USB device connected

Trigger USB drive connection in DLP policies

Trigger USB drive connection enables management and monitoring of activities related to connecting USB devices to computers within the organization. Through detailed rule configuration, you can control USB device availability and define conditions for their use.

Configuration steps

1

USB device groups

Device group

  • Selection of USB device groups to be monitored.

  • Groups are created based on previously detected USB devices in the system.

Requirements:

  • Device identification by ID – a unique number assigned by the manufacturer that cannot be changed by the user (unlike the device name, which can be modified during formatting).

Behavior:

  • If a device is in a blocked group, its connection will be blocked even if the device name has been changed.

  • For devices not available on the list, it is possible to manually add the device to a group.

Adding a USB device group

2

Excluded devices group (optional)

  • Specify device groups that are excluded from monitoring.

  • Devices in this group will always be allowed, regardless of other rules.

3

Event parameterization

Applies on selected days: Selection of days on which the rule should be active (checkboxes for each day of the week). Option: If the rule should operate all week, select all days.

Applies during selected hours: Definition of the time interval during which the rule should be active. Two modes are available:

  • 24h Corresponds to the “asterisk” behavior – the rule operates around the clock on selected days.

  • Custom Allows specifying a custom time interval, e.g., 08:00 - 17:00. The possible range is from 00:00 to 23:59.

4

Additional parameters

NTFS (all partitions)

  • Checkbox YES/IGNORE/NO, which specifies whether devices with the NTFS file system should be monitored/blocked.

Encryption

  • A checkbox allowing specification of the USB device encryption status (ENCRYPTED/IGNORE/UNENCRYPTED). The rule allows blocking or allowing devices depending on whether they are encrypted.

Creating a new USB device group – step by step

1

Open the trigger configuration

In the lower part of the dropdown list in the trigger configuration window, select the option to create a new group.

2

Enter the group name and description

  • In the Name field, enter a unique name for the new group.

  • Optionally add a description to facilitate future identification of the group.

3

Add devices to the group

  • Select devices from the list: Select devices available on the detected USB devices list. Selected devices will be moved to the window on the right and grayed out in the window on the left

4

Save selection

Click Save selection, to save the configuration. The group will be added to the system and will be available in the trigger configuration.

Practical application

Example: The organization wants to allow only authorized USB devices.

  • Configuration:

    • Create a group containing authorized USB devices based on ID.

    • Block all other devices outside this group.

    • Activate the rule for all days of the week and in a 24-hour mode.

  • Effect: Only the defined USB devices will be accepted, and any unauthorized connection will be blocked.

circle-exclamation

Monitoring USB flash drives

Summary

Trigger USB drive connection is a key tool in enforcing security policies regarding data media. It enables precise control over USB device availability, minimizing the risk of unauthorized data access within the organization. With flexible configuration options, adapting rules to organizational needs is fast and effective.

Last updated

Was this helpful?