AccessPatrol is blocking my users from charging their phones

AccessPatrol is blocking my users from charging their phones

Your users mobile phones won’t be able to charge when AccessPatrol’s blocking restrictions are enabled because their mobile device drivers have not been successfully installed onto the users’ computers.

In order for the mobile device drivers to be installed, AccessPatrol must not block the device so that the computer can access the mobile device storage where the drivers are stored.

You can temporarily allow your users’ computers to access mobile devices using the AccessPatrol access code generator.

For more detailed instructions you can read this page on how to allow temporary device access on your user’s computers.

    • Related Articles

    • Which devices can I control with AccessPatrol?

      AccessPatrol allows you to control the following external devices on your users computers. Device Class Devices Access Permissions Storage Devices USB Full / Read only / No access DVD /CD Full / Read only / No access Floppy Full / Read only / No ...
    • How do I disable AccessPatrol’s device tracking?

      AccessPatrol can track your users’ device usage and file operations. If you are only using AccessPatrol just for blocking access to devices then you can disable the device tracking feature. This will keep your CurrentWare server database size to a ...
    • How to setup device blocking

      With AccessPatrol’s block settings, you can effortlessly tailor your security protocols to match your unique requirements. Safeguard your digital assets by easily defining and enforcing restrictions on USB devices, external drives, and network ...
    • Release Notes - Old

      Return to the list of latest changes Version 5.0.7 June 1, 2016 Fixed a bug with BrowseReporter’s PCs/users selection Fixed a bug with Email Report’s corrupted profiles from previous version Enhanced Web Filtering for Download Filter for Windows 10 ...
    • What is AccessPatrol?

      AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malware from unauthorized devices, resulting in an increase of network security for businesses of all sizes. Companies around ...