Managing devices
SES Evolution allows you to control access to all types of devices that can be connected to users' workstations, based on their type, trustworthiness, content, etc.
The following table sets out the list of protections that apply to each device type, and the security rules that allow them to be configured.
Device | I’d like to: | I need to use: |
---|---|---|
USB |
Filter the use of some types of USB devices based on their characteristics, e.g., class, vendor, serial number, etc. Example: Allow only wireless USB mice issued by the organization, or prohibit the connection of any USB key. |
The access control rules for USB devices in the Security > Policies menu, Devices > USB rules. |
Block access to any unknown device that has never been monitored by a decontamination station.
|
|
|
Filter access to data on a USB mass storage device. Example: Allow access only to office files. |
- or -
|
|
Filter the execution of an application from a removable mass storage device. Example: Allow only a specific software program from the IT department to run. |
- or -
|
|
Bluetooth |
Filter the use of some types of Bluetooth devices based on their class. Example: Allow only Bluetooth headsets issued by the organization. |
The access control rules for Bluetooth devices in the Security > Policies menu, Devices > Bluetooth rules. |
CD/DVD | Filter the use of CDs and DVDs. | The access control rules for general devices in the Security > Policies menu, Devices > General rules. |
Floppy disk | Filter the use of floppy disks. | |
Serial port | Filter the use of devices on serial ports. |