AccessPatrol
Fortify Your Data Defense: AccessPatrol and Microsoft BitLocker Together
AccessPatrol can be effectively used in conjunction with Microsoft BitLocker to provide a comprehensive security solution for managing and safeguarding sensitive data. While BitLocker ensures the encryption of data on physical drives, protecting it ...
Will the blocked devices be accessible when the AccessPatrol server is not running?
The AccessPatrol Client retains data on the client-side. If the server is unavailable, the permissions will still be applying to the client computers. Disable blocking when CurrentWare server is unavailable Open the CurrentWare Web Console. Choose ...
How do I disable AccessPatrol’s device tracking?
AccessPatrol can track your users’ device usage and file operations. If you are only using AccessPatrol just for blocking access to devices then you can disable the device tracking feature. This will keep your CurrentWare server database size to a ...
Bulk Update Your Device Allowed List
If you need to update multiple group Allowed lists at once, you are able to add devices to multiple groups. This is great for when you get new devices that need to be allowed through multiple groups within your CurrentWare console. Steps to bulk ...
AccessPatrol is blocking my users from charging their phones
Your users mobile phones won’t be able to charge when AccessPatrol’s blocking restrictions are enabled because their mobile device drivers have not been successfully installed onto the users’ computers. In order for the mobile device drivers to be ...
How do I temporarily allow device access?
With AccessPatrol, you can temporarily grant users access to their devices by providing a unique access code. Users can input this code from their control panel to unlock full access. There are two methods to generate access codes. First, you can ...
Setting up Email Alerts with File and Device Activities
AccessPatrol can send out alerts when unauthorized devices and file activities are occurring such as connecting personal devices and/or transferring confidential files. These alerts are sent via email which is configured on the CurrentWare console. ...
How do I get Email Reports?
Through the Email Reports feature, the AccessPatrol reports can automatically be generated and emailed to the administrator periodically. This eliminates having to rely on the manual process of creating reports. How to Create a Schedule for Email ...
Device Warning Message
AccessPatrol is a powerful security solution that provides endpoint control and data leakage prevention. It allows administrators to control and restrict access to USB and other removable devices, thus preventing the theft or loss of sensitive data. ...
What file types work with Block Original File Extensions feature?
As of CurrentWare version 7.0.2 a feature that stops end users from manipulating the file type in an effort to bypass the “Block File Types” feature has been added. Due to the sheer number of file extensions in existence, we focused on the most ...
Can I block specific file types from being transferred?
AccessPatrol gives you the ability to prevent your end-users from copying specific file extensions to their storage devices. Using Block File Extensions to Restrict File Type Transfers Choose the AccessPatrol solution from the left-hand side. Select ...
Managing Bluetooth Devices
As of v7.0.0 you have more control over Bluetooth devices through AccessPatrols Device Restrictions. You have more granularity to be able to decide on more indepth blocking ability as Bluetooth can encompass a large range of device types. Here you ...
Set different device restrictions for different users
AccessPatrol allows you to set different device policies to different groups of computers or users. The management console allows you to create group folders to set separate policies amongst different computers or users. Creating new folders to place ...
How do I Set Read-only Permissions for Devices?
AccessPatrol allows the administrator to control the device access privileges for a group of clients or an individual computer. Read Only: The computer with this access permission can only read the information from the specified external device that ...
Can I block devices at specific times?
Device Scheduler The device scheduler allows the administrator to assign when the device permissions will be enforced by assigning the start time and stop time for particular devices on the network. Only storage devices are available for the device ...
How do I Audit Device Activity?
You can audit device activity on your employees’ computers using AccessPatrol’s device reports. AccessPatrol can track and store information based on the devices connected to your computers and also the file operations being carried to and from USB ...
Track network drives
Track network drives This feature allows monitoring of file transfers between a network share and local drives (i.e. local HDD or portable storage devices) When this feature is enabled, files that are copied between local storage to or from a network ...
Track downloads and uploads
Track downloads and uploads AccessPatrol can track file uploads and downloads, showing you the date and time, file type and name, and the website domain from where it was downloaded or uploaded. To learn how to block file uploads/downloads, see this ...
Block Cloud Storage
AccessPatrol includes a robust Data Loss Prevention (DLP) feature that empowers organizations to take control of their sensitive information. With the Cloud Storage Blocker, you can now fortify your data security strategy by preventing the ...
AccessPatrol Web Dashboards
AccessPatrol has 7 dashboards, giving you visibilities on file operations and device activities from your entire organization. With AccessPatrol’s web dashboard, you will gain the insights you need to enforce your removable media policy with great ...
Auditing your employee’s USB file transfers
With the File Operation Report in AccessPatrol you can easily display the file sizes of each file transfer. This easily allows you to see if the end users are copying/renaming/etc large, medium or small files. To run the File Operations Report: Open ...
How do I whitelist external devices?
Administrators can utilize AccessPatrol’s Device Allowed List to specify which devices your end users can have access to. By adding a device to the Allowed List, any authorized users on the network will be able to access it even if the device’s ...
How to setup device blocking
With AccessPatrol’s block settings, you can effortlessly tailor your security protocols to match your unique requirements. Safeguard your digital assets by easily defining and enforcing restrictions on USB devices, external drives, and network ...
Which devices can I control with AccessPatrol?
AccessPatrol allows you to control the following external devices on your users computers. Device Class Devices Access Permissions Storage Devices USB Full / Read only / No access DVD /CD Full / Read only / No access Floppy Full / Read only / No ...
Block unauthorized Human Interface Devices
What does this do? Allows specific Human Interface Devices (HID), such as company-authorized keyboards and mice, and blocks all other keyboards and mice. This allows control of keyboards and other input devices that may pose a security risk. What ...
What is AccessPatrol?
AccessPatrol is a proactive solution for securing company endpoints to prevent the illicit transfer of data and download of malware from unauthorized devices, resulting in an increase of network security for businesses of all sizes. Companies around ...