Contents
Index
Search
Search Knowledge Base
Collapse All
Expand All
Previous
Next
Search
Toggle Highlight
Using Device Control
This chapter describes how to protect computers from security risks using the Device Control feature.
Topics in this chapter:
Device Control
Permissions for Storage Devices
Permissions for Non-storage Devices
Modifying Device Control Notifications
Device Control Logs