Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Recommendation on an enterprise level solution for restricting removable storage devices

Posted on 2008-06-25
4
Medium Priority
?
185 Views
Last Modified: 2013-11-14
I am looking for an enterprise level solution that has flexible options on restricting removable storage devices like USB Drives and IPods. I want to be able to manage it on a 2003 server in a AD XP environment. The main feature I am looking for is the ability to allow USB drives registered to the software onto the computers but block any unauthorized USB based storage device from being used. Any recommendations would help.
0
Comment
Question by:kjccee
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 11

Accepted Solution

by:
jkarnes12 earned 1000 total points
ID: 21869196
I would recommend checking out DeviceLock.
www.devicelock.com
 It inetgrates with AD Group Poliicy and also has auditing functions for reporting.
0
 

Author Comment

by:kjccee
ID: 21899618
I did some checking on it and it looks like a good solution. I would like to know if anyone else has used something else and would recommend it as well. I like to know I have options.
0
 

Author Comment

by:kjccee
ID: 21982127
I just wanted to note after doing some research that GFI has a solution called end point security and after trying both I found it to be a better solution for larger networks. But Devicelock is a good easy to use solution as well.
0
 

Author Comment

by:kjccee
ID: 21982128
I just wanted to note after doing some research that GFI has a solution called end point security and after trying both I found it to be a better solution for larger networks. But Devicelock is a good easy to use solution as well.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Suggested Courses

664 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question