This section provides instructions on how to manage user access to the features of mobile devices and Windows devices, how to configure the behavior of security applications on your users' devices, and actions that end users can perform.
In this section
Controlling network and storage devices on Windows devices
Generating a list of trusted network and storage devices on Windows devices
Configuring interaction of Kaspersky Endpoint Security for Windows with end users
Configuring interaction of Kaspersky Endpoint Security for Mac with end users
Controlling user access to the features of Android devices
Controlling user access to the features of iOS and iPadOS devices