Kaspersky Endpoint Security 11 for Windows

Offline mode for granting access

April 25, 2024

ID 186150

You can grant access to a blocked device in offline mode only if Kaspersky Security Center is deployed in the organization and a policy has been applied to the computer. In the policy settings, in the Device Control section, the Allow request for temporary access check box must be selected.

A user requests access to a blocked device as follows:

  1. Connect the device to the computer.

    Kaspersky Endpoint Security will show a notification stating that access to the device is blocked (see the figure below).

  2. Click the Request temporary access link.

    This opens a window containing a list of connected devices.

  3. In the list of connected devices, select the device to which you want to gain access.
  4. Click Generate request access file.
  5. In the Access duration field, specify the period of time for which you want to have access to the device.
  6. Save the file to computer memory.

As a result, a request access file with the *.akey extension will be downloaded to computer memory. Use any available method to send the device request access file to the corporate LAN administrator.

Notification about blocked access to the device. The user can request temporary or permanent access to the device.

Device Control notification

How the administrator can create an access key for the blocked device in the Administration Console (MMC)

How the administrator can create an access key for the blocked device in Web Console and Cloud Console

As a result, the blocked device access key will be downloaded to computer memory. An access key file has the *.acode extension. Use any available method to send the blocked device access key to the user.

The user activates the access key as follows:

  1. In the main application window, click the Application settings icon in the form of a gear wheel. button.
  2. In the application settings window, select Security ControlsDevice Control.
  3. In the Access request block, click the Request access to device button.
  4. In the window that opens, click the Activate access key button.
  5. In the window that opens, select the file with the device access key received from the corporate LAN administrator.

    This opens a window containing information about access provision.

  6. Click OK.

As a result, the user receives access to the device for the time period set by the administrator. The user receives the full set of rights for accessing the device (read and write). When the key expires, access to the device will be blocked. If the user requires permanent access to the device, add the device to the trusted list.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.