Can I prevent users use pen drives?

Posted on 2012-09-10
Last Modified: 2012-09-12
Hello I have a Client that ask me to disable the pendrives use, the computer are windows XP.

Any idea?

Question by:limmontreefree
    LVL 12

    Expert Comment

    Do they need their USB ports, or could you just disable them?
    LVL 5

    Assisted Solution

    I'm guessing "Pendrives" in this case is the latest name for thumb drives or flash drives...  All of which connect via USB.

    You will have to create a security policy that will block USB usage....   I know of several larger customers of mine that have done this -- HOWEVER -- they've blocked USB uses totally.

    Is this what you're wanting to do?   Doing so would mean that all but those that had the specific policy to allow USB use would be blocked from using ANY USB device like this.
    LVL 1

    Assisted Solution

    What is your servers OS?

    Try this link
    LVL 10

    Assisted Solution

    you should look into Symantec Endpoint Protection.  this software is managed by a server and you can allow or deny access to pretty much anything device.  

    this software WILL SUIT YOU NEEDS.

    u can block pen drive and yet allow other USB devices such as printers etc etc.

    Author Comment

    They need the usb port to the printer for example

    Author Comment

    The domain controllers are Windows 2003 R2. and I don't need complex configurations, in the A pc nobody can  use flash drives.

    If is possible I prefer not to use commercial software.

    LVL 30

    Accepted Solution

    That can be done by changing the value of the following registry key from 3 to 4:


    This reg file can be executed that will do it for you. You can run this as a startup across all the pc's at next logon and it will make the change.

    Author Closing Comment

    thanks everybody

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    6 Surprising Benefits of Threat Intelligence

    All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now