Actions with trusted devices

Trusted devices are devices to which users that are specified in the trusted device settings have full access at all times.

The following actions are available for working with trusted devices:

If you have added a device to the list of trusted devices and created an access rule for this type of device which blocks or restricts access, Kaspersky Endpoint Security decides whether or not to grant access to the device based on its presence in the list of trusted devices. Presence in the list of trusted devices has a higher priority than an access rule.

In this section:

Adding a device to the Trusted list from the application interface

Adding devices to the Trusted list based on the device model or ID

Adding devices to the Trusted list based on the mask of the device ID

Configuring user access to a trusted device

Removing a device from the list of trusted devices

Importing the list of trusted devices

Exporting the list of trusted devices

Page top