The following instructions assume that you are on the Section 9.0, Creating Security Policies) or that you are on the page for an existing USB Connectivity policy (see Section 13.0, Editing a Policy’s Details).
page in the Create New USB Connectivity Policy Wizard (seeThe USB Connectivity policy lets you control whether or not a device supports USB devices. You can allow all USB devices, block all USB devices, or control access for groups or individual USB devices based on attributes such as Device Class, Manufacturer, Product, and Serial Number.
Watch a video that demonstrates how to create a USB Connectivity policy. |
Select whether or not USB connections are supported:
Enable: Enables support for USB connections by keeping a device’s USB bus active. You can then enable or disable access for groups of USB devices or individual devices.
Disable: Disables support for USB connections by deactivating a device’s USB bus. All USB devices (keyboards, mice, storage devices, and so forth) are disabled. If you select this option, the remaining options (
, , and ) do not apply and are disabled.Inherit: Inherits this setting from other USB Connectivity policies assigned higher in the policy hierarchy. For example, if you assign this policy to a user, the setting is inherited from any USB Connectivity policies assigned to the user’s groups, folders, or zone.
Some USB devices might not match any of the device groups or individual devices you define in this policy. Select the default access (
, , or ) to assign to those USB devices.Many USB devices fall into one of the four groups shown in the following table:
Device Group |
Base Class Code |
Examples |
---|---|---|
Human Interface Device (HID) |
03h |
Mice, keyboards, game controllers |
Mass Storage Class |
08h |
Flash drives, external hard drives, personal digital assistants (PDAs), mobile phones, cameras, Windows portable devices (WPDs) |
Printing Class |
07h |
Printers |
Scanning/Imaging (PTP) |
06h |
Scanners, any device that uses the Picture Transfer Protocol |
You specify access settings for each of the groups. When a device’s base class matches a group, the device receives the group’s access setting.
The three most common uses for the device group access settings are to:
Disable access for an entire device group such as the Scanning/Imaging (PTP) group.
Create whitelists for device groups. To create a whitelist, you disable access for a device group and then use the to define the enabled devices. For example, you might disable all Mass Storage Class devices and then enable specific removable storage devices. list
Create blacklists for device groups. To create a blacklist, you enable access for a device group and then use the U to define the disabled devices. For example, you might enable all Printing Class devices and then disable specific printers. list
Select one of the following access settings for each group:
Always Disable: Always disable access. This setting takes precedence over all other access settings for the group’s devices.
For example, assume that you set the Scanner/Imaging (PTP) group access to and give it list access. The access setting overrides the access setting and the scanner is still blocked. Or, in another USB Connectivity policy you set the Scanner/Imaging (PTP) group access to and assign the two policies to the same user. The access setting overrides the setting.
. You then define a scanner in theBecause a USB device can receive multiple access settings (group setting for this policy, device setting for this policy, and group or device settings for other USB Connectivity policies) but only one access setting can be enforced, you should make sure you understand how access conflicts are resolved.
Always Enable: Always enable access. This setting takes precedence over all access settings for group members except
.For example, if a member of the group is also defined in the and assigned list access, this group access setting overrides that setting and allows access. However, if the device is given access, that setting takes precedence and the device is disabled.
Disable: Disable access. This setting takes precedence over the
setting.Use this setting to create a whitelist for the device group. For example, to create a whitelist for removable storage devices, set the Mass Storage Class access to so that all removable storage devices are blocked. Then, use the to define the allowed removable storage devices (the whitelist) and assign list access to each device.
Enable: Enable access.
Use this setting to create a blacklist for the device group. For example, to create a blacklist for printers, set the Printing Class access to so that all printers are allowed. Then, use the to define the disabled printers (the blacklist) and assign list access to each device.
Default Device Access: Give the device group the access specified by the
setting.Inherit: Inherit this setting from other USB Connectivity policies assigned higher in the policy hierarchy. For example, if you assign this policy to a user, the setting is inherited from any USB Connectivity policies assigned to the user’s groups, folders, or zone.
