How do I Set Read-only Permissions for Devices?
AccessPatrol allows the administrator to control the device access privileges for a group of clients or an individual computer.
Read Only:
The computer with this access permission can only read the information
from the specified external device that is connected to the computer.
The user will not be able to copy any information to the specified
external device. This option is only available to storage devices.
Here is a list of devices that are supported by AccessPatrol’s read-only permission:
Storage Devices:
- USB (Removable disk, iPod)
- CD/DVD
- Floppy
- Tape
- External Hard Drive
- FireWire
- SD Card
- MM Card
Related Articles
Assign Operator Permissions
If you create secondary users to access your password-protected CurrentWare console, you can configure their user profiles to restrict privileges on the CurrentWare console. For instructions on how to create users and password protect your ...
Can I block devices at specific times?
Device Scheduler The device scheduler allows the administrator to assign when the device permissions will be enforced by assigning the start time and stop time for particular devices on the network. Only storage devices are available for the device ...
Which devices can I control with AccessPatrol?
AccessPatrol allows you to control the following external devices on your users computers. Device Class Devices Access Permissions Storage Devices USB Full / Read only / No access DVD /CD Full / Read only / No access Floppy Full / Read only / No ...
Block unauthorized Human Interface Devices
What does this do? Allows specific Human Interface Devices (HID), such as company-authorized keyboards and mice, and blocks all other keyboards and mice. This allows control of keyboards and other input devices that may pose a security risk. What ...
How do I whitelist external devices?
Administrators can utilize AccessPatrol’s Device Allowed List to specify which devices your end users can have access to. By adding a device to the Allowed List, any authorized users on the network will be able to access it even if the device’s ...