menu, ACL resources > File rules. Select the Removable option in the identifier’s volume type.

- or -

  • The control rules for storing data on USB devices in the Security > Policies menu, Devices > USB storage rules.

Filter the execution of an application from a removable mass storage device.

Example: Allow only a specific software program from the IT department to run.

- or -

  • The control rules for storing data on USB devices in the Security > Policies menu, Devices > USB storage rules.

   
Bluetooth

Filter the use of some types of Bluetooth devices based on their class.

Example: Allow only Bluetooth headsets issued by the organization.

The access control rules for Bluetooth devices in the Security > Policies menu, Devices > Bluetooth rules.
CD/DVD Filter the use of CDs and DVDs. The access control rules for general devices in the Security > Policies menu, Devices > General rules.
Floppy disk Filter the use of floppy disks.
Serial port Filter the use of devices on serial ports.