The device groups use one attribute (Device Class) as the match criterion. If you have devices whose access you want to control based on matching different or additional attributes, you can use the list.
For example, assume that the only mass storage device you want to allow is the Acme USB2 drive. In the Device Group Access Settings, you set Mass Storage Class to
. You then add the Acme USB2 to the list and set the access to .It is possible that a detected device might match multiple device groups or devices. When this occurs, only one access level is assigned to the device. For information about how conflicts are resolved, see Conflict Resolution.
The following table provides instructions for managing the
list:
Task |
Steps |
Additional Details |
---|---|---|
Create a new device |
|
A USB device can receive multiple access settings (group setting for this policy, device setting for this policy, and group or device settings for other USB Connectivity policies), but only one access setting can be enforced. You should make sure you understand how access conflicts are resolved. You can use the access options to create a whitelist or a blacklist. For example:
|
Copy an existing device from another policy |
|
All devices included in the other USB Connectivity policies are copied. If necessary, you can edit the copied devices after they are added to the list. |
Import a device from a policy export file |
|
All devices included in the export file are imported. If necessary, you can edit the imported devices after they are added to the list. For information about exporting devices, see Export a device. |
Import a device from a Device Scanner file |
|
For information about using the Device Scanner to collect data about USB devices, see |
Enable or disable a device |
|
When you add a device, it is enabled by default. You can disable a device to save it in the policy but no longer have it applied. |
Edit a device |
|
|
Rename an device |
|
|
Export a device |
|
|
Delete a device |
|
|
When a device is detected, its attributes (Device Class, Manufacturer, Product, and so forth) are compared to the attributes associated with the device groups in the
list and the devices in the list. In some cases, the device might match more than one group and device. For example, a removable storage device defined in the list would also match the Mass Storage Class group.In order to know which access setting to apply to a USB device, the Endpoint Security Agent uses the USB Connectivity policy to build an access filter to evaluate devices. If multiple USB Connectivity policies apply, the Endpoint Security Agent uses all of the policies to build the access filter.
The filter includes each access setting (Always Disable, Always Enable, and Allow) and the device groups and devices assigned to the setting. For example, assume the following group and device assignments for each access setting:
Access Setting |
Group Assignments |
Device Assignment |
---|---|---|
Always Disable |
|
Mouse1 Thumbdrive5, Thumbdrive2 |
Always Enable |
Human Interface Device |
Printer4, Printer3, Printer1 |
Disable |
Printing Class |
Scanner1 |
Block |
Mass Storage Class Scanning/Imaging (PTP |
Printer2 |
A USB device is evaluated against the filter beginning with the highest-priority setting (
) and continuing to the lowest-priority setting ( ). If the device matches one of the device groups or devices assigned to the access setting, the device receives that access setting and the evaluation ends.Consider the following examples:
Mouse1(a Human Interface Device) is detected. It is evaluated against the first setting (
). Because Mouse1 matches the Mouse1 device assignment for the setting, Mouse1 is blocked and no further evaluation is required.Mouse4 (a Human Interface Device) is detected. It is evaluated against the
setting. Mouse4 does not match any assignments (group or device), so it is evaluated against the assignments. Because Mouse4 is a Human Interface Device and that device group is assigned the setting, Mouse4 is allowed and no further evaluation is required.Thumbdrive1 and Thumbdrive5 (two Mass Storage Class devices) are detected. Thumbdrive5 is blocked because
(the device assignment) takes priority over Enable (the group assignment). Thumbdrive1 is allowed because it is included in the group assignment ( ) and it does not match a device assignment.Printer2 and Printer4 (two Printing Class devices) are detected. Printer4 is allowed because
(the device assignment) takes priority over (the group assignment). Printer2 is blocked because (the group assignment) takes priority over (the device assignment).