Solved

Symantec Endpoint USB Storage Blocking

Posted on 2012-03-19
1
2,195 Views
Last Modified: 2013-12-09
Hi We have symantec endpoint 10 in our enterprise, I want to block all users from attaching USB storage devices to their systems using symantec & also I want to make sure USB keyboards & mouses work perfectly..

What are the policies I should create in endpoint?
0
Comment
Question by:chinniatluri
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
Ashok Dewan earned 500 total points
ID: 37740831
Check this , if it help you

How to block USB flash drives while allowing other USB devices.

http://www.symantec.com/business/support/index?page=content&id=TECH104299&locale=en_US

'How to block USB Thumb Drives and USB Hard Drives, but allow specific USB Drives in the Application and Device Control Policy in Symantec Endpoint Protection.'


http://www.symantec.com/business/support/index?page=content&id=TECH106304&locale=en_US
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Yet another Ransome ware 13 225
bit defender blocks good applications 2 119
how can I resolve popup issues with Microsoft Edge? 9 140
Top honey pots & reviews of canary 7 90
UPDATE - 6/15/2011 Added support for Release Update 6 Maintenance Patch 2 Point Patch 1 (RU6 MP2 PP1). Fixed a defect in the username field that was hard-coded to look for a specific domain (left over code from testing). This release will be the …
Have you ever tried to find someone you know on Facebook and searched to find more than one result with the same picture? Perhaps someone you know has told you that they have a 'facebook stalker' or someone who is 'posing as them' online and ta…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question