Configuring user access to device features

This section provides instructions on how to manage user access to the features of mobile devices and Windows devices, how to configure the behavior of security applications on your users' devices, and actions that end users can perform.

In this section

Controlling network and storage devices on Windows devices

Generating a list of trusted network and storage devices on Windows devices

Configuring interaction of Kaspersky Endpoint Security for Windows with end users

Configuring interaction of Kaspersky Endpoint Security for Mac with end users

Controlling user access to the features of Android devices

Controlling user access to the features of iOS devices

Page top