Device Control Parent topic

Device Control regulates access to external storage devices and network resources connected to computers. Device Control helps prevent data loss and leakage and, combined with file scanning, helps guard against security risks.
You can configure Device Control policies for internal and external clients. OfficeScan administrators typically configure a stricter policy for external clients.
Policies are granular settings in the OfficeScan client tree. You can enforce specific policies to client groups or individual clients. You can also enforce a single policy to all clients.
After you deploy the policies, clients use the location criteria you have set in the Computer Location screen (see Computer Location) to determine their location and the policy to apply. Clients switch policies each time the location changes.
Important:
  • By default, Device Control is disabled on all versions of Windows Server 2003, Windows Server 2008, and Windows Server 2012. Before enabling Device Control on these server platforms, read the guidelines and best practices outlined in OfficeScan Client Services.
  • The types of devices that OfficeScan can monitor depends on whether the Data Protection license is activated. Data Protection is a separately licensed module and must be activated before you can use it. For details about the Data Protection license, see Data Protection License.

    Device Types

     
    Data Protection Activated
    Data Protection Not Activated
    Storage Devices
    CD/DVD
    Monitored
    Monitored
    Floppy disks
    Monitored
    Monitored
    Network drives
    Monitored
    Monitored
    USB storage devices
    Monitored
    Monitored
    Non-storage Devices
    Bluetooth adapters
    Monitored
    Not monitored
    COM and LPT ports
    Monitored
    Not monitored
    IEEE 1394 interface
    Monitored
    Not monitored
    Imaging devices
    Monitored
    Not monitored
    Infrared devices
    Monitored
    Not monitored
    Modems
    Monitored
    Not monitored
    PCMCIA card
    Monitored
    Not monitored
    Print screen key
    Monitored
    Not monitored
    Wireless NICs
    Monitored
    Not monitored
  • For a list of supported device models, see the Data Protection Lists document at: