Solved

Symantec Endpoint USB Storage Blocking

Posted on 2012-03-19
1
2,182 Views
Last Modified: 2013-12-09
Hi We have symantec endpoint 10 in our enterprise, I want to block all users from attaching USB storage devices to their systems using symantec & also I want to make sure USB keyboards & mouses work perfectly..

What are the policies I should create in endpoint?
0
Comment
Question by:chinniatluri
1 Comment
 
LVL 9

Accepted Solution

by:
Ashok Dewan earned 500 total points
ID: 37740831
Check this , if it help you

How to block USB flash drives while allowing other USB devices.

http://www.symantec.com/business/support/index?page=content&id=TECH104299&locale=en_US

'How to block USB Thumb Drives and USB Hard Drives, but allow specific USB Drives in the Application and Device Control Policy in Symantec Endpoint Protection.'


http://www.symantec.com/business/support/index?page=content&id=TECH106304&locale=en_US
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Exchange 2010 DAG 8 105
Norton antivirus 11 94
Viruses etc. and W8 and W10 12 87
Checkpoint Endpoint Managment 3 96
OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question