Solved

Recommendation on an enterprise level solution for restricting removable storage devices

Posted on 2008-06-25
4
180 Views
Last Modified: 2013-11-14
I am looking for an enterprise level solution that has flexible options on restricting removable storage devices like USB Drives and IPods. I want to be able to manage it on a 2003 server in a AD XP environment. The main feature I am looking for is the ability to allow USB drives registered to the software onto the computers but block any unauthorized USB based storage device from being used. Any recommendations would help.
0
Comment
Question by:kjccee
  • 3
4 Comments
 
LVL 11

Accepted Solution

by:
jkarnes12 earned 250 total points
ID: 21869196
I would recommend checking out DeviceLock.
www.devicelock.com
 It inetgrates with AD Group Poliicy and also has auditing functions for reporting.
0
 

Author Comment

by:kjccee
ID: 21899618
I did some checking on it and it looks like a good solution. I would like to know if anyone else has used something else and would recommend it as well. I like to know I have options.
0
 

Author Comment

by:kjccee
ID: 21982127
I just wanted to note after doing some research that GFI has a solution called end point security and after trying both I found it to be a better solution for larger networks. But Devicelock is a good easy to use solution as well.
0
 

Author Comment

by:kjccee
ID: 21982128
I just wanted to note after doing some research that GFI has a solution called end point security and after trying both I found it to be a better solution for larger networks. But Devicelock is a good easy to use solution as well.
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question