Device Control manages user access to devices that are installed on or connected to the computer (for example, hard drives, cameras, or Wi-Fi modules). This lets you protect the computer from infection when such devices are connected, and prevent loss or leaks of data.
Device Control provides the following functionality:
By default, Device Control is disabled. When you enable Device Control, by default, Kaspersky Embedded Systems Security denies access to the following device types:
Device Control levels
Kaspersky Embedded Systems Security controls device access on the following levels:
When connecting a device to the computer, the operating system determines the type of the device: printer, removable drive, CD/DVD drive, and so on. On this level, you can allow or deny the connection of devices by type.
A connection bus is an interface used for connecting devices to the computer. Some device types have multiple connection interfaces. For example, you can connect a printer to USB or serial (COM) port.
At this level, you can allow or deny access to devices depending on connection bus.
For example, suppose you denied access via USB. Kaspersky Embedded Systems Security denies access to all device types with Depends on connection bus mode when connected via USB.
If the Allow or Block access mode is selected for the device, access control disregards the connection bus of the device.
Trusted devices are devices to which users that are specified in the trusted device settings have full access at all times.
Device Control operating modes
Device Control can work in the following modes:
Kaspersky Embedded Systems Security denies or allows devices based on configured device access rules. The application also allows access to trusted devices. The application registers device connection and disconnection events.
Kaspersky Embedded Systems Security allows all devices and logs corresponding events. All devices are allowed. This mode is set by default. You can enable this mode to conduct an audit of devices in your organization and use this information to draft a list of trusted devices.