![]() Other users (excluding the administrator)log off: The log off-action settings made for users are applied when a user logs off. ![]() ![]() Other users (excluding the administrator) log on: The Secure USB configuration made for the computer is applied. This means that the administrator can use disk drives. However, it is over written by the settings made for the administrator. This means that no portable devices and disk drives can be used.Īdministrator logon: The Secure USB configuration for the computer is applied. Settings configured for computers : You have blocked the usage of portable devices and disk drivesĬomputer startup: The Secure USB configuration settings made for the computer are applied when the computer is started. Other users (excluding the administrator): You have not deployed any configurations For example, assume that you have made the following settings:Īdministrator: You have unblocked the usage of the disk drive When you apply the Secure USB configuration to both computers and users, the settings made for computers will be applied before the settings made for users. The actions that you can set include the following:ĭon't alter device status: Use this option to retain the settings you have made, even after the user has logged off.įor example, if you use this option, the settings that you have made to block or unblock the usage of USB devices will apply to all users who log on.ĭisable all devices excluding mouse: Use this option to remove the settings you have made, even after the user has logged off.Īpplying Secure USB Settings to Computers and Users These actions enable you to retain or remove the settings that you make, using the Secure USB configuration, once the user logs off. When you create the Secure USB configuration to block or unblock devices for users, you can set actions to take place once the user logs off. You can also exclude devices using the Device Instance ID assigned to each device. Images (for example: USB cameras and scanners)Īpple USB devices (for example: iPhone, iPad and iPod touch) Portable devices (for example: mobile phones, digital cameras and portable media players) Using this configuration, you can block or unblock the following devices:ĭisk drives (for example: USB drives and external hard-disk drives) This configuration is applicable to users irrespective of the computers they use. The Secure USB configuration is used for both users and computers to block or unblock the use of the USB devices. Revoking All USB Restrictions applied to the User.Adding Restrictions to secure USB Devices.Applying Secure USB Settings to Computers and Users.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |