Exporting and importing the list of trusted devices
To distribute the list of trusted devices to all computers in your organization, you can use the export/import procedure.
For example, if you need to distribute a list of trusted removable drives, you need to do the following:
Sequentially connect removable drives to your computer.
In the Kaspersky Endpoint Security settings, add the removable drives to the trusted list. If required, configure user access permissions. For example, allow only administrators to access removable drives.
Export the list of trusted devices in the Kaspersky Endpoint Security settings (see the instructions below).
Distribute the trusted device list file to other computers in your organization. For example, place the file in a shared folder.
Import the list of trusted devices in the Kaspersky Endpoint Security settings on other computers in the organization (see the instructions below).
To import or export the list of trusted devices:
In the main application window, click the Settings button.
In the application settings window, select Security Controls → Device Control.
In the right part of the window, select the Trusted devices tab.
To export the list of trusted devices:
Click the Export button.
In the window that opens, specify the name of the XML file to which you want to export the list of trusted devices, and select the folder in which you want to save this file.
Kaspersky Endpoint Security exports the entire list of trusted devices to the XML file.
To import the list of trusted devices:
Click the Import button.
In the window that opens, select the XML file from which you want to import the list of trusted devices.
If the computer already has a list of trusted devices, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
Save your changes.
When a device is connected, Kaspersky Endpoint Security checks the list of trusted devices for an authorized user. If the device is trusted, Kaspersky Endpoint Security allows access to the device with all permissions, even if access to the device type or connection bus is denied.