Allowed USB devices list
CurrentWare awarded 'Easiest to Do Business With' by G2, fall 2024
CurrentWare received Capterra's 2024 shortlist award
CurrentWare is certified Citrix Ready

Whitelist USB Devices on Windows PCs

AccessPatrol’s USB whitelisting feature allows administrators to grant access to authorized USB devices while restricting access to all other devices.

Prevent data loss with advanced awareness and control over high-risk peripherals including USB sticks, Keyboards, and SD/MM cards—All without the need to manually manage Group Policy Objects.

CurrentWare is verified Citrix Ready
CurrentWare awarded 'Easiest to Do Business With' by G2, fall 2024
CurrentWare received Capterra's 2024 shortlist award

Trusted by

Cushing Terrell Logo
Veterans Evaluation Services logo
Morris, Manning, and Martin LLP Logo
Viking Yachts Logo

& many more

Trusted by

Cushing Terrell Logo
Viking Yachts Logo
Bristol Health logo

& many more

Allow Trusted USB Storage Devices & Other Peripherals

  • Allow authorized devices to be used on specific computers or by specific users
  • Remove support bottlenecks by providing super users with unrestricted device use
  • Control the flow of sensitive data by limiting USB storage device use and monitoring USB file transfers
  • Add authorized devices based on vendor ID, serial number, and PNP device ID

Learn More: Devices you can control with AccessPatrol

Temporarily Bypass Device Control Security Settings

Want to temporarily provide unrestricted USB flash drive use on a specific endpoint? Use AccessPatrol’s Access Code Generator to provide a time-limited bypass of AccessPatrol’s device policy settings.

  • Works on remote computers, even without an internet connection
  • Balance security and productivity by providing limited access for edge-cases such as trusted vendors and other third-parties
  • Access codes are single-use, unique to a specific computer, and automatically expire to prevent misuse
central management console for AccessPatrol endpoint security solutions

Manage USB Security From a Convenient Central Console

CurrentWare’s centralized management console makes managing your in-house and remote workforce simple and convenient. Customized USB permissions based on groups of computers or users.

Generate user activity reports and remotely manage USB control policies all from the central CurrentWare web console.

The web console can be installed on various editions of Windows server, Windows 8.1, as well as Windows 10 or 11 Pro/Enterprise

 

Monitor USB Activity for Suspicious & High-risk Behavior

Get increased visibility into high-risk data transfers with variety of alerts, reports, and activity logs.

  • Receive real time email alerts when employees violate your endpoint data security policies
  • Review file transfer activity logs to trace data breaches back to their source
  • Get information on USB activity with device classes, descriptions, allow/block status, timestamps, and the computer/user that used the specific device
AccessPatrol sensitive file transfers alert
Screenshot of AccessPatrol's USB activity email alerts setup window. Alerts are set for .exe, .zip, .cad, and .xlsx file transfers

Why Use USB Device Control Solutions?

As part of a multi-layered data loss prevention strategy you will need security controls to protect data against theft to USB storage.

AccessPatrol’s USB blocking tool provides the critical security controls you need to prevent employees, guests, and contractors from stealing sensitive data such as personally identifiable information (PII), trade secrets, and financial records.

  • USB Security: Block unauthorized devices as a critical security control for enforcing your removable media policy. Prevent installation of apps via flash drives and protect sensitive data against theft.
  • Prevent Data Breaches: Flash drives are portable and easy to hide. AccessPatrol’s technical safeguards stop insider threats from transferring data to all forms of removable media.
  • Endpoint Security: USB devices can unknowingly infect company computers with ransomware and other malicious software. Disable USB ports to mitigate this security risk. 

AccessPatrol’s Device Permissions

AccessPatrol lets administrators easily control device access permissions for the users and endpoints in their network by assigning Full Access, Read Only, and No Access device control policies.

AccessPatrol’s USB blocker will continue to enforce data protection policies even when managed devices lose connection to the CurrentWare server, allowing users to be monitored and managed when they are working offline or on another network.

  • Full Access: The computer or user with this access permission can read and write to the specified removable device that is connected to the computer.
  • Read Only: The computer or user with this access permission can only read the information from the specified external device that is connected to the computer. The user will not be able to copy any information to the specified external device. The read access only option is only available to storage devices.
  • No Access: The computer or user with this access permission cannot read or write to the specified external devices that are connected to the computer.
AccessPatrol peripheral device permissions mockup block usb

CASE STUDY

Viking Yachts Stops Departing Employee From Stealing Intellectual Property

CurrentWare saved us a lot of time and money. If we didn’t have them we would have never known what was going on. I cannot thank them enough for this software; being able to audit removable drives is invaluable.

Tennessee College of Applied Technology

AccessPatrol’s USB Control & Data Loss Prevention Features

Block USB

Block USB & Other Devices

Set full access, read only or no access on storage devices

Allowed List

Whitelist USB Devices

Allow only authorized storage devices to be used

Block Files

Block File Transfers

Prevent files from being transferred to portable storage

Deivce Access Code

Access Code Generator

Provide temporary access to peripheral devices

Reports

DLP Activity Reports

Track file transfers, storage device use, file operations, and more

Track File Transfers

File Transfer Monitoring

Monitor files that are copied to USBs, cloud storage, and more

Email Alert

Alerts & Reports

Automatically send USB activity reports to designated inboxes

Stealth

Transparent & Stealth Modes

Run silently in the background or provide notice of monitoring

Internet Off

Central Web Console

Save time with a central admin console; optionally integrate Active
Directory OUs or security groups

Internet Off

Platform Security

Protect your CurrentWare console
with 2FA, passwords, privilege
management, and more

Internet Off

Offsite Management

Extend onsite security policies to computers running outside the corporate network

Internet Off

SQL Server Supported

Database scaled for enterprise and
large business operations using
Microsoft SQL Server

access-patrol-currentware

Try AccessPatrol for Free

Fully functional. Easy to use. Install in minutes.