Trusted devices are network and storage devices that can be fully accessed at any time. Trusted devices are exclusions from blocked device categories.
When a user connects a network or storage device from a blocked category to his or her device, Kaspersky Endpoint Security for Windows blocks access to this device and notifies the user. An event about the network or storage device blocking is written to the event log of Kaspersky Next. The event contains the ID of the blocked device. By using the ID of the blocked device, you can add the device to the list of trusted devices.
To generate a list of trusted network and storage devices on Windows devices:
The Security profiles section contains a list of security profiles configured in Kaspersky Next.
The security profile properties window displays settings available for all devices.
The Device Control settings page opens.
The workspace displays a list of trusted network and storage devices.
This opens the Exclusions from Device Control window.
To find a device ID, you can use the event about device blocking.
When specifying a device ID mask, you can use the asterisk (*), which stands for any number of characters. For example, the mask *disk* selects all devices with the "disk" fragment in any part of their IDs.
The added device will be displayed in the trusted list.
This opens the Exclusions from Device Control window.
After the security profile is applied on Windows devices, Kaspersky Next will not control user access to network or storage devices added to the trusted list.
Page top